• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于命名实体识别的物联网网络网络安全态势诊断自动化系统。

Named-Entity-Recognition-Based Automated System for Diagnosing Cybersecurity Situations in IoT Networks.

作者信息

Georgescu Tiberiu-Marian, Iancu Bogdan, Zurini Madalina

机构信息

Department of Economic Informatics and Cybernetics, The Bucharest University of Economic Studies, 6 Piata Romana, 010374 Bucharest, Romania.

出版信息

Sensors (Basel). 2019 Aug 1;19(15):3380. doi: 10.3390/s19153380.

DOI:10.3390/s19153380
PMID:31374902
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC6695928/
Abstract

The aim of this paper was to enhance the process of diagnosing and detecting possible vulnerabilities within an Internet of Things (IoT) system by using a named entity recognition (NER)-based solution. In both research and practice, security system management experts rely on a large variety of heterogeneous security data sources, which are usually available in the form of natural language. This is challenging as the process is very time consuming and it is difficult to stay up to date with the constant findings in the areas of security threats, vulnerabilities, attacks, countermeasures, and risks. The proposed system is conceived as a semantic indexing solution of existing vulnerabilities and serves as an information tool for security management experts. By integrating the proposed system, the users can easily discover the potential vulnerabilities of their IoT devices. The proposed solution integrates ontologies and NER techniques in order to obtain a high rate of automation with the scope of reaching a self-maintained and up-to-date system in terms of vulnerabilities and common exposures knowledge. To achieve this, a total of 312 CVEs (common vulnerabilities and exposures) specific to the IoT field were identified. CVEs are arguably one of the most important cybersecurity resources nowadays, containing information about the latest discovered vulnerabilities. This set is further used as data corpus for an NER model designed to identify the main entities and relations that are relevant to IoT security. The goal is to automatically monitor cybersecurity information relevant to IoT, and filter and present it in an organized and structured framework based on users' needs. The taxonomies specific to IoT security are implemented via a domain ontology, which is later used to process natural language. Relevant tokens are marked as entities and the relations between them identified. The text analysis solution is connected to a gateway which scans the environment and identifies the main IoT devices and communication technologies. The strength of the approach proposed within this research is that the designed semantic gateway is using context-aware searches in the modeled IoT security database and can identify possible vulnerabilities before they can be exploited.

摘要

本文的目的是通过使用基于命名实体识别(NER)的解决方案,加强物联网(IoT)系统中诊断和检测潜在漏洞的过程。在研究和实践中,安全系统管理专家依赖大量异质的安全数据源,这些数据源通常以自然语言的形式存在。这具有挑战性,因为该过程非常耗时,而且很难跟上安全威胁、漏洞、攻击、对策和风险领域不断出现的发现。所提出的系统被设想为现有漏洞的语义索引解决方案,并作为安全管理专家的信息工具。通过集成所提出的系统,用户可以轻松发现其物联网设备的潜在漏洞。所提出的解决方案集成了本体和NER技术,以便在漏洞和常见暴露知识方面实现高度自动化,达到自我维护和最新的系统。为了实现这一目标,总共识别出312个特定于物联网领域的通用漏洞披露(CVE)。如今,CVE可以说是最重要的网络安全资源之一,包含有关最新发现漏洞的信息。这组数据进一步用作NER模型的数据语料库,该模型旨在识别与物联网安全相关的主要实体和关系。目标是自动监控与物联网相关的网络安全信息,并根据用户需求在有组织和结构化的框架中进行过滤和呈现。特定于物联网安全的分类法通过领域本体来实现,该本体随后用于处理自然语言。相关令牌被标记为实体,并识别它们之间的关系。文本分析解决方案连接到一个网关,该网关扫描环境并识别主要的物联网设备和通信技术。本研究中提出的方法的优势在于,所设计的语义网关在建模的物联网安全数据库中使用上下文感知搜索,并且可以在潜在漏洞被利用之前识别它们。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f775/6695928/87e2cb0f396c/sensors-19-03380-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f775/6695928/f3964ce913da/sensors-19-03380-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f775/6695928/e15b36d143f2/sensors-19-03380-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f775/6695928/18068db645f5/sensors-19-03380-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f775/6695928/34f82ff2ae99/sensors-19-03380-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f775/6695928/fb3614bbf9e2/sensors-19-03380-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f775/6695928/2a4558f092e1/sensors-19-03380-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f775/6695928/2e90945d583a/sensors-19-03380-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f775/6695928/ac848775c184/sensors-19-03380-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f775/6695928/87e2cb0f396c/sensors-19-03380-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f775/6695928/f3964ce913da/sensors-19-03380-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f775/6695928/e15b36d143f2/sensors-19-03380-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f775/6695928/18068db645f5/sensors-19-03380-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f775/6695928/34f82ff2ae99/sensors-19-03380-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f775/6695928/fb3614bbf9e2/sensors-19-03380-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f775/6695928/2a4558f092e1/sensors-19-03380-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f775/6695928/2e90945d583a/sensors-19-03380-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f775/6695928/ac848775c184/sensors-19-03380-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f775/6695928/87e2cb0f396c/sensors-19-03380-g009.jpg

相似文献

1
Named-Entity-Recognition-Based Automated System for Diagnosing Cybersecurity Situations in IoT Networks.基于命名实体识别的物联网网络网络安全态势诊断自动化系统。
Sensors (Basel). 2019 Aug 1;19(15):3380. doi: 10.3390/s19153380.
2
An Ontology-Based Cybersecurity Framework for the Internet of Things.基于本体的物联网网络安全框架。
Sensors (Basel). 2018 Sep 12;18(9):3053. doi: 10.3390/s18093053.
3
Teaching and Learning IoT Cybersecurity andVulnerability Assessment with Shodan through Practical Use Cases.通过实际用例教授和学习物联网网络安全和漏洞评估以及 Shodan 的使用。
Sensors (Basel). 2020 May 27;20(11):3048. doi: 10.3390/s20113048.
4
A Critical Cybersecurity Analysis and Future Research Directions for the Internet of Things: A Comprehensive Review.物联网的关键网络安全分析与未来研究方向:全面综述。
Sensors (Basel). 2023 Apr 19;23(8):4117. doi: 10.3390/s23084117.
5
Developing a Novel Ontology for Cybersecurity in Internet of Medical Things-Enabled Remote Patient Monitoring.开发面向物联网远程患者监测的网络安全新型本体
Sensors (Basel). 2024 Apr 27;24(9):2804. doi: 10.3390/s24092804.
6
An Effective Multifactor Authentication Mechanism Based on Combiners of Hash Function over Internet of Things.一种基于物联网哈希函数组合器的有效多因素认证机制。
Sensors (Basel). 2019 Aug 23;19(17):3663. doi: 10.3390/s19173663.
7
Modified graph-based algorithm to analyze security threats in IoT.用于分析物联网安全威胁的基于图的改进算法。
PeerJ Comput Sci. 2023 Dec 8;9:e1743. doi: 10.7717/peerj-cs.1743. eCollection 2023.
8
Exploring IoT Vulnerabilities in a Comprehensive Remote Cybersecurity Laboratory.在综合性远程网络安全实验室中探索物联网漏洞。
Sensors (Basel). 2023 Nov 20;23(22):9279. doi: 10.3390/s23229279.
9
Guidance Framework for Developing IoT-Enabled Systems' Cybersecurity.物联网系统网络安全开发的指导框架。
Sensors (Basel). 2023 Apr 21;23(8):4174. doi: 10.3390/s23084174.
10
Security at the Edge for Resource-Limited IoT Devices.资源受限物联网设备的边缘安全
Sensors (Basel). 2024 Jan 17;24(2):590. doi: 10.3390/s24020590.

引用本文的文献

1
Improved self-training-based distant label denoising method for cybersecurity entity extractions.用于网络安全实体提取的基于改进自训练的远程标签去噪方法。
PLoS One. 2024 Dec 17;19(12):e0315479. doi: 10.1371/journal.pone.0315479. eCollection 2024.
2
Improved XLNet modeling for Chinese named entity recognition of edible fungus.用于食用菌中文命名实体识别的改进型XLNet模型
Front Plant Sci. 2024 Jun 25;15:1368847. doi: 10.3389/fpls.2024.1368847. eCollection 2024.
3
The Need for Cybersecurity in Industrial Revolution and Smart Cities.

本文引用的文献

1
An Ontology-based Context-aware System for Smart Homes: E-care@home.一种基于本体的智能家居情境感知系统:家庭电子护理。
Sensors (Basel). 2017 Jul 6;17(7):1586. doi: 10.3390/s17071586.
工业革命和智慧城市中的网络安全需求。
Sensors (Basel). 2022 Dec 23;23(1):120. doi: 10.3390/s23010120.