Cyber Threat Intelligence Automation Using AI in the Financial Sector
Keywords:
RefactoringAbstract
The cyber threats affecting the financial sector have become more advanced and need swift, automated threat intelligence. This article dwells upon the power of Artificial Intelligence, specifically Natural Language Processing (NLP) and Knowledge Graphs (KGs) to change Cyber Threat Intelligence (CTI) in banking. We experiment with entity-relation extraction, report generation and graph-based correlation with Large Language Models (LLMs). Such methods as AGIR, AttacKG, and K-CTIAA are techniques that automate CTI analysis with substantial improvements in performance. Experimental findings: The F1-scores are improved, and the time used in report generation reduced by up to 40 percent. In our research work, we have shown how AI-based CTI can help provide real-time structured threat information to empower FI to proactively reduce cyber risk effectively.
Downloads
References
Perrina, F., Marchiori, F., Conti, M., & Verde, N. V. (2023). AGIR: Automating Cyber Threat Intelligence Reporting with Natural Language Generation. arXiv (Cornell University). https://doi.org/10.48550/arxiv.2310.02655
Jo, H., Lee, Y., & Shin, S. (2022). Vulcan: Automatic extraction and analysis of cyber threat intelligence from unstructured text. Computers & Security, 120, 102763. https://doi.org/10.1016/j.cose.2022.102763
Li, Z., Zeng, J., Chen, Y., & Liang, Z. (2021). AttacKG: Constructing Technique Knowledge Graph from Cyber Threat Intelligence Reports. arXiv (Cornell University). https://doi.org/10.48550/arxiv.2111.07093
Wang, S., Sun, X., Li, X., Ouyang, R., Wu, F., Zhang, T., Li, J., & Wang, G. (2023). GPT-NER: Named Entity Recognition via large Language models. arXiv (Cornell University). https://doi.org/10.48550/arxiv.2304.10428
Mittal, S., Joshi, A., & Finin, T. (2019). Cyber-All-Intel: An AI for Security related Threat Intelligence. arXiv (Cornell University). https://doi.org/10.48550/arxiv.1905.02895
Liu, J., Yan, J., Jiang, J., He, Y., Wang, X., Jiang, Z., Yang, P., & Li, N. (2022). TriCTI: an actionable cyber threat intelligence discovery system via trigger-enhanced neural network. Cybersecurity, 5(1). https://doi.org/10.1186/s42400-022-00110-3
Nicola, G., Cerchiello, P., & Aste, T. (2020). Information network modeling for U.S. banking Systemic risk. Entropy, 22(11), 1331. https://doi.org/10.3390/e22111331
Li, Z., Li, Y., Liu, Y., Liu, C., & Zhou, N. (2023). K-CTIAA: Automatic Analysis of Cyber Threat intelligence based on a knowledge Graph. Symmetry, 15(2), 337. https://doi.org/10.3390/sym15020337
Zhang, W., Paudel, B., Wang, L., Chen, J., Zhu, H., Zhang, W., Bernstein, A., & Chen, H. (2019). Iteratively learning embeddings and rules for knowledge graph reasoning. arXiv (Cornell University). https://doi.org/10.48550/arxiv.1903.08948
Felzmann, H., Fosch-Villaronga, E., Lutz, C., & Tamò-Larrieux, A. (2020). Towards transparency by design for artificial intelligence. Science and Engineering Ethics, 26(6), 3333–3361. https://doi.org/10.1007/s11948-020-00276-4
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.