Cyber Threat Intelligence Automation Using AI in the Financial Sector

Authors

  • Chaitanya Appani

Keywords:

Refactoring

Abstract

The cyber threats affecting the financial sector have become more advanced and need swift, automated threat intelligence. This article dwells upon the power of Artificial Intelligence, specifically Natural Language Processing (NLP) and Knowledge Graphs (KGs) to change Cyber Threat Intelligence (CTI) in banking. We experiment with entity-relation extraction, report generation and graph-based correlation with Large Language Models (LLMs). Such methods as AGIR, AttacKG, and K-CTIAA are techniques that automate CTI analysis with substantial improvements in performance. Experimental findings: The F1-scores are improved, and the time used in report generation reduced by up to 40 percent. In our research work, we have shown how AI-based CTI can help provide real-time structured threat information to empower FI to proactively reduce cyber risk effectively.

DOI: https://doi.org/10.17762/ijisae.v12i23s.7760

Downloads

Download data is not yet available.

References

Perrina, F., Marchiori, F., Conti, M., & Verde, N. V. (2023). AGIR: Automating Cyber Threat Intelligence Reporting with Natural Language Generation. arXiv (Cornell University). https://doi.org/10.48550/arxiv.2310.02655

Jo, H., Lee, Y., & Shin, S. (2022). Vulcan: Automatic extraction and analysis of cyber threat intelligence from unstructured text. Computers & Security, 120, 102763. https://doi.org/10.1016/j.cose.2022.102763

Li, Z., Zeng, J., Chen, Y., & Liang, Z. (2021). AttacKG: Constructing Technique Knowledge Graph from Cyber Threat Intelligence Reports. arXiv (Cornell University). https://doi.org/10.48550/arxiv.2111.07093

Wang, S., Sun, X., Li, X., Ouyang, R., Wu, F., Zhang, T., Li, J., & Wang, G. (2023). GPT-NER: Named Entity Recognition via large Language models. arXiv (Cornell University). https://doi.org/10.48550/arxiv.2304.10428

Mittal, S., Joshi, A., & Finin, T. (2019). Cyber-All-Intel: An AI for Security related Threat Intelligence. arXiv (Cornell University). https://doi.org/10.48550/arxiv.1905.02895

Liu, J., Yan, J., Jiang, J., He, Y., Wang, X., Jiang, Z., Yang, P., & Li, N. (2022). TriCTI: an actionable cyber threat intelligence discovery system via trigger-enhanced neural network. Cybersecurity, 5(1). https://doi.org/10.1186/s42400-022-00110-3

Nicola, G., Cerchiello, P., & Aste, T. (2020). Information network modeling for U.S. banking Systemic risk. Entropy, 22(11), 1331. https://doi.org/10.3390/e22111331

Li, Z., Li, Y., Liu, Y., Liu, C., & Zhou, N. (2023). K-CTIAA: Automatic Analysis of Cyber Threat intelligence based on a knowledge Graph. Symmetry, 15(2), 337. https://doi.org/10.3390/sym15020337

Zhang, W., Paudel, B., Wang, L., Chen, J., Zhu, H., Zhang, W., Bernstein, A., & Chen, H. (2019). Iteratively learning embeddings and rules for knowledge graph reasoning. arXiv (Cornell University). https://doi.org/10.48550/arxiv.1903.08948

Felzmann, H., Fosch-Villaronga, E., Lutz, C., & Tamò-Larrieux, A. (2020). Towards transparency by design for artificial intelligence. Science and Engineering Ethics, 26(6), 3333–3361. https://doi.org/10.1007/s11948-020-00276-4

Downloads

Published

29.11.2024

How to Cite

Chaitanya Appani. (2024). Cyber Threat Intelligence Automation Using AI in the Financial Sector. International Journal of Intelligent Systems and Applications in Engineering, 12(23s), 3452 –. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/7760

Issue

Section

Research Article

Similar Articles

You may also start an advanced similarity search for this article.