Zhaoyun Ding;Fei Wang;Fan Wu;Lehai Xin;Kai Liu;Deqi Cao
{"title":"Overlapping Entity Relation Extraction for Cybersecurity Based on Complex Tagging and Rule-Enhanced Prompt Learning","authors":"Zhaoyun Ding;Fei Wang;Fan Wu;Lehai Xin;Kai Liu;Deqi Cao","doi":"10.1109/TCCN.2024.3502516","DOIUrl":null,"url":null,"abstract":"Cyberspace security is one of the areas that must be prioritized in the development of the Internet and artificial intelligence. The fourth paradigm of “Pre-train, Prompt, Predict” in the field of natural language processing (NLP) has significantly enhanced NLP efficiency and accuracy by shifting downstream tasks from masked to generative, marking a new leap forward. In the realm of cyberspace security, where information flows are vast and multifaceted, the focus of this paper is on extracting multi-relational information among multiple entities. Based on complex tagging and rule-enhanced prompting learning, this paper proposes a method for extracting overlapping entity relationships in cybersecurity. To address the challenges posed by “overlapping entity relationships” and “nested entities” among multiple entities, we have designed a triple extraction model that integrates complex tagging and rule-enhanced prompting learning. This model is a pipeline consisting of three parts: an entity recognition model, a rule injection module, and a relation classification model. The entity recognition model tackles the “nested entity” problem through a multi-label layer and performs entity classification. Rule injection serves two purposes: constraining possible combinations of knowledge triples and constructing prompting learning templates. These templates are input into the relation classification model, which cleverly utilizes suspended position markers to improve model efficiency and maximize the utilization of global semantic information. Finally, the effectiveness of the model is validated on the general dataset DUIE 2.0 and a self-constructed Chinese cybersecurity dataset of overlapping entity relationships.","PeriodicalId":13069,"journal":{"name":"IEEE Transactions on Cognitive Communications and Networking","volume":"11 2","pages":"1064-1077"},"PeriodicalIF":7.0000,"publicationDate":"2024-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Cognitive Communications and Networking","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10757359/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
引用次数: 0
Abstract
Cyberspace security is one of the areas that must be prioritized in the development of the Internet and artificial intelligence. The fourth paradigm of “Pre-train, Prompt, Predict” in the field of natural language processing (NLP) has significantly enhanced NLP efficiency and accuracy by shifting downstream tasks from masked to generative, marking a new leap forward. In the realm of cyberspace security, where information flows are vast and multifaceted, the focus of this paper is on extracting multi-relational information among multiple entities. Based on complex tagging and rule-enhanced prompting learning, this paper proposes a method for extracting overlapping entity relationships in cybersecurity. To address the challenges posed by “overlapping entity relationships” and “nested entities” among multiple entities, we have designed a triple extraction model that integrates complex tagging and rule-enhanced prompting learning. This model is a pipeline consisting of three parts: an entity recognition model, a rule injection module, and a relation classification model. The entity recognition model tackles the “nested entity” problem through a multi-label layer and performs entity classification. Rule injection serves two purposes: constraining possible combinations of knowledge triples and constructing prompting learning templates. These templates are input into the relation classification model, which cleverly utilizes suspended position markers to improve model efficiency and maximize the utilization of global semantic information. Finally, the effectiveness of the model is validated on the general dataset DUIE 2.0 and a self-constructed Chinese cybersecurity dataset of overlapping entity relationships.
期刊介绍:
The IEEE Transactions on Cognitive Communications and Networking (TCCN) aims to publish high-quality manuscripts that push the boundaries of cognitive communications and networking research. Cognitive, in this context, refers to the application of perception, learning, reasoning, memory, and adaptive approaches in communication system design. The transactions welcome submissions that explore various aspects of cognitive communications and networks, focusing on innovative and holistic approaches to complex system design. Key topics covered include architecture, protocols, cross-layer design, and cognition cycle design for cognitive networks. Additionally, research on machine learning, artificial intelligence, end-to-end and distributed intelligence, software-defined networking, cognitive radios, spectrum sharing, and security and privacy issues in cognitive networks are of interest. The publication also encourages papers addressing novel services and applications enabled by these cognitive concepts.