Research Article
EX-Action: Automatically Extracting Threat Actions from Cyber Threat Intelligence Report Based on Multimodal Learning
Algorithm 1
Threat actions identification.
| | Require: | | Input: | | Training Set: ; is the candidate action of machine identification, is the action feature value, which contains 9 values | | is the action of manual extraction | | Base classification learners: | | : | | for each do | | for each do | | is the predicted value of action in the Base classification Learners | | end for | | is the weighted of action in the Base classification Learners | | if is the action weight, is the optimal voting threshold then | | is the selected action set | | is the similarity of the action between the ground truth and machine identification | | end if | | if is the optimal similarity threshold then | | is correct action | | end if | | end for | | Output: |
|