Research Article

A Threat Intelligence Analysis Method Based on Feature Weighting and BERT-BiGRU for Industrial Internet of Things

Table 1

Some attack types of CAPEC.

AttackLikelihood of attackTypical severityResources required

CAPEC-94: man-in-the-middle attackHighVery highTwo components are communicating with each other. The communication occurs in clear (not encrypted) or with insufficient and deceivable encryption.
CAPEC-125: floodingHighMediumA script or program capable of generating more requests than the target can handle, or a network or cluster of objects can make simultaneous requests.
CAPEC-163: spear phishingHighHighAn adversary must have the ability to communicate their phishing scheme to the victims (via email and instant message), as well as a website or other platforms for victims to enter personal information into.
... ...... ...... ...... ...