{"id":"https://openalex.org/W4400070555","doi":"https://doi.org/10.1109/tii.2024.3413300","title":"Self-Training of Cyber-Threat Classification Model With Threat-Payload Centric Augmentation","display_name":"Self-Training of Cyber-Threat Classification Model With Threat-Payload Centric Augmentation","publication_year":2024,"publication_date":"2024-06-27","ids":{"openalex":"https://openalex.org/W4400070555","doi":"https://doi.org/10.1109/tii.2024.3413300"},"language":"en","primary_location":{"id":"doi:10.1109/tii.2024.3413300","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2024.3413300","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5082126935","display_name":"Jae\u2010Yeol Kim","orcid":"https://orcid.org/0000-0002-9577-7570"},"institutions":[{"id":"https://openalex.org/I118373667","display_name":"Seoul National University of Science and Technology","ror":"https://ror.org/00chfja07","country_code":"KR","type":"education","lineage":["https://openalex.org/I118373667"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Jae-Yeol Kim","raw_affiliation_strings":["Graduate School of Public Policy and Information Technology, Seoul National University of Science and Technology, Seoul, South Korea"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Graduate School of Public Policy and Information Technology, Seoul National University of Science and Technology, Seoul, South Korea","institution_ids":["https://openalex.org/I118373667"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5057012645","display_name":"Hyuk-Yoon Kwon","orcid":"https://orcid.org/0000-0002-1125-6533"},"institutions":[{"id":"https://openalex.org/I118373667","display_name":"Seoul National University of Science and Technology","ror":"https://ror.org/00chfja07","country_code":"KR","type":"education","lineage":["https://openalex.org/I118373667"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Hyuk-Yoon Kwon","raw_affiliation_strings":["Department of Industrial Engineering/Graduate School of Data Science, Seoul National University of Science and Technology, Seoul, South Korea"],"raw_orcid":"https://orcid.org/0000-0002-1125-6533","affiliations":[{"raw_affiliation_string":"Department of Industrial Engineering/Graduate School of Data Science, Seoul National University of Science and Technology, Seoul, South Korea","institution_ids":["https://openalex.org/I118373667"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5082126935"],"corresponding_institution_ids":["https://openalex.org/I118373667"],"apc_list":null,"apc_paid":null,"fwci":1.0092,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.76618782,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":96},"biblio":{"volume":"20","issue":"10","first_page":"11740","last_page":"11750"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.8718000054359436,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.8718000054359436,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.8131999969482422,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14470","display_name":"Advanced Data Processing Techniques","score":0.8051000237464905,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/payload","display_name":"Payload (computing)","score":0.8681392669677734},{"id":"https://openalex.org/keywords/training","display_name":"Training (meteorology)","score":0.6430951356887817},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6047244668006897},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5883201360702515},{"id":"https://openalex.org/keywords/cyber-threats","display_name":"Cyber threats","score":0.4130710959434509}],"concepts":[{"id":"https://openalex.org/C134066672","wikidata":"https://www.wikidata.org/wiki/Q1424639","display_name":"Payload (computing)","level":3,"score":0.8681392669677734},{"id":"https://openalex.org/C2777211547","wikidata":"https://www.wikidata.org/wiki/Q17141490","display_name":"Training (meteorology)","level":2,"score":0.6430951356887817},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6047244668006897},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5883201360702515},{"id":"https://openalex.org/C3018725008","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber threats","level":2,"score":0.4130710959434509},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C153294291","wikidata":"https://www.wikidata.org/wiki/Q25261","display_name":"Meteorology","level":1,"score":0.0},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tii.2024.3413300","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2024.3413300","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.46000000834465027,"display_name":"Climate action","id":"https://metadata.un.org/sdg/13"}],"awards":[{"id":"https://openalex.org/G2822077284","display_name":null,"funder_award_id":"2019R1A6A1A03032119","funder_id":"https://openalex.org/F4320322120","funder_display_name":"National Research Foundation of Korea"},{"id":"https://openalex.org/G5400673922","display_name":null,"funder_award_id":"2022R1F1A1067008","funder_id":"https://openalex.org/F4320322120","funder_display_name":"National Research Foundation of Korea"}],"funders":[{"id":"https://openalex.org/F4320322120","display_name":"National Research Foundation of Korea","ror":"https://ror.org/013aysd81"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W2744498396","https://openalex.org/W2789410825","https://openalex.org/W2803342829","https://openalex.org/W2806386754","https://openalex.org/W2890507837","https://openalex.org/W2962369866","https://openalex.org/W2963250244","https://openalex.org/W2964189064","https://openalex.org/W2966088506","https://openalex.org/W2987485128","https://openalex.org/W3014091682","https://openalex.org/W3035160371","https://openalex.org/W3087352798","https://openalex.org/W3128456605","https://openalex.org/W3132185256","https://openalex.org/W3174155108","https://openalex.org/W3176588888","https://openalex.org/W3176659256","https://openalex.org/W3179245071","https://openalex.org/W3192854986","https://openalex.org/W3210231570","https://openalex.org/W4205462435","https://openalex.org/W4211223944","https://openalex.org/W4280499264","https://openalex.org/W4281727634","https://openalex.org/W4288058759","https://openalex.org/W4319458147","https://openalex.org/W4319458198","https://openalex.org/W4381847863","https://openalex.org/W4382119126","https://openalex.org/W4386210489","https://openalex.org/W6678885109","https://openalex.org/W6765939562","https://openalex.org/W6768297763"],"related_works":["https://openalex.org/W4396897946","https://openalex.org/W3110311961","https://openalex.org/W3040950835","https://openalex.org/W4386107585","https://openalex.org/W2552246019","https://openalex.org/W2508779374","https://openalex.org/W2972971880","https://openalex.org/W4399917864","https://openalex.org/W4385452110","https://openalex.org/W1153919619"],"abstract_inverted_index":{"Deep":[0],"learning":[1],"(DL)-based":[2],"threat":[3,12,42,46,84,137],"classification":[4,36,85,138],"has":[5],"been":[6],"investigated":[7],"for":[8,34,66,99],"effective":[9],"analysis":[10],"of":[11,83,102,136,143],"events":[13,43],"to":[14,39,69,141,152,159,187],"minimize":[15],"the":[16,40,108,176,182],"human's":[17],"resources":[18],"in":[19,58,171,189],"security":[20,29],"operation":[21],"centers":[22],"(SOC).":[23],"However,":[24],"human-labeling":[25],"(HL)":[26],"by":[27,150,185],"SOC":[28,62,173],"analysts":[30],"is":[31],"still":[32],"necessary":[33],"accurate":[35],"and":[37,54],"responses":[38,68],"unknown":[41],"or":[44],"new":[45,80],"trends.":[47],"This":[48],"labeling":[49,101],"process":[50],"consumes":[51],"significant":[52],"time":[53],"effort,":[55],"posing":[56],"limitations":[57],"constructing":[59],"an":[60],"efficient":[61],"response":[63,164],"system,":[64],"especially":[65],"immediate":[67],"newly":[70,103],"generated":[71],"large-scale":[72],"threats.":[73,105],"To":[74,106],"address":[75],"this,":[76],"we":[77,113,128],"propose":[78],"a":[79,90,115,133],"self-training":[81,91,148],"method":[82,121],"model,":[86],"PLC-TPA.":[87,178],"We":[88],"present":[89,114],"pipeline":[92],"based":[93],"on":[94],"pseudo-labeling":[95],"with":[96,161,175],"confidence":[97],"(PLC)":[98],"automatic":[100],"captured":[104],"resolve":[107],"class":[109],"imbalance":[110],"during":[111],"self-training,":[112],"novel":[116],"threat-payload":[117,123],"centric":[118],"augmentation":[119],"(TPA)":[120],"considering":[122],"characteristics.":[124],"Through":[125],"extensive":[126],"experiments,":[127],"show":[129],"that":[130],"PLC-TPA":[131,155,179],"achieves":[132],"high":[134],"accuracy":[135],"about":[139],"0.973":[140],"0.988":[142],"F1-score,":[144],"which":[145],"improves":[146],"other":[147],"methods":[149,184],"10.9%":[151],"13.4%.":[153],"Notably,":[154],"performs":[156],"comparable":[157],"even":[158],"HL":[160],"significantly":[162],"faster":[163],"times.":[165],"These":[166],"findings":[167],"suggest":[168],"substantial":[169],"improvements":[170],"DL-based":[172],"environments":[174],"proposed":[177],"also":[180],"outperforms":[181],"existing":[183],"8.3%":[186],"17.4%":[188],"comparative":[190],"experiments.":[191]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2}],"updated_date":"2025-12-22T23:10:17.713674","created_date":"2025-10-10T00:00:00"}
