From Text to MITRE Techniques: Exploring the Malicious Use of Large Language Models for Generating Cyber Attack Payloads.
P. V. Sai CharanHrushikesh ChunduriP. Mohan AnandSandeep K. ShuklaPublished in: CoRR (2023)
Keyphrases
- language model
- information retrieval
- cyber attacks
- language modeling
- document level
- n gram
- document retrieval
- probabilistic model
- speech recognition
- retrieval model
- text retrieval
- language modelling
- cyber security
- test collection
- statistical language models
- query expansion
- text mining
- attack detection
- web documents
- vector space model
- relevance model
- countermeasures
- smoothing methods
- language models for information retrieval
- document ranking
- text documents
- keywords
- translation model
- okapi bm
- pseudo relevance feedback
- intrusion detection
- spoken term detection
- smart grid
- distributed systems
- information systems