Confidential — Stefan Michaelcheck Only

ACTIC: A Large Language Model‐Based Method for Threat Intelligence Perception

2026graph constructionincrementalsystem

Changcheng Liu, Jun Ma, Changheng Yang

IET Communications

https://doi.org/10.1049/cmu2.70162OpenAlex: W7155037669
2
URLs Found
0
Internal Citations
3
Authors
usable
Abstract Quality
GPT-5.5 Abstract Analysis

Problems Identified (5)

Inefficient threat intelligence analysis: Conventional threat intelligence analysis methods have low processing efficiency for increasingly complex and stealthy cyber-attacks.

Limited semantic comprehension: Conventional threat intelligence analysis methods have limited semantic comprehension.

Heterogeneous dynamic data adaptation: Conventional threat intelligence analysis methods struggle to adapt to dynamic, multi-source, heterogeneous data.

Threat intelligence awareness enhancement: The study addresses the need to enhance threat intelligence awareness.

Inefficient threat intelligence analysis: Conventional threat intelligence analysis methods have low processing efficiency for increasingly complex and stealthy cyber-attacks.

Proposed Solutions (5)

ACTIC LLM-based threat intelligence KG construction: ACTIC is an automated method that constructs a threat intelligence knowledge graph using large language models.

DeepSeek LoRA information extraction: The approach uses a locally deployed DeepSeek-32B model with prompt engineering and LoRA fine-tuning to extract entities, relationships, and attack steps from unstructured reports.

Dual-layer threat and attack knowledge graph: ACTIC produces a dual-layer knowledge graph comprising a Threat Intelligence Knowledge Graph and an Attack Knowledge Graph.

ATT&CK-based TTP classification and recommendations: ACTIC incorporates the ATT&CK framework for TTP classification and supports threat search and protective recommendation generation.

ACTIC LLM-based threat intelligence KG construction: ACTIC is an automated method that constructs a threat intelligence knowledge graph using large language models.

Results (3)

Improved entity recognition and relation extraction F1:

Improved TTP classification F1:

Applicable local cybersecurity LLM deployment:

Research Domain

Cybersecurity threat intelligence analysis

← Back to all papers