Threat intelligence attribution method based on graph attention mechanism

被引:0
|
作者
Wang, Ting [1 ,2 ]
Yan, Hanbing [2 ]
Lang, Bo [1 ]
机构
[1] School of Computer Science and Engineering, Beihang University, Beijing,100191, China
[2] National Computer Network Emergency Response Technical Team, Coordination Center of China, Beijing,100029, China
关键词
D O I
10.13700/j.bh.1001-5965.2022.0590
中图分类号
学科分类号
摘要
Knowledge graph
引用
收藏
页码:2293 / 2303
相关论文
共 50 条
  • [1] A heterogeneous graph-based approach for cyber threat attribution using threat intelligence
    Duan, Junting
    Luo, Yujie
    Zhang, Zhicheng
    Peng, Jianjian
    2024 16TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND COMPUTING, ICMLC 2024, 2024, : 87 - 93
  • [2] Framework of Cyber Attack Attribution Based on Threat Intelligence
    Li Qiang
    Yang Zeming
    Liu Baoxu
    Jiang Zhengwei
    Yan Jian
    INTEROPERABILITY, SAFETY AND SECURITY IN IOT, 2017, 190 : 92 - 103
  • [3] A trajectory prediction method based on graph attention mechanism
    Zhou H.
    Zhao T.
    Fang Y.
    Liu Q.
    Applied Mathematics and Nonlinear Sciences, 2024, 9 (01)
  • [4] NO-DOUBT: Attack Attribution Based On Threat Intelligence Reports
    Perry, Lior
    Shapira, Bracha
    Puzis, Rami
    2019 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2019, : 80 - 85
  • [5] GAFM: A Knowledge Graph Completion Method Based on Graph Attention Faded Mechanism
    Ma, Jiangtao
    Li, Duanyang
    Zhu, Haodong
    Li, Chenliang
    Zhang, Qiuwen
    Qiao, Yaqiong
    Information Processing and Management, 2022, 59 (05):
  • [6] GAFM: A Knowledge Graph Completion Method Based on Graph Attention Faded Mechanism
    Ma, Jiangtao
    Li, Duanyang
    Zhu, Haodong
    Li, Chenliang
    Zhang, Qiuwen
    Qiao, Yaqiong
    INFORMATION PROCESSING & MANAGEMENT, 2022, 59 (05)
  • [7] Association Analysis Of Cyber-Attack Attribution Based On Threat Intelligence
    Li, Qiang
    Yang, Zeming
    Jiang, Zhengwei
    Liu, Baoxu
    Fu, Yuxia
    PROCEEDINGS OF THE 2017 2ND JOINT INTERNATIONAL INFORMATION TECHNOLOGY, MECHANICAL AND ELECTRONIC ENGINEERING CONFERENCE (JIMEC 2017), 2017, 62 : 222 - 230
  • [8] Construction of advanced persistent threat attack detection model based on provenance graph and attention mechanism
    Li Y.
    Luo H.
    Wang X.
    Yuan J.
    Tongxin Xuebao/Journal on Communications, 2024, 45 (03): : 117 - 130
  • [9] Vehicle Trajectory Prediction Method Based on Graph Models and Attention Mechanism
    Lian J.
    Ding R.
    Li L.
    Wang X.
    Zhou Y.
    Binggong Xuebao/Acta Armamentarii, 2023, 44 (07): : 2162 - 2170
  • [10] Time Series Attention Based Transformer Neural Turing Machines for Diachronic Graph Embedding in Cyber Threat Intelligence
    Song, Binghua
    Chen, Rong
    Liu, Baoxu
    Jiang, Zhengwei
    Wang, Xuren
    COMPUTATIONAL SCIENCE, ICCS 2022, PT IV, 2022, : 17 - 30