A Compact Vulnerability Knowledge Graph for Risk Assessment

被引:2
|
作者
Yin, Jiao [1 ]
Hong, Wei [2 ]
Wang, Hua [1 ]
Cao, Jinli [3 ]
Miao, Yuan [1 ]
Zhang, Yanchun [1 ]
机构
[1] Victoria Univ, Inst Sustainable Ind & Liveable Cities, Melbourne, Vic, Australia
[2] Chongqing Univ Arts & Sci, Sch Artificial Intelligence, Chongqing, Peoples R China
[3] La Trobe Univ, Dept Comp Sci & Informat Technol, Melbourne, Vic, Australia
关键词
Knowledge graph; vulnerability risk assessment; vulnerability co-exploitation; link prediction;
D O I
10.1145/3671005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software vulnerabilities, also known as flaws, bugs or weaknesses, are common in modern informationsystems, putting critical data of organizations and individuals at cyber risk. Due to the scarcity of resources,initial risk assessment is becoming a necessary step to prioritize vulnerabilities and make better decisions onremediation, mitigation, and patching. Datasets containing historical vulnerability information are crucialdigital assets to enable AI-based risk assessments. However, existing datasets focus on collecting informationon individual vulnerabilities while simply storing them in relational databases, disregarding their structuralconnections. This article constructs a compact vulnerability knowledge graph, VulKG, containing over 276 Knodes and 1 M relationships to represent the connections between vulnerabilities, exploits, affected products,vendors, referred domain names, and more. We provide a detailed analysis of VulKG modeling and construction,demonstrating VulKG-based query and reasoning, and providing a use case of applying VulKG to a vulnerabilityrisk assessment task, i.e., co-exploitation behavior discovery. Experimental results demonstrate the value ofgraph connections in vulnerability risk assessment tasks. VulKG offers exciting opportunities for more noveland significant research in areas related to vulnerability risk assessment.
引用
收藏
页数:1
相关论文
共 50 条
  • [1] Unknown Vulnerability Risk Assessment Based on Directed Graph Models: A Survey
    He, Wenhao
    Li, Hongjiao
    Li, Jinguo
    IEEE ACCESS, 2019, 7 : 168201 - 168225
  • [2] A novel network risk assessment method based on vulnerability correlation graph
    Liu Guqing
    Wang Xintong
    Yang Jungang
    Kang Jie
    2014 IEEE WORKSHOP ON ELECTRONICS, COMPUTER AND APPLICATIONS, 2014, : 31 - 34
  • [3] Risk assessment for autonomous navigation system based on knowledge graph
    Zhang, Zizhao
    Chen, Yiwen
    Yang, Xinyue
    Sun, Liping
    Kang, Jichuan
    OCEAN ENGINEERING, 2024, 313
  • [4] UrbanFloodKG: An Urban Flood Knowledge Graph System for Risk Assessment
    Wang, Yu
    Ye, Feng
    Li, Binquan
    Jin, Gaoyang
    Xu, Dong
    Li, Fengsheng
    PROCEEDINGS OF THE 32ND ACM INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, CIKM 2023, 2023, : 2574 - 2584
  • [5] Research on airspace security risk assessment technology based on knowledge Graph
    Yang, Ying
    Huang, Chenghao
    Zhang, Hongbo
    Feng, Chaohui
    Wang, Zhisen
    Cui, Zhe
    2021 21ST INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C 2021), 2021, : 980 - 986
  • [6] Improving Risk Assessment of Miscarriage During Pregnancy with Knowledge Graph Embeddings
    Tissot, Hegler C.
    Pedebos, Lucas A.
    JOURNAL OF HEALTHCARE INFORMATICS RESEARCH, 2021, 5 (04) : 359 - 381
  • [7] Improving Risk Assessment of Miscarriage During Pregnancy with Knowledge Graph Embeddings
    Hegler C. Tissot
    Lucas A. Pedebos
    Journal of Healthcare Informatics Research, 2021, 5 : 359 - 381
  • [8] Refining Traceability Links Between Vulnerability and Software Component in a Vulnerability Knowledge Graph
    Du, Dongdong
    Ren, Xingzhang
    Wu, Yupeng
    Chen, Jien
    Ye, Wei
    Sun, Jinan
    Xi, Xiangyu
    Gao, Qing
    Zhang, Shikun
    WEB ENGINEERING, ICWE 2018, 2018, 10845 : 33 - 49
  • [9] IoV Vulnerability Classification Algorithm Based on Knowledge Graph
    Wang, Jiuru
    Wang, Yifang
    Song, Jingcheng
    Cheng, Hongyuan
    ELECTRONICS, 2023, 12 (23)
  • [10] Design and Implementation of Vulnerability Platform Based on Knowledge Graph
    Chen, Yujie
    Huang, Zaiqi
    Cao, Xudong
    Li, Xuejun
    Zhang, Yuqing
    2024 IEEE ANNUAL CONGRESS ON ARTIFICIAL INTELLIGENCE OF THING, AIOT 2024, 2024, : 99 - 104