A Compact Vulnerability Knowledge Graph for Risk Assessment

被引:2
|
作者
Yin, Jiao [1 ]
Hong, Wei [2 ]
Wang, Hua [1 ]
Cao, Jinli [3 ]
Miao, Yuan [1 ]
Zhang, Yanchun [1 ]
机构
[1] Victoria Univ, Inst Sustainable Ind & Liveable Cities, Melbourne, Vic, Australia
[2] Chongqing Univ Arts & Sci, Sch Artificial Intelligence, Chongqing, Peoples R China
[3] La Trobe Univ, Dept Comp Sci & Informat Technol, Melbourne, Vic, Australia
关键词
Knowledge graph; vulnerability risk assessment; vulnerability co-exploitation; link prediction;
D O I
10.1145/3671005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software vulnerabilities, also known as flaws, bugs or weaknesses, are common in modern informationsystems, putting critical data of organizations and individuals at cyber risk. Due to the scarcity of resources,initial risk assessment is becoming a necessary step to prioritize vulnerabilities and make better decisions onremediation, mitigation, and patching. Datasets containing historical vulnerability information are crucialdigital assets to enable AI-based risk assessments. However, existing datasets focus on collecting informationon individual vulnerabilities while simply storing them in relational databases, disregarding their structuralconnections. This article constructs a compact vulnerability knowledge graph, VulKG, containing over 276 Knodes and 1 M relationships to represent the connections between vulnerabilities, exploits, affected products,vendors, referred domain names, and more. We provide a detailed analysis of VulKG modeling and construction,demonstrating VulKG-based query and reasoning, and providing a use case of applying VulKG to a vulnerabilityrisk assessment task, i.e., co-exploitation behavior discovery. Experimental results demonstrate the value ofgraph connections in vulnerability risk assessment tasks. VulKG offers exciting opportunities for more noveland significant research in areas related to vulnerability risk assessment.
引用
收藏
页数:1
相关论文
共 50 条
  • [31] Knowledge graph driven credit risk assessment for micro, small and medium-sized enterprises
    Mitra, Rony
    Dongre, Ayush
    Dangare, Piyush
    Goswami, Adrijit
    Tiwari, Manoj Kumar
    INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH, 2024, 62 (12) : 4273 - 4289
  • [32] Using text mining to establish knowledge graph from accident/incident reports in risk assessment
    Liu, Chang
    Yang, Shiwu
    EXPERT SYSTEMS WITH APPLICATIONS, 2022, 207
  • [33] Novel Perspectives and Applications of Knowledge Graph Embeddings: From Link Prediction to Risk Assessment and Explainability
    Tissot, Hegler C.
    RESEARCH CHALLENGES IN INFORMATION SCIENCE (RCIS 2021), 2021, 415 : 91 - 106
  • [34] From liquidity risk to systemic risk: A use of knowledge graph
    Chen, Ren-Raw
    Zhang, Xiaohu
    JOURNAL OF FINANCIAL STABILITY, 2024, 70
  • [35] Scalable Attack Graph for Risk Assessment
    Lee, Jehyun
    Lee, Heejo
    In, Hoh Peter
    ICOIN: 2009 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, 2009, : 78 - 82
  • [36] Combining Graph Neural Networks With Expert Knowledge for Smart Contract Vulnerability Detection
    Liu, Zhenguang
    Qian, Peng
    Wang, Xiaoyang
    Zhuang, Yuan
    Qiu, Lin
    Wang, Xun
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2023, 35 (02) : 1296 - 1310
  • [37] A knowledge graph for the vulnerability of construction safety system in megaprojects based on accident inversion
    Yang, Yingliu
    Xiang, Pengcheng
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2025, 150
  • [38] Drought hazard, vulnerability, and risk assessment in Turkey
    Dabanli, Ismail
    ARABIAN JOURNAL OF GEOSCIENCES, 2018, 11 (18)
  • [39] Implementation of an integrated vulnerability and risk assessment model
    Natainia S. Lummen
    Fumihiko Yamada
    Natural Hazards, 2014, 73 : 1085 - 1117
  • [40] Open Source Software Vulnerability Propagation Analysis Algorithm based on Knowledge Graph
    Hu, Wenhui
    Wang, Yu
    Liu, Xueyang
    Sun, Jinan
    Gao, Qing
    Huang, Yu
    4TH IEEE INTERNATIONAL CONFERENCE ON SMART CLOUD (SMARTCLOUD 2019) / 3RD INTERNATIONAL SYMPOSIUM ON REINFORCEMENT LEARNING (ISRL 2019), 2019, : 121 - 127