Research on the Construction of Network Security Attack Detection Model Based on Knowledge Graph

被引:0
|
作者
Qin, Lina [1 ]
机构
[1] Wuhan Business University, Modern Education Technology Center, Wuhan,430056, China
关键词
Compilation and indexing terms; Copyright 2025 Elsevier Inc;
D O I
暂无
中图分类号
学科分类号
摘要
Computer viruses - Data mining - Deep learning - Graph theory - Intrusion detection - Knowledge management - Learning algorithms - Natural language processing systems - Semantics - Zero-day attack
引用
收藏
页码:596 / 603
相关论文
共 50 条
  • [21] RESEARCH ON SECURITY EVALUATION OF CLOUD COMPUTING BASED ON ATTACK GRAPH
    Cheng, Yexia
    Du, Yuejin
    Xu, Junfeng
    Yuan, Chunyang
    Xue, Zhi
    [J]. 2012 IEEE 2ND INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENT SYSTEMS (CCIS) VOLS 1-3, 2012, : 459 - 465
  • [22] Network Security Situation Assessment Methods and Tactics Based on Multivariate Spatiotemporal Attack Graph Model
    Zhou, Anshun
    Huo, Mingde
    [J]. 20TH INT CONF ON UBIQUITOUS COMP AND COMMUNICAT (IUCC) / 20TH INT CONF ON COMP AND INFORMATION TECHNOLOGY (CIT) / 4TH INT CONF ON DATA SCIENCE AND COMPUTATIONAL INTELLIGENCE (DSCI) / 11TH INT CONF ON SMART COMPUTING, NETWORKING, AND SERV (SMARTCNS), 2021, : 541 - 548
  • [23] Research on Defense Model and Detection of Abnormal Characteristics of Network Attack Based on
    Zhao, Xiu Mei
    [J]. FRONTIERS OF MANUFACTURING SCIENCE AND MEASURING TECHNOLOGY V, 2015, : 577 - 581
  • [24] Object detection based on knowledge graph network
    Li, Jianping
    Tan, Guozhen
    Ke, Xiao
    Si, Huaiwei
    Peng, Yanfei
    [J]. APPLIED INTELLIGENCE, 2023, 53 (12) : 15045 - 15066
  • [25] Object detection based on knowledge graph network
    Jianping Li
    Guozhen Tan
    Xiao Ke
    Huaiwei Si
    Yanfei Peng
    [J]. Applied Intelligence, 2023, 53 : 15045 - 15066
  • [26] Implementing Network Attack Detection with a Novel NSSA Model Based on Knowledge Graphs
    Wang, Yixuan
    Li, Yujun
    Chen, Xiang
    Luo, Yeni
    [J]. 2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1727 - 1732
  • [27] Analysis of Attack Graph-based Metrics for Quantification of Network Security
    Kundu, Arkadeep
    Ghosh, Nirnay
    Chokshi, Ishan
    Ghosh, Soumya K.
    [J]. 2012 ANNUAL IEEE INDIA CONFERENCE (INDICON), 2012, : 530 - 535
  • [28] Research and Construction of Semantic Retrieval based on Knowledge Graph
    Kou, Yuantao
    Huang, Yongwen
    Li, Jiao
    Xian, Guojian
    [J]. 2018 5TH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CONTROL ENGINEERING (ICISCE 2018), 2018, : 423 - 430
  • [29] Computer network security evaluation method based on improved attack graph
    Li, Zhaocui
    Liu, Huichuan
    Wu, Chunyan
    [J]. Journal of Cyber Security Technology, 2022, 6 (04) : 201 - 215
  • [30] Evaluation of Network Risk Using Attack Graph Based Security Metrics
    Kumar, Santosh
    Negi, Anuradha
    Prasad, Keshav
    Mahanti, Aniket
    [J]. 2016 IEEE 14TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 14TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 2ND INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/DATACOM/CYBERSC, 2016, : 91 - 93