SecTKG: A Knowledge Graph for Open-Source Security Tools

被引:0
|
作者
Sun, Siqi [1 ]
Huang, Cheng [1 ,2 ]
Wu, Tiejun [3 ]
Shen, Yi [2 ]
机构
[1] Sichuan Univ, Sch Cyber Sci & Engn, Chengdu 610065, Peoples R China
[2] Anhui Prov Key Lab Cyberspace Secur Situat Awarene, Hefei 230037, Peoples R China
[3] NSFOCUS Technol Grp Co Ltd, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
CYBER THREAT INTELLIGENCE; DEVELOPER RECOMMENDATION; ATTACKS;
D O I
10.1155/2023/4464974
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As the complexity of cyberattacks continues to increase, multistage combination attacks have become the primary method of attack. Attackers plan and organize a series of attack steps, using various attack tools to achieve specific goals. Extracting knowledge about these tools is of great significance for both defense and tracing of attacks. We have noticed that there is a wealth of security tool-related knowledge within the open-source community, but research in this area is limited. It is challenging to achieve large-scale automated security tool information extraction. To address this, we propose automated knowledge graph construction architecture, named SecTKG, for open-source security tools. Our approach involves designing a security tool ontology model to describe tools, users, and relationships, which guides the extraction of security tool knowledge. In addition, we develop advanced entity recognition and classification methods, ensuring efficient and accurate knowledge extraction. As far as we know, this work is the first to construct the large-scale security tool knowledge graph, containing 4 million entities and 10 million relationships. Furthermore, we investigate the tendencies and particularities of security tools based on the SecTKG and developed a security tool influence-measuring application. The research fills a gap in the field of automated security tools' knowledge extraction and provides a foundation for future research and practical applications.
引用
收藏
页数:22
相关论文
共 50 条
  • [41] Developments in open-source tools for microwave breast imaging
    O'Loughlin, Declan
    2024 18TH EUROPEAN CONFERENCE ON ANTENNAS AND PROPAGATION, EUCAP, 2024,
  • [42] IoT Design Course using Open-Source Tools
    Papaefstathiou, Ioannis
    PROCEEDINGS OF 2016 IEEE GLOBAL ENGINEERING EDUCATION CONFERENCE (EDUCON2016), 2016, : 114 - 118
  • [43] Comparison of open-source runtime testing tools for microservices
    Sotomayor, Juan P.
    Allala, Sai Chaithra
    Santiago, Dionny
    King, Tariq M.
    Clarke, Peter J.
    SOFTWARE QUALITY JOURNAL, 2023, 31 (01) : 55 - 87
  • [44] Design of a SCADA System Based on Open-Source Tools
    Silva, Fernanda M. Q.
    Cardoso Filho, Braz J.
    Pires, Igor A.
    Maia, Thales A. C.
    2021 14TH IEEE INTERNATIONAL CONFERENCE ON INDUSTRY APPLICATIONS (INDUSCON), 2021, : 1323 - 1328
  • [45] Open-Source tools in R for forestry and forest ecology
    Atkins, Jeff W.
    Stovall, Atticus E. L.
    Silva, Carlos Alberto
    FOREST ECOLOGY AND MANAGEMENT, 2022, 503
  • [46] Disseminating Architectural Knowledge on Open-Source Projects A Case Study of the Book "Architecture of Open-Source Applications"
    Robillard, Martin P.
    Medvidovic, Nenad
    2016 IEEE/ACM 38TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2016, : 476 - 487
  • [47] Open-Source Tools for the Fabrication and Characterization of Organic Electronics
    Butscher, Julian F.
    Kwon, Seonil
    Popczyk, Anna
    Gather, Malte C.
    ADVANCED ELECTRONIC MATERIALS, 2024,
  • [48] An Empirical Investigation of the Security Weaknesses in Open-Source Projects
    Al-Shammare, Haifa
    Al-Otaiby, Nehal
    Al-Otabi, Muradi
    Alshayeb, Mohammad
    ACM International Conference Proceeding Series, : 634 - 642
  • [49] VulinOSS: A Dataset of Security Vulnerabilities in Open-source Systems
    Gkortzis, Antonios
    Mitropoulos, Dimitris
    Spinellis, Diomidis
    2018 IEEE/ACM 15TH INTERNATIONAL CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR), 2018, : 18 - 21
  • [50] The Prisoner's Dilemma of Open-Source Software Security
    Koch, Christian
    COMPUTER, 2024, 57 (10) : 82 - 85