Knowledge graph reasoning for cyber attack detection

被引:2
|
作者
Gilliard, Ezekia [1 ,2 ]
Liu, Jinshuo [1 ]
Aliyu, Ahmed Abubakar [1 ]
机构
[1] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan City, Hubei, Peoples R China
[2] Mwalimu Nyerere Univ Agr & Technol, Coll Comp Engn, Musoma, Mara, Tanzania
关键词
cyberattack detection; knowledge graph reasoning; network attack recognition; network security; INTRUSION DETECTION; MODEL;
D O I
10.1049/cmu2.12736
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In today's digital landscape, cybercriminals are constantly evolving their tactics, making it challenging for traditional cybersecurity methods to keep up. To address this issue, this study explores the potential of knowledge graph reasoning as a more adaptable and sophisticated approach to identify and counter network attacks. By leveraging graph structures imbued with human-like thinking, this method enhances the resilience of cybersecurity systems. The study focuses on three critical aspects: data preparation, semantic foundations, and knowledge graph inference techniques. Through an in-depth analysis of these components, the research aims to reveal how knowledge graph reasoning can improve cyberattack detection and enhance the overall efficacy of cybersecurity measures, including intrusion detection systems. The proposed approach has undergone extensive experimentation to validate its effectiveness compared to existing methods. The results of the experiment have shown a remarkable advancement in accuracy, speed, and recall for recognition, surpassing current methods. This achievement is a notable contribution in the realm of managing big data in cybersecurity. The study establishes a foundation for the automation of network attack detection, ultimately enhancing overall network security. In our interconnected world, cyber threats continuously evolve, presenting unprecedented challenges to cybersecurity. Conventional methods such as anomaly-based and feature-based approaches are encountering limitations and proving inadequate. The utilization of knowledge graph reasoning, leveraging graph structures, emerges as a promising paradigm shift in the landscape of cyberattack detection. This scholarly work delves into contemporary cybersecurity research, examining the potential of knowledge graph reasoning and proposing an innovative methodology with three principal objectives: optimizing data preparation for knowledge graph embedding models, establishing semantic foundations for network analysis via the system state graph ontology, and elevating network attack recognition through knowledge graph inference techniques. The study conducts experiments, comparing the proposed approach against existing methodologies, and demonstrates its efficacy in addressing the challenges associated with the escalating volume of network data. This approach signifies a promising trajectory towards automating network attack recognition and fortifying network security by seamlessly integrating knowledge graphs. image
引用
收藏
页码:297 / 308
页数:12
相关论文
共 50 条
  • [21] Iterative Reasoning over Knowledge Graph
    Xu, Liang
    Yao, Junjie
    [J]. DATABASE SYSTEMS FOR ADVANCED APPLICATIONS (DASFAA 2021), PT I, 2021, 12681 : 191 - 206
  • [22] Knowledge Graph Reasoning with Relational Digraph
    Zhang, Yongqi
    Yao, Quanming
    [J]. PROCEEDINGS OF THE ACM WEB CONFERENCE 2022 (WWW'22), 2022, : 912 - 924
  • [23] Knowledge Graph Reasoning and Its Applications
    Liu, Lihui
    Tong, Hanghang
    [J]. PROCEEDINGS OF THE 29TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, KDD 2023, 2023, : 5813 - 5814
  • [24] Cyber-Attack Behavior Knowledge Graph Based on CAPEC and CWE Towards 6G
    Wang, Weilin
    Zhou, Huachun
    Li, Kun
    Tu, Zhe
    Liu, Feiyang
    [J]. MOBILE INTERNET SECURITY, MOBISEC 2021, 2022, 1544 : 352 - 364
  • [25] A Joint Knowledge Graph Reasoning Method
    Yang, Wenqing
    Li, Xiaochao
    Wang, Peng
    Hou, Jun
    Li, Qianmu
    Zhang, Nan
    [J]. 2022 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH), 2022, : 646 - 651
  • [26] Research on Power Cyber-Physical Cross-Domain Attack Paths Based on Graph Knowledge
    Qiu, Shenjian
    Shao, Zhipeng
    Wang, Jian
    Xu, Shiyou
    Fei, Jiaxuan
    [J]. APPLIED SCIENCES-BASEL, 2024, 14 (14):
  • [27] On the Security Risks of Knowledge Graph Reasoning
    Xi, Zhaohan
    Du, Tianyu
    Li, Changjiang
    Pang, Ren
    Ji, Shouling
    Luo, Xiapu
    Xiao, Xusheng
    Ma, Fenglong
    Wang, Ting
    [J]. PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 3259 - 3276
  • [28] Inductive and Deductive Reasoning to Assist in Cyber-Attack Prediction
    Marin, Ericsson
    Almukaynizi, Mohammed
    Shakarian, Paulo
    [J]. 2020 10TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2020, : 262 - 268
  • [29] survey of Cyber Attack Detection Strategies
    Raiyn, Jamal
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (01): : 247 - 255
  • [30] Experimental Cyber Attack Detection Framework
    Mironeanu, Catalin
    Archip, Alexandru
    Amarandei, Cristian-Mihai
    Craus, Mitica
    [J]. ELECTRONICS, 2021, 10 (14)