Threat Analysis of IoT Security Knowledge Graph Based on Confidence

被引:2
|
作者
Zhang, Shuqin [1 ]
Zhang, Minzhi [1 ]
Li, Hong [2 ]
Bai, Guangyao [1 ]
机构
[1] Zhongyuan Univ Technol, Coll Comp, Zhengzhou, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
关键词
IoT security; Ontology; Knowledge graph; Knowledge extraction; Threat analysis;
D O I
10.1007/978-3-030-92836-0_22
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The identification, analysis and application of vulnerabilities and weaknesses exposed after attacks on devices in the IoT security field are imminent It is very important to combine the concepts of IoT security and knowledge graph to build the IoT security knowledge base and apply it to the defense and attack of IoT devices. From this we propose an ontology to build an IoT security knowledge graph. And it carries on the method of knowledge extraction and threat analysis. IoT security knowledge graph is extracted from several widely used knowledge databases and stored in the graph database. First, build the ontology of the IoT security field based on the five-tuple model. Secondly, natural language processing technique is used to process and analyze IoT security events. The extracted entity will be linked to the IoT security knowledge graph and added as new knowledge. Finally, based on the confidence, conduct horizontal reasoning and analysis on the IoT security knowledge graph. And present sample cases to demonstrate the practical usage of the method. Realize the gradual intelligence of threat analysis in the field of IoT security.
引用
收藏
页码:254 / 264
页数:11
相关论文
共 50 条
  • [1] IoT-Based Data Security and Protection for Hospital Information Systems: A Knowledge Graph Analysis
    Oga, Djiwa N'tela
    Houngue, Pelagie
    Sarr, Cheikh
    [J]. INTELLIGENT SUSTAINABLE SYSTEMS, WORLDS4 2022, VOL 2, 2023, 579 : 85 - 95
  • [2] Knowledge Graph Based Large Scale Network Security Threat Detection Techniques
    Hu, Zhifeng
    [J]. Applied Mathematics and Nonlinear Sciences, 2024, 9 (01)
  • [3] Generating Network Security Defense Strategy Based on Cyber Threat Intelligence Knowledge Graph
    Zhang, Shuqin
    Li, Shuhan
    Chen, Peng
    Wang, Shijie
    Zhao, Chunxia
    [J]. EMERGING NETWORKING ARCHITECTURE AND TECHNOLOGIES, ICENAT 2022, 2023, 1696 : 507 - 519
  • [4] Graph-Based IoT Microservice Security
    Pahl, Marc-Oliver
    Aubet, Francois-Xavier
    Liebald, Stefan
    [J]. NOMS 2018 - 2018 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2018,
  • [5] A Cyberspace Security Knowledge System Based on Knowledge Graph
    Ma, Bin
    Li, Dongqi
    Wang, Chunpeng
    Li, Jian
    Li, Gang
    Cui, Xinan
    [J]. ARTIFICIAL INTELLIGENCE AND SECURITY, ICAIS 2022, PT III, 2022, 13340 : 349 - 362
  • [6] A Knowledge-Based IoT Security Checker
    Anisetti, Marco
    Asal, Rasool
    Ardagna, Claudio Agostino
    Comi, Lorenzo
    Damiani, Ernesto
    Gaudenzi, Filippo
    [J]. EURO-PAR 2018: PARALLEL PROCESSING WORKSHOPS, 2019, 11339 : 299 - 311
  • [7] Applicability Analysis of Knowledge Graph Embedding on Blended Threat
    Lee, Minkyung
    Jung, In-Su
    Kim, Deuk-Hun
    Jang-Jaccard, Julian
    Kwak, Jin
    [J]. 2022 INTERNATIONAL CONFERENCE ON PLATFORM TECHNOLOGY AND SERVICE (PLATCON22), 2022, : 48 - 52
  • [8] Knowledge Graph Based Adversarial Radar Threat Assessment
    Zhu, Chenyu
    Li, Yue
    Hou, Xinyue
    Wang, Peng
    Peng, Xiaoyan
    [J]. 2022 IEEE 2ND INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND SOFTWARE ENGINEERING (ICICSE 2022), 2022, : 189 - 194
  • [9] Construction of knowledge graph for security threat tracing in Power Distribution Internet of Things
    Yao, Qigui
    Fei, Jiaxuan
    Wang, Qi
    [J]. 2022 9TH INTERNATIONAL FORUM ON ELECTRICAL ENGINEERING AND AUTOMATION, IFEEA, 2022, : 610 - 613
  • [10] Application of graph theory in threat situation analysis of network security
    Telecommunication Engineering Institute, Air Force Engineering University, Xi'an 710077, China
    [J]. Beijing Youdian Daxue Xuebao, 2009, 1 (113-117):