Threat Analysis of IoT Security Knowledge Graph Based on Confidence

被引:2
|
作者
Zhang, Shuqin [1 ]
Zhang, Minzhi [1 ]
Li, Hong [2 ]
Bai, Guangyao [1 ]
机构
[1] Zhongyuan Univ Technol, Coll Comp, Zhengzhou, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
关键词
IoT security; Ontology; Knowledge graph; Knowledge extraction; Threat analysis;
D O I
10.1007/978-3-030-92836-0_22
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The identification, analysis and application of vulnerabilities and weaknesses exposed after attacks on devices in the IoT security field are imminent It is very important to combine the concepts of IoT security and knowledge graph to build the IoT security knowledge base and apply it to the defense and attack of IoT devices. From this we propose an ontology to build an IoT security knowledge graph. And it carries on the method of knowledge extraction and threat analysis. IoT security knowledge graph is extracted from several widely used knowledge databases and stored in the graph database. First, build the ontology of the IoT security field based on the five-tuple model. Secondly, natural language processing technique is used to process and analyze IoT security events. The extracted entity will be linked to the IoT security knowledge graph and added as new knowledge. Finally, based on the confidence, conduct horizontal reasoning and analysis on the IoT security knowledge graph. And present sample cases to demonstrate the practical usage of the method. Realize the gradual intelligence of threat analysis in the field of IoT security.
引用
收藏
页码:254 / 264
页数:11
相关论文
共 50 条
  • [21] Modified graph-based algorithm to analyze security threats in IoT
    Arat, Ferhat
    Akleylek, Sedat
    [J]. PEERJ, 2023, 11
  • [22] Modified graph-based algorithm to analyze security threats in IoT
    Arat F.
    Akleylek S.
    [J]. PeerJ Computer Science, 2023, 9
  • [23] Modified graph-based algorithm to analyze security threats in IoT
    Arat, Ferhat
    Akleylek, Sedat
    [J]. PEERJ COMPUTER SCIENCE, 2023, 9
  • [24] Cloud Security Requirement Based Threat Analysis
    Taha, Ahmed
    Lawall, Alexander
    Suri, Neeraj
    [J]. 2023 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS, ICNC, 2023, : 506 - 510
  • [25] Approximate inferring with confidence predicting based on uncertain knowledge graph embedding
    Yang, Shihan
    Zhang, Weiya
    Tang, Rui
    Zhang, Mingkai
    Huang, Zhensheng
    [J]. INFORMATION SCIENCES, 2022, 609 : 679 - 690
  • [26] IoT Components LifeCycle based Security Analysis
    Marconot, Johan
    Pebay-Peyroula, Florian
    Hely, David
    [J]. 2017 EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD), 2017, : 295 - 298
  • [27] VisIoT: A Threat Visualisation Tool for IoT Systems Security
    Sarigiannidis, Panagiotis
    Karapistoli, Eirini
    Economides, Anastasios A.
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION WORKSHOP (ICCW), 2015, : 2633 - 2638
  • [28] On the Security Threat of Abandoned and Zombie Cellular IoT Devices
    Soos, Gabor
    Varga, Pal
    [J]. 2019 IEEE 17TH INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2019, : 996 - 1001
  • [29] Intelligent Prediction for Device Status Based on IoT Temporal Knowledge Graph
    You, Shujuan
    Li, Xiaotao
    Chen, Wai
    [J]. 2020 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2020, : 560 - 565
  • [30] Continuous Knowledge Graph Refinement With Confidence Propagation
    Huseynli, Alisettar
    Akcayol, M. Ali
    [J]. IEEE ACCESS, 2023, 11 : 59226 - 59237