Combating Fake Cyber Threat Intelligence using Provenance in Cybersecurity Knowledge Graphs

被引:7
|
作者
Mitra, Shaswata [1 ]
Piplai, Aritran [2 ]
Mittal, Sudip [1 ]
Joshi, Anupam [2 ]
机构
[1] Mississippi State Univ, Dept Comp Sci & Engn, Mississippi State, MS 39762 USA
[2] Univ Maryland Baltimore Cty, Dept Comp Sci & Elect Engn, Baltimore, MD 21228 USA
基金
美国国家科学基金会;
关键词
Cybersecurity; Fake Data; Provenance; Cyber Threat Intelligence;
D O I
10.1109/BigData52589.2021.9671867
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Today there is a significant amount of fake cybersecurity related intelligence on the internet. To filter out such information, we build a system to capture the provenance information and represent it along with the captured Cyber Threat Intelligence (CTI). In the cybersecurity domain, such CTI is stored in Cybersecurity Knowledge Graphs (CKG). We enhance the exiting CKG model to incorporate intelligence provenance and fuse provenance graphs with CKG. This process includes modifying traditional approaches to entity and relation extraction. CTI data is considered vital in securing our cyberspace. Knowledge graphs containing CTI information along with its provenance can provide expertise to dependent Artificial Intelligence (AI) systems and human analysts.
引用
收藏
页码:3316 / 3323
页数:8
相关论文
共 50 条
  • [1] Actionable Cyber Threat Intelligence using Knowledge Graphs and Large Language Models
    Fieblinger, Romy
    Alam, Md Tanvirul
    Rastogi, Nidhi
    9TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS, EUROS&PW 2024, 2024, : 100 - 111
  • [2] Advancing Cybersecurity: Graph Neural Networks in Threat Intelligence Knowledge Graphs
    Li, Langsha
    Qiang, Feng
    Ma, Li
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON ALGORITHMS, SOFTWARE ENGINEERING, AND NETWORK SECURITY, ASENS 2024, 2024, : 737 - 741
  • [3] Generating Fake Cyber Threat Intelligence Using Transformer-Based Models
    Ranade, Priyanka
    Piplai, Aritran
    Mittal, Sudip
    Joshi, Anupam
    Finin, Tim
    2021 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2021,
  • [4] Exploring Blockchain on Cybersecurity: Cyber-Threat Intelligence Sharing
    Chaabouni, Fatma Ben Mesmia
    Jayaprakash, Sujith
    SMART TRENDS IN COMPUTING AND COMMUNICATIONS, VOL 4, SMARTCOM 2024, 2024, 948 : 389 - 398
  • [5] Mapping Cyber Threat Intelligence to Probabilistic Attack Graphs
    Gylling, Andreas
    Ekstedt, Mathias
    Afzal, Zeeshan
    Eliasson, Per
    PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2021, : 304 - 311
  • [6] Cyber Threat Intelligence for Improving Cybersecurity and Risk Management in Critical Infrastructure
    Kure, Halima Ibrahim
    Islam, Shareeful
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2019, 25 (11) : 1478 - 1502
  • [7] A Systematic Literature Review on Cyber Threat Intelligence for Organizational Cybersecurity Resilience
    Saeed, Saqib
    Suayyid, Sarah A.
    Al-Ghamdi, Manal S.
    Al-Muhaisen, Hayfa
    Almuhaideb, Abdullah M.
    SENSORS, 2023, 23 (16)
  • [8] Cyber threat attribution using unstructured reports in cyber threat intelligence
    Irshad, Ehtsham
    Siddiqui, Abdul Basit
    EGYPTIAN INFORMATICS JOURNAL, 2023, 24 (01) : 43 - 59
  • [9] Cyber Threat Intelligence Mining for Proactive Cybersecurity Defense: A Survey and New Perspectives
    Sun, Nan
    Ding, Ming
    Jiang, Jiaojiao
    Xu, Weikang
    Mo, Xiaoxing
    Tai, Yonghang
    Zhang, Jun
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2023, 25 (03): : 1748 - 1774
  • [10] A Web Semantic Mining Method for Fake Cybersecurity Threat Intelligence in Open Source Communities
    Li, Zhihua
    Yu, Xinye
    Zhao, Yukai
    INTERNATIONAL JOURNAL ON SEMANTIC WEB AND INFORMATION SYSTEMS, 2024, 20 (01)