Cybersecurity knowledge graphs

被引:0
|
作者
Leslie F. Sikos
机构
[1] Edith Cowan University,Security Research Institute
来源
关键词
Cybersecurity knowledge graph; Cyber-knowledge; Cyber-situational awareness; Cyber-resilience; Attack graph;
D O I
暂无
中图分类号
学科分类号
摘要
Cybersecurity knowledge graphs, which represent cyber-knowledge with a graph-based data model, provide holistic approaches for processing massive volumes of complex cybersecurity data derived from diverse sources. They can assist security analysts to obtain cyberthreat intelligence, achieve a high level of cyber-situational awareness, discover new cyber-knowledge, visualize networks, data flow, and attack paths, and understand data correlations by aggregating and fusing data. This paper reviews the most prominent graph-based data models used in this domain, along with knowledge organization systems that define concepts and properties utilized in formal cyber-knowledge representation for both background knowledge and specific expert knowledge about an actual system or attack. It is also discussed how cybersecurity knowledge graphs enable machine learning and facilitate automated reasoning over cyber-knowledge.
引用
收藏
页码:3511 / 3531
页数:20
相关论文
共 50 条
  • [1] Cybersecurity knowledge graphs
    Sikos, Leslie F.
    [J]. KNOWLEDGE AND INFORMATION SYSTEMS, 2023, 65 (09) : 3511 - 3531
  • [2] Cybersecurity knowledge graphs construction and quality assessment
    Hongyi Li
    Ze Shi
    Chengwei Pan
    Di Zhao
    Nan Sun
    [J]. Complex & Intelligent Systems, 2024, 10 : 1201 - 1217
  • [3] Cybersecurity knowledge graphs construction and quality assessment
    Li, Hongyi
    Shi, Ze
    Pan, Chengwei
    Zhao, Di
    Sun, Nan
    [J]. COMPLEX & INTELLIGENT SYSTEMS, 2024, 10 (01) : 1201 - 1217
  • [4] Research on quality assessment methods for cybersecurity knowledge graphs
    Shi, Ze
    Li, Hongyi
    Zhao, Di
    Pan, Chengwei
    [J]. COMPUTERS & SECURITY, 2024, 142
  • [5] Creating Cybersecurity Knowledge Graphs From Malware After Action Reports
    Piplai, Aritran
    Mittal, Sudip
    Joshi, Anupam
    Finin, Tim
    Holt, James
    Zak, Richard
    [J]. IEEE ACCESS, 2020, 8 : 211691 - 211703
  • [6] Advancing Cybersecurity: Graph Neural Networks in Threat Intelligence Knowledge Graphs
    Li, Langsha
    Qiang, Feng
    Ma, Li
    [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON ALGORITHMS, SOFTWARE ENGINEERING, AND NETWORK SECURITY, ASENS 2024, 2024, : 737 - 741
  • [7] Semantic Embedding-Based Entity Alignment for Cybersecurity Knowledge Graphs
    Kim, Minhwan
    Kim, Hanmin
    Park, Gyudong
    Sohn, Mye
    [J]. MOBILE INTERNET SECURITY, MOBISEC 2021, 2022, 1544 : 52 - 64
  • [8] Combating Fake Cyber Threat Intelligence using Provenance in Cybersecurity Knowledge Graphs
    Mitra, Shaswata
    Piplai, Aritran
    Mittal, Sudip
    Joshi, Anupam
    [J]. 2021 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2021, : 3316 - 3323
  • [9] Building Knowledge Graphs from Unstructured Texts: Applications and Impact Analyses in Cybersecurity Education
    Agrawal, Garima
    Deng, Yuli
    Park, Jongchan
    Liu, Huan
    Chen, Ying-Chih
    [J]. INFORMATION, 2022, 13 (11)
  • [10] Cybersecurity challenges in the knowledge economy
    Ursache, Vlad-Mihai
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON BUSINESS EXCELLENCE, 2022, 16 (01): : 121 - 129