banner

Cybersecurity threat perception technology based on knowledge graph

A. Sali, Abdulmajeed Al-Jumaily, Víctor P. Gil Jiménez, Dhiya Al-Jumeily

Abstract


The issue of complex sources, difficult to understand and share security threat intelligence, this paper realizes deep learning of threat intelligence features based on Restricted Boltzmann Machine, which graphs the original threat intelligence features from high dimensional space to low dimensional space layer by layer, and constructs the cyberspace security threat knowledge graphs. The deep learning used to build a multi-level and structured knowledge graph of cyberspace security threats can reflect the structural characteristics of the knowledge graph, making the graph have a lower dimension and a higher level of abstraction. The experiment verifies the feasibility of constructing the cyberspace security threat knowledge graph, and verifies the security threat perception method based on the knowledge graph is more suitable for the perception of high-intensity security threats by comparing with traditional threat detection methods.


Keywords


knowledge graphs; threat intelligence; Restricted Boltzmann Machine; security threat perception; threat detection

Full Text:

PDF

References


1. Chen X, Jia S, Xiang Y. A review: Knowledge reasoning over knowledge graph. Expert Systems with Applications 2020; 141(6): 112948. doi: 10.1016/j.eswa.2019.112948

2. Huang H, Liao Q, Hu M, et al. Human-computer interaction model based on knowledge graph ripple network. Journal of Electronics & Information Technology 2022; 44(1): 221–229. doi: 10.11999/JEIT200817

3. Li S, Zhang Y, Liu J, et al. Recommendation model based on public neighbor sorting and sampling of knowledge graph. Journal of Electronics & Information Technology 2021; 43(12): 3522–3529. doi: 10.11999/JEIT200735

4. More S, Matthews M, Joshi A, Finin T. A knowledge-based approach to intrusion detection modeling. In: Proceedings of 2012 IEEE Symposium on Security and Privacy Workshops; 24–25 May 2012; San Francisco, CA USA. pp. 75–81.

5. Joshi A, Lal R, Finin T, Joshi A. Extracting cybersecurity related linked data from text. In: Proceedings of 2013 IEEE Seventh International Conference on Semantic Computing; 16–18 September 2013; Irvine, CA, USA. pp. 252–259.

6. Syed Z, Padia A, Finin T, et al. UCO: A unified cybersecurity ontology. In: Proceedings of AAAI Workshop on Artificial Intelligence for Cyber Security; February 2016; Phoenix, Arizona, USA.

7. Atighetchi M, Simidchieva BI, Yaman F, et al. Using ontologies to quantify attack surfaces. In: Proceedings of Semantic Technology for Intelligence, Defense, and Security (STIDS); November 2016; Fairfax, VA, USA. pp. 10–18.

8. Yan J, Yulu Q, Huaijun S, et al. A practical method of constructing network security knowledge map. Engineering 2018; 4(1): 117–133.

9. Pingle A, Piplai A, Mittal S, et al. Relext: Relation extraction using deep learning approaches for cybersecurity knowledge graph improvement. In: Proceedings of the 2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining; 27–30 August 2019; Vancouver British, Columbia, Canada. pp. 879–886.

10. Chowdhary A, Alshamrani A, Huang D, Liang H. MTD analysis and evaluation framework in software defined network (MASON). In: Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization; 19–21 March 2018; Tempe, AZ, USA. pp. 43–48.

11. Liu D. Prediction of network security based on DS evidence theory. ETRI Journal 2020; 42(5): 799–804. doi: 10.4218/etrij.2019-0147

12. Guo W, Tang X, Cheng J, et al. DDoS attack situation information fusion method based on dempster-shafer evidence theory. In: Proceedings of 5th International Conference on Artificial Intelligence and Security; 26–28 July 2019; New York, NY, USA. pp. 396–407.

13. Jiang Y, Li C, Yu L, Bao B. On network security situation prediction based on RBF neural network. In: Proceedings of 2017 36th Chinese Control Conference (CCC); 26–28 July 2017; China. pp. 4060–4063.

14. Dong C, Jiang B, Lu Z, et al. Knowledge graph for cyberspace security intelligence: A survey. Journal of Cyber Security 2020; 5(5): 56–76. doi: 10.19363/J.cnki.cn10-1380/tn.2020.09.05

15. Al-Jumaily A, Sali A, Jiménez VPG, et al. Evaluation of 5G and fixed-satellite service earth station (FSS-ES) downlink interference based on artificial neural network learning models (ANN-LMS). Sensors 2023; 23(13): 6175. doi: 10.3390/s23136175

16. Wang T, Ai Z, Zhang X. Knowledge graph construction of threat intelligence based on deep learning. Computer and Modernization 2018; 12: 21–26.

17. Zhang CX, Ji NN, Wang GW. Restricted Boltzmann machines. Chinese Journal of Engineering Mathematics 2015; 32(2): 59–173.

18. Zhang N, Ding S, Zhang J, Xue Y. An overview on restricted Boltzmann machines. Neurocomputing 2018; 275: 1186–1199. doi: 10.1016/j.neucom.2017.09.065

19. Nomura Y. Helping restricted Boltzmann machines with quantum-state representation by restoring symmetry. Journal of Physics: Condensed Matter 2021; 33(17): 174003. doi: 10.1088/1361-648X/abe268

20. Al-Jumaily A, Sali A, Riyadh M, et al. Machine learning modeling for radiofrequency electromagnetic fields (RF-EMF) signals from mmwave 5G signals. IEEE Access 2023; 11: 79648–79658. doi: 10.1109/ACCESS.2023.3265723

21. Al-Jumaily AFM, Al-Jumaily A, Al-Jumaili SJ. Original research article prediction method of business process remaining time based on atten-tion bidirectional recurrent neural network. Journal of Autonomous Intelligence 2023; 6(1): 639. doi: 10.32629/jai.v6i1.639




DOI: https://doi.org/10.32629/jai.v6i3.882

Refbacks

  • There are currently no refbacks.


Copyright (c) 2023 A. Sali, Abdulmajeed Al-Jumaily, Víctor P. Gil Jiménez, Dhiya Al-Jumeily

License URL: https://creativecommons.org/licenses/by-nc/4.0/