TY - GEN
T1 - Uncovering Security Entity Relations with Cyber Threat Knowledge Graph Embedding
AU - Ma, Changchang
AU - Xiang, Xiayu
AU - Xie, Yushun
AU - Feng, Wenying
AU - Gu, Zhaoquan
N1 - Publisher Copyright:
© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2024.
PY - 2024
Y1 - 2024
N2 - With the fast development of information technologies, cyberspace security has received attention from many areas. Attackers leverage a diverse range of tactics, such as exploits, weakness discovery, and sophisticated attacks, with the intent to gain unauthorized access to targeted systems, while defenders can detect the potential attacks through heterogeneous sources of threat clues. Public cyber threat databases such as the Common Attack Pattern Enumeration and Classification (CAPEC), Common Vulnerabilities and Exposures (CVE), Common Weakness Enumeration (CWE), and Common Platform Enumeration (CPE) provide a rich repository of security-related entities and relations. These databases are pivotal in enhancing the understanding of cyberspace security and conducting comprehensive analysis for defenders. However, these databases have rarely been semantically cross-analyzed, a crucial strategy in pinpointing missing threat patterns. We aggregate data from separate sources into a threat knowledge graph and develop a novel knowledge representation learning method called 4CKGE (CAPEC-CWE-CVE-CPE Knowledge Graph Embedding).We extract and utilize more in-depth structural and textual information to be able to predict correlations between security entities such as products, vulnerabilities, weaknesses and attack patterns.Through extensive experiments, our proposed approach outperforms existing state-of-theart methods for effectively predicting the relations between security entities. The experimental results validate the effectiveness of our cyber threat knowledge graph in discovering concealed relations, highlighting its potential to fortify cybersecurity countermeasures.
AB - With the fast development of information technologies, cyberspace security has received attention from many areas. Attackers leverage a diverse range of tactics, such as exploits, weakness discovery, and sophisticated attacks, with the intent to gain unauthorized access to targeted systems, while defenders can detect the potential attacks through heterogeneous sources of threat clues. Public cyber threat databases such as the Common Attack Pattern Enumeration and Classification (CAPEC), Common Vulnerabilities and Exposures (CVE), Common Weakness Enumeration (CWE), and Common Platform Enumeration (CPE) provide a rich repository of security-related entities and relations. These databases are pivotal in enhancing the understanding of cyberspace security and conducting comprehensive analysis for defenders. However, these databases have rarely been semantically cross-analyzed, a crucial strategy in pinpointing missing threat patterns. We aggregate data from separate sources into a threat knowledge graph and develop a novel knowledge representation learning method called 4CKGE (CAPEC-CWE-CVE-CPE Knowledge Graph Embedding).We extract and utilize more in-depth structural and textual information to be able to predict correlations between security entities such as products, vulnerabilities, weaknesses and attack patterns.Through extensive experiments, our proposed approach outperforms existing state-of-theart methods for effectively predicting the relations between security entities. The experimental results validate the effectiveness of our cyber threat knowledge graph in discovering concealed relations, highlighting its potential to fortify cybersecurity countermeasures.
KW - Knowledge graph embedding
KW - Link prediction
KW - Security database
KW - Threat knowledge graph
UR - https://www.scopus.com/pages/publications/85201196577
U2 - 10.1007/978-981-97-4522-7_2
DO - 10.1007/978-981-97-4522-7_2
M3 - 会议稿件
AN - SCOPUS:85201196577
SN - 9789819745210
T3 - Communications in Computer and Information Science
SP - 20
EP - 35
BT - Network Simulation and Evaluation - 2nd International Conference, NSE 2023, Proceedings
A2 - Gu, Zhaoquan
A2 - Zhou, Wanlei
A2 - Zhang, Jiawei
A2 - Xu, Guandong
A2 - Jia, Yan
PB - Springer Science and Business Media Deutschland GmbH
T2 - 2nd International Conference on Network Simulation and Evaluation, NSE 2023
Y2 - 22 November 2023 through 24 November 2023
ER -