Skip to main navigation Skip to search Skip to main content

Uncovering Security Entity Relations with Cyber Threat Knowledge Graph Embedding

  • Changchang Ma
  • , Xiayu Xiang
  • , Yushun Xie
  • , Wenying Feng
  • , Zhaoquan Gu*
  • *Corresponding author for this work
  • Guangzhou University
  • Peng Cheng Laboratory
  • University of Electronic Science and Technology of China
  • Harbin Institute of Technology

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

With the fast development of information technologies, cyberspace security has received attention from many areas. Attackers leverage a diverse range of tactics, such as exploits, weakness discovery, and sophisticated attacks, with the intent to gain unauthorized access to targeted systems, while defenders can detect the potential attacks through heterogeneous sources of threat clues. Public cyber threat databases such as the Common Attack Pattern Enumeration and Classification (CAPEC), Common Vulnerabilities and Exposures (CVE), Common Weakness Enumeration (CWE), and Common Platform Enumeration (CPE) provide a rich repository of security-related entities and relations. These databases are pivotal in enhancing the understanding of cyberspace security and conducting comprehensive analysis for defenders. However, these databases have rarely been semantically cross-analyzed, a crucial strategy in pinpointing missing threat patterns. We aggregate data from separate sources into a threat knowledge graph and develop a novel knowledge representation learning method called 4CKGE (CAPEC-CWE-CVE-CPE Knowledge Graph Embedding).We extract and utilize more in-depth structural and textual information to be able to predict correlations between security entities such as products, vulnerabilities, weaknesses and attack patterns.Through extensive experiments, our proposed approach outperforms existing state-of-theart methods for effectively predicting the relations between security entities. The experimental results validate the effectiveness of our cyber threat knowledge graph in discovering concealed relations, highlighting its potential to fortify cybersecurity countermeasures.

Original languageEnglish
Title of host publicationNetwork Simulation and Evaluation - 2nd International Conference, NSE 2023, Proceedings
EditorsZhaoquan Gu, Wanlei Zhou, Jiawei Zhang, Guandong Xu, Yan Jia
PublisherSpringer Science and Business Media Deutschland GmbH
Pages20-35
Number of pages16
ISBN (Print)9789819745210
DOIs
StatePublished - 2024
Externally publishedYes
Event2nd International Conference on Network Simulation and Evaluation, NSE 2023 - Shenzhen, China
Duration: 22 Nov 202324 Nov 2023

Publication series

NameCommunications in Computer and Information Science
Volume2064 CCIS
ISSN (Print)1865-0929
ISSN (Electronic)1865-0937

Conference

Conference2nd International Conference on Network Simulation and Evaluation, NSE 2023
Country/TerritoryChina
CityShenzhen
Period22/11/2324/11/23

Keywords

  • Knowledge graph embedding
  • Link prediction
  • Security database
  • Threat knowledge graph

Fingerprint

Dive into the research topics of 'Uncovering Security Entity Relations with Cyber Threat Knowledge Graph Embedding'. Together they form a unique fingerprint.

Cite this