Frontiers of Data and Domputing ›› 2021, Vol. 3 ›› Issue (3): 9-18.doi: 10.11871/jfdc.issn.2096-742X.2021.03.002

• Special Issue: Communication and Security of Network • Previous Articles     Next Articles

Key Technologies of Cyber Security Knowledge Graph

LI Xu1,2,*(),LIAN Yifeng2(),ZHANG Haixia2(),HUANG kezhen2()   

  1. 1. University of Chinese Academy of Sciences, Beijing 100049, China
    2. Trusted Computing and Information Assurance Laboratory, Institute of Software Chinese Academy of Sciences, Beijing 100190, China
  • Received:2021-05-27 Online:2021-06-20 Published:2021-07-09
  • Contact: LI Xu E-mail:lixu2019@iscas.ac.cn;lianyifeng@iscas.ac.cn;zhanghaixia@iscas.ac.cn;huangkezhen@iscas.ac.cn

Abstract:

[Objective] Complex and changeable network attack activities bring severe challenges to network security. Introducing the knowledge graph into the field of network security is helpful to security situation depiction, security decision-making support, and early warning prediction. [Methods] This paper summarizes the research progress of knowledge graph technology at home and abroad and its application in the field of network security. [Results] On this basis, this paper expounds the technical framework of constructing the network security knowledge graph, defines the network security ontology model, uses the method of deep learning to extract entities and relations, uses rule-based and knowledge-based representation methods to carry out graph reasoning, and achieves the network security knowledge complement and analysis mining.

Key words: cyber security, knowledge graph, deep learning, threat intelligence