%A LI Xu,LIAN Yifeng,ZHANG Haixia,HUANG kezhen %T Key Technologies of Cyber Security Knowledge Graph %0 Journal Article %D 2021 %J Frontiers of Data and Computing %R 10.11871/jfdc.issn.2096-742X.2021.03.002 %P 9-18 %V 3 %N 3 %U {http://www.jfdc.cnic.cn/CN/abstract/article_139.shtml} %8 2021-06-20 %X

[Objective] Complex and changeable network attack activities bring severe challenges to network security. Introducing the knowledge graph into the field of network security is helpful to security situation depiction, security decision-making support, and early warning prediction. [Methods] This paper summarizes the research progress of knowledge graph technology at home and abroad and its application in the field of network security. [Results] On this basis, this paper expounds the technical framework of constructing the network security knowledge graph, defines the network security ontology model, uses the method of deep learning to extract entities and relations, uses rule-based and knowledge-based representation methods to carry out graph reasoning, and achieves the network security knowledge complement and analysis mining.