File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Automatic Analysis and Reasoning Based on Vulnerability Knowledge Graph

TitleAutomatic Analysis and Reasoning Based on Vulnerability Knowledge Graph
Authors
KeywordsCybersecurity
Knowledge graph
Vulnerability
Knowledge graph reasoning
Knowledge extraction
Issue Date2019
PublisherSpringer.
Citation
Cyberspace Congress 2019: International Conference on Cyberspace Data and Intelligence (CyberDI) & International Conference on Cyber-Living, Cyber-Syndrome and Cyber-Health (CyberLife), Beijing, China, 16-18 December 2019. In Ning, H (ed.). Cyberspace Data and Intelligence, and Cyber-Living, Syndrome, and Health: International 2019 Cyberspace Congress, CyberDI and CyberLife, Proceedings, pt.1, p. 3-19 How to Cite?
AbstractIn the security community, it is valuable to extract and store the vulnerability knowledge. Many data sources record vulnerability in unstructured data and semi-structured data which are hard for machine-understanding and reuse. Security expert need to analyze the description, link to related knowledge and reason out the hidden connection among various weakness. It is necessary to analyze the vulnerability data automatically and manage knowledge in a more intelligent method. In this paper, we propose a model for automatic analysis and reasoning based on the vulnerability knowledge graph. The vulnerability knowledge graph is extracted from several widely used vulnerability databases and stored in the graph database. Natural language processing technique is used to process and analyze the latest vulnerability description. The extracted entity will be linked to the vulnerability knowledge graph and added as new knowledge. Reasoning function can find hidden relationships among weaknesses based on the knowledge graph. Finally, we present sample cases to demonstrate the practical usage of the model.
Persistent Identifierhttp://hdl.handle.net/10722/289176
ISBN
Series/Report no.Communications in Computer and Information Science (CCIS); v. 1137

 

DC FieldValueLanguage
dc.contributor.authorQin, S-
dc.contributor.authorChow, KP-
dc.date.accessioned2020-10-22T08:08:55Z-
dc.date.available2020-10-22T08:08:55Z-
dc.date.issued2019-
dc.identifier.citationCyberspace Congress 2019: International Conference on Cyberspace Data and Intelligence (CyberDI) & International Conference on Cyber-Living, Cyber-Syndrome and Cyber-Health (CyberLife), Beijing, China, 16-18 December 2019. In Ning, H (ed.). Cyberspace Data and Intelligence, and Cyber-Living, Syndrome, and Health: International 2019 Cyberspace Congress, CyberDI and CyberLife, Proceedings, pt.1, p. 3-19-
dc.identifier.isbn9789811519215-
dc.identifier.urihttp://hdl.handle.net/10722/289176-
dc.description.abstractIn the security community, it is valuable to extract and store the vulnerability knowledge. Many data sources record vulnerability in unstructured data and semi-structured data which are hard for machine-understanding and reuse. Security expert need to analyze the description, link to related knowledge and reason out the hidden connection among various weakness. It is necessary to analyze the vulnerability data automatically and manage knowledge in a more intelligent method. In this paper, we propose a model for automatic analysis and reasoning based on the vulnerability knowledge graph. The vulnerability knowledge graph is extracted from several widely used vulnerability databases and stored in the graph database. Natural language processing technique is used to process and analyze the latest vulnerability description. The extracted entity will be linked to the vulnerability knowledge graph and added as new knowledge. Reasoning function can find hidden relationships among weaknesses based on the knowledge graph. Finally, we present sample cases to demonstrate the practical usage of the model.-
dc.languageeng-
dc.publisherSpringer.-
dc.relation.ispartofCyberspace Data and Intelligence, and Cyber-Living, Syndrome, and Health: International 2019 Cyberspace Congress, CyberDI and CyberLife Proceedings-
dc.relation.ispartofseriesCommunications in Computer and Information Science (CCIS); v. 1137-
dc.subjectCybersecurity-
dc.subjectKnowledge graph-
dc.subjectVulnerability-
dc.subjectKnowledge graph reasoning-
dc.subjectKnowledge extraction-
dc.titleAutomatic Analysis and Reasoning Based on Vulnerability Knowledge Graph-
dc.typeConference_Paper-
dc.identifier.emailChow, KP: chow@cs.hku.hk-
dc.identifier.authorityChow, KP=rp00111-
dc.identifier.doi10.1007/978-981-15-1922-2_1-
dc.identifier.scopuseid_2-s2.0-85076971573-
dc.identifier.hkuros317104-
dc.identifier.volumept.1-
dc.identifier.spage3-
dc.identifier.epage19-
dc.publisher.placeSingapore-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats