Edge propagation for link prediction in requirement-cyber threat intelligence knowledge graph.

التفاصيل البيبلوغرافية
العنوان: Edge propagation for link prediction in requirement-cyber threat intelligence knowledge graph.
المؤلفون: Zhang, Yang1 (AUTHOR) cszhangyang@mail.scut.edu.cn, Chen, Jiarui2 (AUTHOR) ee_jrchen@mail.scut.edu.cn, Cheng, Zhe1 (AUTHOR) cszcheng@mail.scut.edu.cn, Shen, Xiong1 (AUTHOR) 201710105867@mail.scut.edu.cn, Qin, Jiancheng2 (AUTHOR) jcqin@scut.edu.cn, Han, Yingzheng1,2 (AUTHOR) hanyz@scut.edu.cn, Lu, Yiqin1,2 (AUTHOR) eeyqlu@scut.edu.cn
المصدر: Information Sciences. Jan2024, Vol. 653, pN.PAG-N.PAG. 1p.
مصطلحات موضوعية: *CYBERTERRORISM, *INFRASTRUCTURE (Economics), *INFORMATION superhighway, *KNOWLEDGE management, *DATA security, KNOWLEDGE graphs, CYBER intelligence (Computer security)
مستخلص: Critical information infrastructure (CII) is a critical component of national socioeconomic systems and one of the primary targets of cyberattacks. Unfortunately, CII's security administration struggles to keep up with the rapidly evolving and complex cyber threats. In this research, we combine cybersecurity threat intelligence (CTI) with management security requirements (SR) data to construct a knowledge graph (KG) named RCTI and predict new knowledge on the heterogeneous graph. In addition, we propose EGNN, a novel GNN-based model that defines the representation of edges and develop an algorithm for propagating edge information. Experiments on three public datasets and the RCTI graph show that the EGNN achieves state-of-the-art performance. Finally, we use the EGNN model to predict new links on the RCTI graph, which by manual analysis achieves a 97% connectivity rate between the CTI and SR entities. Therefore, the EGNN can effectively detect management vulnerabilities and enhance CII's cybersecurity capability in the event of cybersecurity incidents. • Critical information infrastructure is the main target of cyber-attacks. • Knowledge graph can associate cyber-attack knowledge with cybersecurity management knowledge. • Locating security management vulnerabilities can effectively prevent cyber-attacks. • Link prediction technology helps to find the security management vulnerabilities. [ABSTRACT FROM AUTHOR]
Copyright of Information Sciences is the property of Elsevier B.V. and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
قاعدة البيانات: Business Source Index
الوصف
تدمد:00200255
DOI:10.1016/j.ins.2023.119770