{"title":"基于知识图谱的网络攻击方法推荐","authors":"Y. Ou, Tianyang Zhou, Junhu Zhu","doi":"10.1109/ICCEIC51584.2020.00020","DOIUrl":null,"url":null,"abstract":"The lack of correlation between the new cyber attack intelligence and the knowledge database makes it difficult for the recommendation system to recommend effective cyber attack knowledge in terms of the new security intelligence. This paper proposes an cyber attack method intelligence recommendation algorithm based on knowledge graph. Firstly, it proposes a cyber attack knowledge graph construction scheme based on four kinds of open security databases. Then, based on the idea of collaborative filtering recommendation, the meta-path is introduced to describe different relations between nodes. At last, the recommendation list could be generated by calculating the correlation score of each path with node vector. Compared with the content-based recommendation method, the effectiveness of this method is proved.","PeriodicalId":135840,"journal":{"name":"2020 International Conference on Computer Engineering and Intelligent Control (ICCEIC)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Recommendation of cyber attack method based on knowledge graph\",\"authors\":\"Y. Ou, Tianyang Zhou, Junhu Zhu\",\"doi\":\"10.1109/ICCEIC51584.2020.00020\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The lack of correlation between the new cyber attack intelligence and the knowledge database makes it difficult for the recommendation system to recommend effective cyber attack knowledge in terms of the new security intelligence. This paper proposes an cyber attack method intelligence recommendation algorithm based on knowledge graph. Firstly, it proposes a cyber attack knowledge graph construction scheme based on four kinds of open security databases. Then, based on the idea of collaborative filtering recommendation, the meta-path is introduced to describe different relations between nodes. At last, the recommendation list could be generated by calculating the correlation score of each path with node vector. Compared with the content-based recommendation method, the effectiveness of this method is proved.\",\"PeriodicalId\":135840,\"journal\":{\"name\":\"2020 International Conference on Computer Engineering and Intelligent Control (ICCEIC)\",\"volume\":\"73 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 International Conference on Computer Engineering and Intelligent Control (ICCEIC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCEIC51584.2020.00020\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 International Conference on Computer Engineering and Intelligent Control (ICCEIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCEIC51584.2020.00020","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Recommendation of cyber attack method based on knowledge graph
The lack of correlation between the new cyber attack intelligence and the knowledge database makes it difficult for the recommendation system to recommend effective cyber attack knowledge in terms of the new security intelligence. This paper proposes an cyber attack method intelligence recommendation algorithm based on knowledge graph. Firstly, it proposes a cyber attack knowledge graph construction scheme based on four kinds of open security databases. Then, based on the idea of collaborative filtering recommendation, the meta-path is introduced to describe different relations between nodes. At last, the recommendation list could be generated by calculating the correlation score of each path with node vector. Compared with the content-based recommendation method, the effectiveness of this method is proved.