Please wait a minute...
Submit  |   Chinese  | 
Advanced Search
   Home  |  Online Now  |  Current Issue  |  Focus  |  Archive  |  For Authors  |  Journal Information   Open Access  
Submit  |   Chinese  | 
Engineering    2018, Vol. 4 Issue (1) : 53 -60
Research |
A Practical Approach to Constructing a Knowledge Graph for Cybersecurity
Yan Jia,Yulu Qi,Huaijun Shang,Rong Jiang,Aiping Li()
School of Computer Science, National University of Defense Technology, Changsha 410073, China

Cyberattack forms are complex and varied, and the detection and prediction of dynamic types of attack are always challenging tasks. Research on knowledge graphs is becoming increasingly mature in many fields. At present, it is very significant that certain scholars have combined the concept of the knowledge graph with cybersecurity in order to construct a cybersecurity knowledge base. This paper presents a cybersecurity knowledge base and deduction rules based on a quintuple model. Using machine learning, we extract entities and build ontology to obtain a cybersecurity knowledge base. New rules are then deduced by calculating formulas and using the path-ranking algorithm. The Stanford named entity recognizer (NER) is also used to train an extractor to extract useful information. Experimental results show that the Stanford NER provides many features and the useGazettes parameter may be used to train a recognizer in the cybersecurity domain in preparation for future work.

Keywords Cybersecurity      Knowledge graph      Knowledge deduction     
Corresponding Authors: Aiping Li   
Just Accepted Date: 05 March 2018   Issue Date: 10 April 2018
E-mail this article
E-mail Alert
Articles by authors
Yan Jia
Yulu Qi
Huaijun Shang
Rong Jiang
Aiping Li
Cite this article:   
Yan Jia,Yulu Qi,Huaijun Shang, et al. A Practical Approach to Constructing a Knowledge Graph for Cybersecurity[J]. Engineering, 2018, 4(1): 53 -60 .
URL:     OR
No related articles found!
Copyright © 2015 Higher Education Press & Engineering Sciences Press, All Rights Reserved.