咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >A Practical Approach to Constr... 收藏

A Practical Approach to Constructing a Knowledge Graph for Cybersecurity

A Practical Approach to Constructing a Knowledge Graph for Cybersecurity

作     者:Yan Jia Yulu Qi Huaijun Shang Rong Jiang Aiping Li 

作者机构:School of Computer Science National University of Defense Technology Changsha 410073 China 

出 版 物:《Engineering》 (工程(英文))

年 卷 期:2018年第4卷第1期

页      面:53-60页

核心收录:

学科分类:07[理学] 08[工学] 

基  金:We are grateful for the support of the National Natural Science Foundation of China (U163215  61472433  61732022  61732004  61672020  and 61502517) and the National Key Research and Development Program (2016YFB0800802  2016YFB0800803  2016YFB0800804  2017YFB0802204  2016QY03D0601  2016QY03D0603  and 2016YFB0800303) 

主  题:Cybersecurity Knowledge graph Knowledge deduction 

摘      要:Cyberattack forms are complex and varied, and the detection and prediction of dynamic types of attack are always challenging tasks. Research on knowledge graphs is becoming increasingly mature in many fields. At present, it is very significant that certain scholars have combined the concept of the knowledge graph with cybersecurity in order to construct a cybersecurity knowledge base. This paper presents a cybersecurity knowledge base and deduction rules based on a quintuple model. Using machine learning, we extract entities and build ontology to obtain a cybersecurity knowledge base. New rules are then deduced by calculating formulas and using the path-ranking algorithm. The Stanford named entity rec- ognizer (NER) is also used to train an extractor to extract useful information. Experimental results show that the Stanford NER provides many features and the useGazettes parameter may be used to train a rec- ognizer in the cybersecurity domain in preparation for future work.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分