An Information Completion Method Based on Security Knowledge Graph with Fusing Neighborhood Information

In the research of knowledge graph completion, the issue of missing information in open-source network security knowledge repositories has persisted due to challenges such as difficulty in coordinating heterogeneous information and maintaining historical data. To address the problem of insufficient...

Full description

Saved in:
Bibliographic Details
Published in2024 2nd International Conference on Signal Processing and Intelligent Computing (SPIC) pp. 303 - 307
Main Authors Wang, Zhengxian, Zhang, Wenbo, Dai, Jiaxi
Format Conference Proceeding
LanguageEnglish
Published IEEE 20.09.2024
Subjects
Online AccessGet full text
DOI10.1109/SPIC62469.2024.10691469

Cover

Abstract In the research of knowledge graph completion, the issue of missing information in open-source network security knowledge repositories has persisted due to challenges such as difficulty in coordinating heterogeneous information and maintaining historical data. To address the problem of insufficient feature learning from different domains in existing information completion methods, a information completion method based on security knowledge graph with fusing neighborhood information (KGC-N), is proposed. To capture neighborhood information, this method constructs a security knowledge graph associated with the Structured Threat Information Expression (STIX 2.1) open-source network security knowledge repository. During the data preprocessing phase, Global Vectors for Word Representation (GloVe) is used to enhance the model's training effectiveness. Leveraging graph traversal techniques, it captures neighborhood information with various relationships within a multi-hop range through the knowledge graph. The captured neighborhood features are then learned using a Graph Attention Network to enhance the model's predictive performance. Experimental results indicate that KGC-N achieves a Mean Ranking of 196 and a Mean Reciprocal Ranking of 0.6127, outperforming baseline methods.
AbstractList In the research of knowledge graph completion, the issue of missing information in open-source network security knowledge repositories has persisted due to challenges such as difficulty in coordinating heterogeneous information and maintaining historical data. To address the problem of insufficient feature learning from different domains in existing information completion methods, a information completion method based on security knowledge graph with fusing neighborhood information (KGC-N), is proposed. To capture neighborhood information, this method constructs a security knowledge graph associated with the Structured Threat Information Expression (STIX 2.1) open-source network security knowledge repository. During the data preprocessing phase, Global Vectors for Word Representation (GloVe) is used to enhance the model's training effectiveness. Leveraging graph traversal techniques, it captures neighborhood information with various relationships within a multi-hop range through the knowledge graph. The captured neighborhood features are then learned using a Graph Attention Network to enhance the model's predictive performance. Experimental results indicate that KGC-N achieves a Mean Ranking of 196 and a Mean Reciprocal Ranking of 0.6127, outperforming baseline methods.
Author Zhang, Wenbo
Wang, Zhengxian
Dai, Jiaxi
Author_xml – sequence: 1
  givenname: Zhengxian
  surname: Wang
  fullname: Wang, Zhengxian
  organization: Shenyang Ligong University,School of Information Science and Engineering,Shenyang,China
– sequence: 2
  givenname: Wenbo
  surname: Zhang
  fullname: Zhang, Wenbo
  organization: Shenyang Ligong University,School of Information Science and Engineering,Shenyang,China
– sequence: 3
  givenname: Jiaxi
  surname: Dai
  fullname: Dai, Jiaxi
  email: 2551107732@qq.com
  organization: Shenyang Urban Construction University,Shenyang,China
BookMark eNpNj8lqwzAYhFVoD22aNyhUL2BXmxcdU9MkpukCyT3Y_n_ZAlsytkPI29d0gc5l5jvMwNyRa-cdEvLIWcg500_7zzyLhYp1KJhQIWex5jNdkaVOdCojJuN01i2pV47mzvihKybrHc1817f4Hd9wajzQ52JEoDPvsToNdrrQV-fPLUKNdDMUfUPPdmro-jRaV9N3tHVT-qHxc_Xf8D25MUU74vLXF-Swfjlk22D3scmz1S6wmk8BmKoEyaKKaRAJoJIgASIpIlRJkqoUlDbSYFJJYwwaAUnJjZ4LaZEyzeSCPPzMWkQ89oPtiuFy_LsvvwCdb1dP
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/SPIC62469.2024.10691469
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9798350368888
EndPage 307
ExternalDocumentID 10691469
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i91t-dfcbd305c09d27de43d3dd5325e477848d49f3fe7c3fffef2d7b1f905c8a80903
IEDL.DBID RIE
IngestDate Wed Oct 09 06:12:57 EDT 2024
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i91t-dfcbd305c09d27de43d3dd5325e477848d49f3fe7c3fffef2d7b1f905c8a80903
PageCount 5
ParticipantIDs ieee_primary_10691469
PublicationCentury 2000
PublicationDate 2024-Sept.-20
PublicationDateYYYYMMDD 2024-09-20
PublicationDate_xml – month: 09
  year: 2024
  text: 2024-Sept.-20
  day: 20
PublicationDecade 2020
PublicationTitle 2024 2nd International Conference on Signal Processing and Intelligent Computing (SPIC)
PublicationTitleAbbrev SPIC
PublicationYear 2024
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.8853321
Snippet In the research of knowledge graph completion, the issue of missing information in open-source network security knowledge repositories has persisted due to...
SourceID ieee
SourceType Publisher
StartPage 303
SubjectTerms Attention mechanism
Data augmentation
Decoding
Dilated convolution
Knowledge engineering
Knowledge graphs
Network security
pedestrian detection
Pedestrians
Personnel
Predictive models
Representation learning
Training
Vectors
Title An Information Completion Method Based on Security Knowledge Graph with Fusing Neighborhood Information
URI https://ieeexplore.ieee.org/document/10691469
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8NAEF5sT55UrPhmD14Tk81uNnvUYq1KS6EVeiv7mC0ipFLSi7_e2TTxBYK3zTvM7GSSL_N9Q8gVK0yWa-7x6WeyiJtERyblIhIWmBNMQFGTwkbjfPjMH-di3pDVay4MANTFZxCHYf0v363sJkBlGOG5wshWHdLBebYlazU1W2mirqeTh37OcDt-9jEet3v_6JtSp43BHhm3F9xWi7zGm8rE9v2XFuO_72if9L4YenTymXsOyA6Uh2R5U9KGXhTMTUOsB21tHI7qRtH0FnOWo7g8bdrW0acWU6P3QbqaBlyWDkI1_JKOA2yKcyQoH38_cY_MBnez_jBqGilELyqtIuetcRjXNlGOSQc8c5lzIkNPcCkLXjiufOZB2sx7D545aVKv8IBCFwHHOSLdclXCMaFgjVCaF0bgexRIra3WUgkDiVfS5ukJ6QUjLd62UhmL1j6nf6w_I7vBV6EAgyXnpFutN3CBWb4yl7V3PwB4vas2
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8NAEF60HvSkYsW3e_CamGx2s9mjFmtr21Bohd7KPosUUpH04q93Nk18geBtEzYPZjKZ7Jf5vkHohmQqSSV18PZTSUBVJAMVUxYwbYlhhNmsIoWN8rT3TJ9mbFaT1SsujLW2Kj6zoR9W__LNSq89VAYRngqIbLGNdiDxU7aha9VVW3EkbifjficlMAMWfoSGzfwfnVOqxNHdR3lzyU29yDJclyrU77_UGP99Tweo_cXRw-PP7HOItmxxhBZ3Ba4JRt7g2Ee7V9eG4ahqFY3vIWsZDNuTunEdHjSoGn704tXYI7O46-vhFzj3wCk8JV77-PuJ22jafZh2ekHdSiF4EXEZGKeVgcjWkTCEG0sTkxjDEvAF5TyjmaHCJc5ynTjnrCOGq9gJOCCTmUdyjlGrWBX2BGGrFROSZorBl5TlUmopuWDKRk5wncanqO2NNH_diGXMG_uc_bH_Gu32pqPhfNjPB-doz_vNl2OQ6AK1yre1vYScX6qrytMfmgOugw
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2024+2nd+International+Conference+on+Signal+Processing+and+Intelligent+Computing+%28SPIC%29&rft.atitle=An+Information+Completion+Method+Based+on+Security+Knowledge+Graph+with+Fusing+Neighborhood+Information&rft.au=Wang%2C+Zhengxian&rft.au=Zhang%2C+Wenbo&rft.au=Dai%2C+Jiaxi&rft.date=2024-09-20&rft.pub=IEEE&rft.spage=303&rft.epage=307&rft_id=info:doi/10.1109%2FSPIC62469.2024.10691469&rft.externalDocID=10691469