An Information Completion Method Based on Security Knowledge Graph with Fusing Neighborhood Information
In the research of knowledge graph completion, the issue of missing information in open-source network security knowledge repositories has persisted due to challenges such as difficulty in coordinating heterogeneous information and maintaining historical data. To address the problem of insufficient...
Saved in:
Published in | 2024 2nd International Conference on Signal Processing and Intelligent Computing (SPIC) pp. 303 - 307 |
---|---|
Main Authors | , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
20.09.2024
|
Subjects | |
Online Access | Get full text |
DOI | 10.1109/SPIC62469.2024.10691469 |
Cover
Abstract | In the research of knowledge graph completion, the issue of missing information in open-source network security knowledge repositories has persisted due to challenges such as difficulty in coordinating heterogeneous information and maintaining historical data. To address the problem of insufficient feature learning from different domains in existing information completion methods, a information completion method based on security knowledge graph with fusing neighborhood information (KGC-N), is proposed. To capture neighborhood information, this method constructs a security knowledge graph associated with the Structured Threat Information Expression (STIX 2.1) open-source network security knowledge repository. During the data preprocessing phase, Global Vectors for Word Representation (GloVe) is used to enhance the model's training effectiveness. Leveraging graph traversal techniques, it captures neighborhood information with various relationships within a multi-hop range through the knowledge graph. The captured neighborhood features are then learned using a Graph Attention Network to enhance the model's predictive performance. Experimental results indicate that KGC-N achieves a Mean Ranking of 196 and a Mean Reciprocal Ranking of 0.6127, outperforming baseline methods. |
---|---|
AbstractList | In the research of knowledge graph completion, the issue of missing information in open-source network security knowledge repositories has persisted due to challenges such as difficulty in coordinating heterogeneous information and maintaining historical data. To address the problem of insufficient feature learning from different domains in existing information completion methods, a information completion method based on security knowledge graph with fusing neighborhood information (KGC-N), is proposed. To capture neighborhood information, this method constructs a security knowledge graph associated with the Structured Threat Information Expression (STIX 2.1) open-source network security knowledge repository. During the data preprocessing phase, Global Vectors for Word Representation (GloVe) is used to enhance the model's training effectiveness. Leveraging graph traversal techniques, it captures neighborhood information with various relationships within a multi-hop range through the knowledge graph. The captured neighborhood features are then learned using a Graph Attention Network to enhance the model's predictive performance. Experimental results indicate that KGC-N achieves a Mean Ranking of 196 and a Mean Reciprocal Ranking of 0.6127, outperforming baseline methods. |
Author | Zhang, Wenbo Wang, Zhengxian Dai, Jiaxi |
Author_xml | – sequence: 1 givenname: Zhengxian surname: Wang fullname: Wang, Zhengxian organization: Shenyang Ligong University,School of Information Science and Engineering,Shenyang,China – sequence: 2 givenname: Wenbo surname: Zhang fullname: Zhang, Wenbo organization: Shenyang Ligong University,School of Information Science and Engineering,Shenyang,China – sequence: 3 givenname: Jiaxi surname: Dai fullname: Dai, Jiaxi email: 2551107732@qq.com organization: Shenyang Urban Construction University,Shenyang,China |
BookMark | eNpNj8lqwzAYhFVoD22aNyhUL2BXmxcdU9MkpukCyT3Y_n_ZAlsytkPI29d0gc5l5jvMwNyRa-cdEvLIWcg500_7zzyLhYp1KJhQIWex5jNdkaVOdCojJuN01i2pV47mzvihKybrHc1817f4Hd9wajzQ52JEoDPvsToNdrrQV-fPLUKNdDMUfUPPdmro-jRaV9N3tHVT-qHxc_Xf8D25MUU74vLXF-Swfjlk22D3scmz1S6wmk8BmKoEyaKKaRAJoJIgASIpIlRJkqoUlDbSYFJJYwwaAUnJjZ4LaZEyzeSCPPzMWkQ89oPtiuFy_LsvvwCdb1dP |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/SPIC62469.2024.10691469 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 9798350368888 |
EndPage | 307 |
ExternalDocumentID | 10691469 |
Genre | orig-research |
GroupedDBID | 6IE 6IL CBEJK RIE RIL |
ID | FETCH-LOGICAL-i91t-dfcbd305c09d27de43d3dd5325e477848d49f3fe7c3fffef2d7b1f905c8a80903 |
IEDL.DBID | RIE |
IngestDate | Wed Oct 09 06:12:57 EDT 2024 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i91t-dfcbd305c09d27de43d3dd5325e477848d49f3fe7c3fffef2d7b1f905c8a80903 |
PageCount | 5 |
ParticipantIDs | ieee_primary_10691469 |
PublicationCentury | 2000 |
PublicationDate | 2024-Sept.-20 |
PublicationDateYYYYMMDD | 2024-09-20 |
PublicationDate_xml | – month: 09 year: 2024 text: 2024-Sept.-20 day: 20 |
PublicationDecade | 2020 |
PublicationTitle | 2024 2nd International Conference on Signal Processing and Intelligent Computing (SPIC) |
PublicationTitleAbbrev | SPIC |
PublicationYear | 2024 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
Score | 1.8853321 |
Snippet | In the research of knowledge graph completion, the issue of missing information in open-source network security knowledge repositories has persisted due to... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 303 |
SubjectTerms | Attention mechanism Data augmentation Decoding Dilated convolution Knowledge engineering Knowledge graphs Network security pedestrian detection Pedestrians Personnel Predictive models Representation learning Training Vectors |
Title | An Information Completion Method Based on Security Knowledge Graph with Fusing Neighborhood Information |
URI | https://ieeexplore.ieee.org/document/10691469 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8NAEF5sT55UrPhmD14Tk81uNnvUYq1KS6EVeiv7mC0ipFLSi7_e2TTxBYK3zTvM7GSSL_N9Q8gVK0yWa-7x6WeyiJtERyblIhIWmBNMQFGTwkbjfPjMH-di3pDVay4MANTFZxCHYf0v363sJkBlGOG5wshWHdLBebYlazU1W2mirqeTh37OcDt-9jEet3v_6JtSp43BHhm3F9xWi7zGm8rE9v2XFuO_72if9L4YenTymXsOyA6Uh2R5U9KGXhTMTUOsB21tHI7qRtH0FnOWo7g8bdrW0acWU6P3QbqaBlyWDkI1_JKOA2yKcyQoH38_cY_MBnez_jBqGilELyqtIuetcRjXNlGOSQc8c5lzIkNPcCkLXjiufOZB2sx7D545aVKv8IBCFwHHOSLdclXCMaFgjVCaF0bgexRIra3WUgkDiVfS5ukJ6QUjLd62UhmL1j6nf6w_I7vBV6EAgyXnpFutN3CBWb4yl7V3PwB4vas2 |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8NAEF60HvSkYsW3e_CamGx2s9mjFmtr21Bohd7KPosUUpH04q93Nk18geBtEzYPZjKZ7Jf5vkHohmQqSSV18PZTSUBVJAMVUxYwbYlhhNmsIoWN8rT3TJ9mbFaT1SsujLW2Kj6zoR9W__LNSq89VAYRngqIbLGNdiDxU7aha9VVW3EkbifjficlMAMWfoSGzfwfnVOqxNHdR3lzyU29yDJclyrU77_UGP99Tweo_cXRw-PP7HOItmxxhBZ3Ba4JRt7g2Ee7V9eG4ahqFY3vIWsZDNuTunEdHjSoGn704tXYI7O46-vhFzj3wCk8JV77-PuJ22jafZh2ekHdSiF4EXEZGKeVgcjWkTCEG0sTkxjDEvAF5TyjmaHCJc5ynTjnrCOGq9gJOCCTmUdyjlGrWBX2BGGrFROSZorBl5TlUmopuWDKRk5wncanqO2NNH_diGXMG_uc_bH_Gu32pqPhfNjPB-doz_vNl2OQ6AK1yre1vYScX6qrytMfmgOugw |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2024+2nd+International+Conference+on+Signal+Processing+and+Intelligent+Computing+%28SPIC%29&rft.atitle=An+Information+Completion+Method+Based+on+Security+Knowledge+Graph+with+Fusing+Neighborhood+Information&rft.au=Wang%2C+Zhengxian&rft.au=Zhang%2C+Wenbo&rft.au=Dai%2C+Jiaxi&rft.date=2024-09-20&rft.pub=IEEE&rft.spage=303&rft.epage=307&rft_id=info:doi/10.1109%2FSPIC62469.2024.10691469&rft.externalDocID=10691469 |