Skip to main content

CSKB: A Cyber Security Knowledge Base Based on Knowledge Graph

  • Conference paper
  • First Online:
Security and Privacy in Digital Economy (SPDE 2020)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1268))

Included in the following conference series:

Abstract

The access of massive terminal devices has brought new security risks to the existing Internet, so traditional cybersecurity data sets are difficult to reflect the modern and complex network attack environment. Therefore, how to realize the standardization and integration of cybersecurity data, so as to continuously store and update malicious traffic information under massively connected terminals, has become a critical issue to be solved urgently. Therefore, based on the knowledge graph, we built a standardized cybersecurity ontology, and introduced the implementation process of the cybersecurity knowledge base (CSKB) from five stages of knowledge acquisition, knowledge fusion/extraction, know-ledge storage, knowledge inference, and knowledge update, aiming at providing a reliable basis for real-time cybersecurity protection solutions. Experiments prove that the knowledge stored in CSKB can effectively realize the specification and integration of security data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Yu, S., Liu, M., Dou, W., Liu, X., Zhou, S.: Networking for big data: a survey. IEEE Commun. Surv. Tutor. 19(1), 531–549 (2017)

    Article  Google Scholar 

  2. Feng, B., Zhou, H., Zhang, H., et al.: HetNet: a flexible architecture for heterogeneous satellite-terrestrial networks. IEEE Network 31(6), 86–92 (2017)

    Article  Google Scholar 

  3. KDD99 (2007). kdd.ics.uci.edu/databases/

  4. NSLKDD (2009). nsl.cs.unb.ca/NSLKDD/

  5. Moustafa, N., Slay, J.: UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: 2015 Military Communications and Information Systems Conference (MilCIS), Canberra, ACT, pp. 1–6 (2015)

    Google Scholar 

  6. Sharafaldin, I., Lashkari, A.H., Hakak, S., Ghorbani, A.A.: Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy. In: 2019 International Carnahan Conference on Security Technology (ICCST), Chennai, India, pp. 1–8 (2019)

    Google Scholar 

  7. Yu, S.: Big privacy: challenges and opportunities of privacy study in the age of big data. IEEE Access 4, 2751–2763 (2016)

    Article  Google Scholar 

  8. Song, Q., Wu, Y., Lin, P., Dong, L.X., Sun, H.: Mining summaries for knowledge graph search. IEEE Trans. Knowl. Data Eng. 30(10), 1887–1900 (2018)

    Article  Google Scholar 

  9. Yu, S., Zhou, W., Guo, S., Guo, M.: A feasible IP traceback framework through dynamic deterministic packet marking. IEEE Trans. Comput. 65(5), 1418–1427 (2016)

    Article  MathSciNet  Google Scholar 

  10. Zhu, Z., Jiang, R., Jia, Y., Xu, J., Li, A.: Cyber security knowledge graph based cyber attack attribution framework for space-ground integration information network. In: 2018 IEEE 18th International Conference on Communication Technology (ICCT), Chongqing, pp. 870–874 (2018)

    Google Scholar 

  11. Yu, S., Zhou, W., Jia, W., Guo, S., Xiang, Y., Tang, F.: Discriminating DDoS attacks from flash crowds using flow correlation coefficient. IEEE Trans. Parallel Distrib. Syst. 23(6), 1073–1080 (2012)

    Article  Google Scholar 

  12. Yu, S., Wang, G., Zhou, W.: Modeling malicious activities in cyber space. IEEE Network 29(6), 83–87 (2015)

    Article  Google Scholar 

  13. Neo4j (2020). neo4j.com/

  14. Feng, B., Zhang, H., Zhou, H., Yu, S.: Locator/identifier split networking: a promising future internet architecture. IEEE Commun. Surv. Tutor. 19(4), 2927–2948 (2017)

    Article  Google Scholar 

  15. Xu, G., Cao, Y., Ren, Y., Li, X., Feng, Z.: Network security situation awareness based on semantic ontology and user-defined rules for internet of things. IEEE Access 5, 21046–21056 (2017)

    Article  Google Scholar 

  16. Islam, C., Babar, M.A., Nepal, S.: An ontology-driven approach to automating the process of integrating security software systems. In: 2019 IEEE/ACM International Conference on Software and System Processes (ICSSP), Montreal, QC, Canada, pp. 54–63 (2019)

    Google Scholar 

  17. CICFlowMeter (2017). www.github.com/ISCX/

  18. TensorFlow (2020). https://tensorflow.google.cn/

Download references

Acknowledgement

This paper is supported by National Key R&D Program of China under Grant No. 2018YFA0701604, NSFC under Grant No. 61802014, No. U1530118, and National High Technology of China (“863 program”) under Grant No. 2015AA015702.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Huachun Zhou .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Li, K., Zhou, H., Tu, Z., Feng, B. (2020). CSKB: A Cyber Security Knowledge Base Based on Knowledge Graph. In: Yu, S., Mueller, P., Qian, J. (eds) Security and Privacy in Digital Economy. SPDE 2020. Communications in Computer and Information Science, vol 1268. Springer, Singapore. https://doi.org/10.1007/978-981-15-9129-7_8

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-9129-7_8

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-9128-0

  • Online ISBN: 978-981-15-9129-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics