Abstract
As cyberattacks continue to increase, detecting and performing remediation actions m is essential. This paper presents an approach to automate the countermeasures selection process to deal with a vulnerability exploitation performed by a cyberattack. We propose an approach to match two knowledge graphs, one from a vulnerability ontology, Vulnerability Description Ontology (VDO), and the other is the countermeasures knowledge graph, D3FEND, to mitigate cyberattack impacts. Our approach uses machine learning and an inference system to match entities from VDO and D3FEND to select candidate countermeasures to an attack. Our contribution aims to automatically select countermeasures intended to be part of an incident response playbook for a vulnerability. We show our approach application to a WannaCry use-case scenario. We validate our countermeasures selection approach by comparing the countermeasures automatically selected with those proposed in the literature for a WannaCry attack.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Adamov, A., Carlsson, A.: The state of ransomware. Trends and mitigation techniques. In: 2017 IEEE East-West Design Test Symposium (EWDTS), pp. 1–8 (2017)
Aljaidi, M., et al.: NHS WannaCry ransomware attack: technical explanation of the vulnerability, exploitation, and countermeasures. In: 2022 International Engineering Conference on Electrical, Energy, and Artificial Intelligence (EICEEAI), pp. 1–6. IEEE (2022)
Alshaikh, H., Ramadan, N., Ahmed, H.: Ransomware prevention and mitigation techniques. Int. J. Comput. Appl. 177(40), 31–39 (2020)
Azmy, M., Shi, P., Lin, J., Ilyas, I.F.: Matching entities across different knowledge graphs with graph embeddings. arXiv preprint arXiv:1903.06607 (2019)
Booth, H., Turner, C.: Vulnerability description ontology (VDO): a framework for characterizing vulnerabilities. Technical report, National Institute of Standards and Technology (2016)
CCCS: Security control catalogue (2012). https://www.cyber.gc.ca/en/guidance/annex-3a-security-control-catalogue-itsg-33
CIS: CIS critical security controls (2024). https://www.cisecurity.org/controls
Doynikova, E., Kotenko, I.: Countermeasure selection based on the attack and service dependency graphs for security incident management. In: Risks and Security of Internet and Systems: 10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, 20–22 July 2015, Revised Selected Papers 10, pp. 107–124. Springer (2016)
Emek, Y., Kutten, S., Shalom, M., Zaks, S.: Hierarchical b-matching. In: Bureš, T., et al. (eds.) SOFSEM 2021. LNCS, vol. 12607, pp. 189–202. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-67731-2_14
Gupta, M., Rees, J., Chaturvedi, A., Chi, J.: Matching information security vulnerabilities to organizational security profiles: a genetic algorithm approach. Decis. Support Syst. 41(3), 592–603 (2006)
Hogan, A., et al.: Knowledge graphs. ACM Comput. Surv. 54(4) (2021). https://doi.org/10.1145/3447772
Horridge, M., Knublauch, H., Rector, A., Stevens, R., Wroe, C.: A practical guide to building owl ontologies using the protégé-owl plugin and co-ode tools edition 1.0. University of Manchester (2004)
Hung, B.W.K., Jayasumana, A.P., Bandara, V.W.: Detecting radicalization trajectories using graph pattern matching algorithms. In: 2016 IEEE Conference on Intelligence and Security Informatics (ISI), pp. 313–315 (2016)
Kaloroumakis, P.E., Smith, M.J.: Toward a knowledge graph of cybersecurity countermeasures. Technical report (2021)
Kotenko, I., Doynikova, E.: Countermeasure selection in SIEM systems based on the integrated complex of security metrics. In: 2015 23rd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, pp. 567–574. IEEE (2015)
Li, Z., Zeng, J., Chen, Y., Liang, Z.: Attackg: constructing technique knowledge graph from cyber threat intelligence reports. In: European Symposium on Research in Computer Security, pp. 589–609. Springer (2022)
Ma, L., Zhang, Y.: Using word2vec to process big text data. In: 2015 IEEE International Conference on Big Data (Big Data), pp. 2895–2897. IEEE (2015)
Malik, A.W., Anwar, Z., Rahman, A.U.: A novel framework for studying the business impact of ransomware on connected vehicles. IEEE Internet Things J. 10(10), 8348–8356 (2023). https://doi.org/10.1109/JIOT.2022.3209687
Mos, M.A., Chowdhury, M.M.: The growing influence of ransomware. In: 2020 IEEE International Conference on Electro Information Technology (EIT), pp. 643–647 (2020). https://doi.org/10.1109/EIT48999.2020.9208254
Nespoli, P., Papamartzivanos, D., Gómez Mármol, F., Kambourakis, G.: Optimal countermeasures selection against cyber attacks: a comprehensive survey on reaction frameworks. IEEE Commun. Surv. Tutor. 20(2), 1361–1396 (2018). https://doi.org/10.1109/COMST.2017.2781126
Park, Y., Reeves, D., Mulukutla, V., Sundaravel, B.: Fast malware classification by automated behavioral graph matching. In: Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research. CSIIRW 2010. Association for Computing Machinery, New York (2010)
Pershina, M., Yakout, M., Chakrabarti, K.: Holistic entity matching across knowledge graphs. In: 2015 IEEE International Conference on Big Data (Big Data), pp. 1585–1590. IEEE (2015)
Portisch, J., Costa, G., Stefani, K., Kreplin, K., Hladik, M., Paulheim, H.: Ontology matching through absolute orientation of embedding spaces. In: The Semantic Web: ESWC 2022 Satellite Events: Hersonissos, Crete, Greece, 29 May–2 June 2022, Proceedings, pp. 153–157. Springer (2022)
Ristoski, P., Paulheim, H.: RDF2Vec: RDF graph embeddings for data mining. In: Groth, P., et al. (eds.) ISWC 2016. LNCS, vol. 9981, pp. 498–514. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-46523-4_30
Saint-Hilaire, K., Cuppens, F., Cuppens, N., Garcia-Alfaro, J.: Automated enrichment of logical attack graphs via formal ontologies. In: Meyer, N., Grocholewska-Czuryło, A. (eds.) ICT Systems Security and Privacy Protection, pp. 59–72. Springer, Cham (2024). https://doi.org/10.1007/978-3-031-56326-3_5
Saint-Hilaire, K., Cuppens, F., Cuppens-Boulahia, N., Hadji, M.: Optimal automated generation of playbooks. 38th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec 2024) (2024)
Šulc, V.: Current ransomware trends. In: International Days of Science, vol. 31 (2021)
Swarup, V.: Remediation graphs for security patch management. In: IFIP International Information Security Conference, pp. 17–28. Springer (2004)
Viduto, V., Maple, C., Huang, W., López-Peréz, D.: A novel risk assessment and optimisation model for a multi-objective network security countermeasure selection problem. Decis. Support Syst. 53(3), 599–610 (2012)
Zhang, Y., Jin, R., Zhou, Z.H.: Understanding bag-of-words model: a statistical framework. Int. J. Mach. Learn. Cybern. 1, 43–52 (2010)
Acknowledgements
This work was supported by the Mitacs Accelerate International program, IRT SystemX, and the Cyber Resilience of Transport Infrastructure and Supply Chains (CRITiCAL) Chair.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Appendix A Additional Background Definitions
Appendix A Additional Background Definitions
Word2Vec. Word2Vec [17] is a popular word embeddings model used to address the limitations of the bag-of-words model [30], which is a type of vector space model that simplifies text data representation in Natural Language Processing (NLP) and Information Retrieval (IR). A bag-of-words vector represents text describing the occurrence of words within a document. In Word2Vec, each token becomes a vector with the length of a determined number.
RDF2Vec. RDF2Vec, created by Ristoski et al. [24], is an unsupervised technique built on Word2Vec. RDF2Vec first creates sentences that can be fed to Word2Vec by extracting walks of a certain depth from a KG to make the embedding. A vector of latent numerical features represents each entity in the KG. We calculate the similarity of the vectors to match their embeddings using a distance metric.
Cosine Similarity. Cosine similarity is a metric for measuring distance when the magnitude of the vectors does not matter. Mathematically, cosine similarity calculates the cosine of the angle between two vectors projected in a multi-dimensional space. Considering two vectors A and B; we can measure their cosine similarity using Formula 1.
where, A.B is the dot product of the vectors A and B, ||A|| and ||B|| are the length (magnitude) of the two vectors A and B, and ||A||||B|| is the regular product of the vectors A and B.
If \(A=B\), \(\cos (AB)=1\); in this case A and B are fully similar. If \(A.B=0\), then A and B are in opposite directions, so A.B is negative, and one or both vectors are zero vectors, \(\cos (AB)=0\); in this case A and B are opposite.
Precision. Precision measures the number of positive prediction correctly predicted. So, it is calculated by dividing the number of true positive prediction (TP) by all positive prediction i.e. True Positive (TP) + False Positive (FP).
Recall. Recall gives a percentage of true positives instances by a model. It is the number of well predicted positives divided by the total number of positives (True Positive + False Negative (FN)).
F1 Score. Either precision and recall can not evaluate a machine learning model separately. F1 score allows combining precision and recall. So, it can provide a good evaluation of a model performance. It is calculating as follow:
Rights and permissions
Copyright information
© 2025 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Saint-Hilaire, K.A., Neal, C., Cuppens, F., Boulahia-Cuppens, N., Hadji, M. (2025). Matching Knowledge Graphs for Cybersecurity Countermeasures Selection. In: Zhao, J., Meng, W. (eds) Science of Cyber Security. SciSec 2024. Lecture Notes in Computer Science, vol 15441. Springer, Singapore. https://doi.org/10.1007/978-981-96-2417-1_7
Download citation
DOI: https://doi.org/10.1007/978-981-96-2417-1_7
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-96-2416-4
Online ISBN: 978-981-96-2417-1
eBook Packages: Computer ScienceComputer Science (R0)