Data-Driven Cybersecurity Knowledge Graph Construction for Industrial Control System Security

Author:

Shen Guowei123ORCID,Wang Wanling1,Mu Qilin23,Pu Yanhong23,Qin Ya1,Yu Miao4ORCID

Affiliation:

1. Guizhou Provincial Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang 550025, China

2. Big Data Application on Improving Government Governance Capabilities National Engineering Laboratory, Guiyang 550022, China

3. CETC Big Data Research Institute Co., Ltd., Guiyang 550022, China

4. Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China

Abstract

Industrial control systems (ICS) involve many key industries, which once attacked will cause heavy losses. However, traditional passive defense methods of cybersecurity have difficulty effectively dealing with increasingly complex threats; a knowledge graph is a new idea to analyze and process data in cybersecurity analysis. We propose a novel overall framework of data-driven industrial control network security defense, which integrated fragmented multisource threat data with an industrial network layout by a cybersecurity knowledge graph. In order to better correlate data to construct a knowledge graph, we propose a distant supervised relation extraction model ResPCNN-ATT; it is based on a deep residual convolutional neural network and attention mechanism, reduces the influence of noisy data in distant supervision, and better extracts deep semantic features in sentences by using deep residuals. We empirically demonstrate the performance of the proposed method in the field of general cybersecurity by using dataset CSER; the model proposed in this paper achieves higher accuracy than other models. And then, the dataset ICSER was used to construct a cybersecurity knowledge graph (CSKG) on the basis of analyzing specific industrial control scenarios, visualizing the knowledge graph for further security analysis to the industrial control system.

Funder

Big Data Application on Improving Government Governance Capabilities National Engineering Laboratory Open Fund Project

Publisher

Hindawi Limited

Subject

Electrical and Electronic Engineering,Computer Networks and Communications,Information Systems

Reference33 articles.

1. W32. Stuxnet dossier;N. Falliere;White paper, Symantec Corporation Security Response,2011

2. Vulnerability Analysis of Network Scanning on SCADA Systems

3. Cultivate the 5G+ industrial internet to promote mutual progress-interpretation of "5G+ industrial internet" 512 project promotion program;L. Zhen;Network Security and Informatization,2020

4. A Systematic Framework to Generate Invariants for Anomaly Detection in Industrial Control Systems

Cited by 16 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. A survey on cybersecurity knowledge graph construction;Computers & Security;2024-01

2. English Translation Stylistic Features and Syntax Translation with Application of Knowledge Mapping;Applied Mathematics and Nonlinear Sciences;2023-11-20

3. Knowledge Graphs for Cybersecurity: A Framework for Honeypot Data Analysis;2023 IEEE International Conference on Cryptography, Informatics, and Cybersecurity (ICoCICs);2023-08-22

4. Infer the missing facts of D3FEND using knowledge graph representation learning;International Journal of Web Information Systems;2023-08-16

5. Data collection optimization of ocean observation network based on AUV path planning and communication;Ocean Engineering;2023-08

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3