Affiliation:
1. Command and Control Engineering College, Army Engineering University of PLA, Nanjing, China
2. Advanced Institute of Big Data, Beijing, China
Abstract
Because multiple domain cyberspace joint attacks are becoming more widespread, establishing a multiple domain cyberspace defensive paradigm is becoming more vital. However, although some physical domain and social domain information is incorporated in present approaches, total modeling of cyberspace is absent, therefore thorough modeling of cyberspace is becoming increasingly necessary. This paper proposed a knowledge graph based multiple domain cyberspace modeling approach. A knowledge graph of multiple domain cyberspace is produced by extracting multiple domain entity information and entity relations such as physical domain, social domain, network domain, and information domain, so that semantic information of multiple domain cyberspace may be described consistently. At the same time, this paper proposed a user’s permissions reasoning method based on multiple domain cyberspace knowledge graph to address the user’s permissions reasoning that relies on artificial reasoning principles. Through the model learning knowledge graph triples characteristics and rules, and implementing automatic reasoning of user’s permissions, this proposed method can abandon the artificial model of writing reasoning rules, allowing the machine to learn the reasoning rules using machine learning and other methods. Experimental results showed that the proposed method can learn relevant reasoning rules and accomplish automated reasoning of user’s permissions, and that the method’s accuracy and recall rates are higher than those of path ranking and translating embeddings.
Subject
Artificial Intelligence,General Engineering,Statistics and Probability
Reference11 articles.
1. Overview of knowledge map for cyber space security intelligence;Dong;Journal of Cyber Security,2020
2. Knowledge Graph Oriented Information Extraction;Zhao;Hans Journal of Data Mining,2020
3. Research on knowledge graph data management: A survey,;Wang;Journal of Software,2019
4. Undercoffer J. , Joshi A. , Pinkston J. Modeling computer attacks: An ontology for intrusion detection, In: Proceedings of the Recent advances in intrusion detection, 2003 Sep 8-10
5. Pittsburgh, PA, USA. Berlin: Springer, 2003, pp. 113-135
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Knowledge-based Research on Automation Engines;2024 IEEE 10th International Conference on Edge Computing and Scalable Cloud (EdgeCom);2024-06-28