Journal of Xidian University ›› 2023, Vol. 50 ›› Issue (4): 65-75.doi: 10.19665/j.issn1001-2400.2023.04.007
• Special Issue on Cyberspace Security • Previous Articles Next Articles
SHI Huiyang1,2(),WEI Jingxuan3(),CAI Xingye3(),WANG He4(),GAO Suixiang5,6(),ZHANG Yuqing1,2,4,6()
Received:
2023-01-19
Online:
2023-08-20
Published:
2023-10-17
Contact:
Yuqing ZHANG
E-mail:shihuiyang@ucas.ac.cn;weijingxuan20@mails.ucas.edu.cn;caixingye20@mails.ucas.ac.cn;hewang@xidian.edu.cn;sxgao@ucas.ac.cn;zhangyq@nipc.org.cn
CLC Number:
SHI Huiyang,WEI Jingxuan,CAI Xingye,WANG He,GAO Suixiang,ZHANG Yuqing. Research on threat intelligence extraction and knowledge graph construction technology[J].Journal of Xidian University, 2023, 50(4): 65-75.
[1] |
PADIA A, KALPAKIS K, FERRARO F, et al. Knowledge Graph Fact Prediction via Knowledge-Enriched Tensor Factorization[J]. Journal of Web Semantics, 2019, 59:100497.
doi: 10.1016/j.websem.2019.01.004 |
[2] |
GONG S, LEE C. Blocis:Blockchain-Based Cyber Threat Intelligence Sharing Framework for Sybil-Resistance[J]. Electronics, 2020, 9(3):521.
doi: 10.3390/electronics9030521 |
[3] | PUROHIT S, CALYAM P, WANG S, et al. Defensechain:Consortium Blockchain for Cyber Threat Intelligence Sharing and Defense[C]// 2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS).Piscataway:IEEE, 2020:112-119. |
[4] | TRAN H N, TAKASU A. Analyzing Knowledge Graph Embedding Methods from a Multi-Embedding Interaction Perspective (2019)[J/OL].[2019-03-27]. https://arxiv.org/abs/1903.11406v2. |
[5] | 何志鹏, 刘鹏, 王鹤. 网络威胁情报标准化建设分析[J]. 信息安全研究, 2021, 7(6):503-511. |
HE Zhipeng, LIU Peng, WANG He. Analysis of the Standardization Construction of Network Threat Intelligence[J]. Information Security Research, 2021, 7(6):503-511. | |
[6] | 孙铭鸿, 蔡蓓蓓. 基于情报、威胁框架等方式追踪溯源方法研究[J]. 江苏通信, 2022, 38(3):109-112. |
SUN Minghong, CAI Beibei. Research on Traceability Methods Based on Intelligence,Threat Framework,and Other Methods[J]. Jiangsu Communication, 2022, 38(3):109-112. | |
[7] | 徐留杰, 翟江涛, 杨康, 等. 一种多源网络安全威胁情报采集与封装技术[J]. 网络安全技术与应用, 2018, 214(10):26-29. |
XU Liujie, ZHAI Jiangtao, YANG Kang, et al. A Multi-Source Network Security Threat Intelligence Collection and Packaging Technology[J]. Network Security Technology and Application, 2018, 214(10):26-29. | |
[8] | HUANG Z, WEI X, KAI Y. Bidirectional LSTM-CRF Models for Sequence Tagging (2015)[J/OL].[2015-08-09]. https://arxiv.org/abs/1508.01991. |
[9] | LONG Z, TAN L, ZHOU S, et al. Collecting Indicators of Compromise from Unstructured Text of Cybersecurity Articles Using Neural-Based Sequence Labelling[C]// 2019 International Joint Conference on Neural Networks (IJCNN).Piscataway:IEEE, 2019:1-8. |
[10] | LAMPLE G, BALLESTEROS M, SUBRAMANIAN S, et al. Neural Architectures for Named Entity Recognition(2016)[C/OL].[2016-03-04]. https://arxiv.org/abs/1603.01360v1. |
[11] | LANDAUER M, SKOPIK F, WURZENBERGER M, et al. A Framework for Cyber Threat Intelligence Extraction from Raw Log Data[C]// 2019 IEEE International Conference on Big Data (Big Data).Piscataway:IEEE, 2019:3200-3209. |
[12] | KUROGOME Y, OTSUKI Y, KAWAKOYA Y, et al. EIGER:Automated IOC Generation for Accurate and Interpretable Endpoint Malware Detection[C]// Proceedings of the 35th Annual Computer Security Applications Conference. New York: ACM, 2019:687-701. |
[13] | 胡代旺, 焦一源, 李雁妮. 一种新型高效的文库知识图谱实体关系抽取算法[J]. 西安电子科技大学学报, 2021, 48(6):75-83. |
HU Daiwang, JIAO Yiyuan, LI Yanni. A Novel and Efficient Algorithm for Extracting Entity Relationships from Library Knowledge Graph[J]. Journal of Xidian University, 2021, 48(6):75-83. | |
[14] |
郭渊博, 李勇飞, 陈庆礼, 等. 融合Focal Loss的网络威胁情报实体抽取[J]. 通信学报, 2022, 43(7):85-92.
doi: 10.11959/j.issn.1000-436x.2022132 |
GUO Yuanbo, LI Yongfei, CHEN Qingli, et al. Fusion of Focal Loss for Network Threat Intelligence Entity Extraction[J]. Journal of Communications, 2022, 43(7):85-92.
doi: 10.11959/j.issn.1000-436x.2022132 |
|
[15] |
程顺航, 李志华, 魏涛. 融合自举与语义角色标注的威胁情报实体关系抽取方法[J]. 计算机应用, 2023, 43(5):1445-1453.
doi: 10.11772/j.issn.1001-9081.2022040551 |
CHENG Shunhang, LI Zhihua, WEI Tao. A Threat Intelligence Entity Relationship Extraction Method Combining Bootstrap and Semantic Role Annotation[J]. Computer Applications, 2023, 43(5):1445-1453.
doi: 10.11772/j.issn.1001-9081.2022040551 |
|
[16] | 石波, 于然, 朱健. 基于知识图谱的网络空间安全威胁感知技术研究[J]. 信息安全研究, 2022, 8(8):845-853. |
SHI Bo, YU Ran, ZHU Jian. Research on Threat Perception Technology for Cyberspace Security Based on Knowledge Graph[J]. Information Security Research, 2022, 8(8):845-853. | |
[17] |
董聪, 姜波, 卢志刚, 等. 面向网络空间安全情报的知识图谱综述[J]. 信息安全学报, 2020, 5(5):56-76.
doi: 10.4236/jis.2014.52006 |
DONG Cong, JIANG Bo, LU Zhigang, et al. A Survey of Knowledge Map for Cyberspace Security Intelligence[J]. Journal of Information Security, 2020, 5(5):56-76.
doi: 10.4236/jis.2014.52006 |
|
[18] | WU S, ZHANG Y, CAO W. Network Security Assessment Using a Semantic Reasoning and Graph Based Approach[J]. Computers & Electrical Engineering, 2017, 64:96-109. |
[19] | 刘强, 祝鹏程. 基于联合学习的端到端威胁情报知识图谱构建方法[J]. 现代计算机, 2021, 16:16-21. |
LIU Qiang, ZHU Pengcheng. A Method for Constructing an End-to-End Threat Intelligence Knowledge Graph Based on Joint Learning[J]. Modern Computer Science, 2021, 16:16-21. | |
[20] | GONG N Z, LIU B. You are Who You Know and How You Behave:Attribute Inference Attacks via Users' Social Friends and Behaviors[C]// Proceedings of the 25th USENIX Conference on Security Symposium. New York: ACM, 2016:979-995. |
[21] | GASCON H, GROBAUER B, SCHRECK T, et al. Mining Attributed Graphs for Threat Intelligence[C]// ACM on Conference on Data Application Security Privacy. New York: ACM, 2017:15-22. |
[22] | XU X, CHANG L, QIAN F, et al. Neural Network-Based Graph Embedding for Cross-Platform Binary Code Similarity Detection[C]// Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, 2017:363-376. |
[23] |
ZHANG K, LIU J. Review on the Application of Knowledge Graph in Cyber Security Assessment[J]. IOP Conference Series:Materials Science and Engineering, 2020, 768(5):052103.
doi: 10.1088/1757-899X/768/5/052103 |
[24] |
LIU L, TSAI W T, BHUIYAN M Z A, et al. Automatic Blockchain Whitepapers Analysis via Heterogeneous Graph Neural Network[J]. Journal of Parallel and Distributed Computing, 2020, 145:1-12.
doi: 10.1016/j.jpdc.2020.05.014 |
[25] |
OUYANG S, DONG D, XU Y, et al. Communication Optimization Strategies for Distributed Deep Neural Network Training:A Survey[J]. Journal of Parallel and Distributed Computing, 2021, 149:52-65.
doi: 10.1016/j.jpdc.2020.11.005 |
[26] | MAVROEIDIS V, BROMANDER S. Cyber Threat Intelligence Model:An Evaluation of Taxonomies,Sharing Standards,and Ontologies within Cyber Threat Intelligence[C]// 2017 European Intelligence and Security Informatics Conference (EISIC).Piscataway:IEEE, 2017:91-98. |
[27] | MOUBARAK J, BASSIL C, ANTOUN J. On the Dissemination of Cyber Threat Intelligence Through Hyperledger[C]// 2021 17th International Conference on the Design of Reliable Communication Networks (DRCN).Piscataway:IEEE, 2021:1-6. |
[28] |
崔琳, 杨黎斌, 何清林, 等. 基于开源信息平台的威胁情报挖掘综述[J]. 信息安全学报, 2022, 7(1):1-26.
doi: 10.4236/jis.2016.71001 |
CUI Lin, YANG Libin, HE Qinglin, et al. A Review of Threat Intelligence Mining Based on Open Source Information Platform[J]. Journal of Information Security, 2022, 7(1):1-26.
doi: 10.4236/jis.2016.71001 |
|
[29] | 左开中, 刘蕊, 赵俊, 等. 融合语义信息的时空关联位置隐私保护方法[J]. 西安电子科技大学学报, 2022, 49(1):67-77. |
ZUO Kaizhong, LIU Rui, ZHAO Jun, et al. Method for the Protection of Spatiotemporal Correlation Location Privacy with Semantic Information[J]. Journal of XidIan University, 2022, 49(1):67-77. |
[1] | FAN Wentong,LI Zhenyu,ZHANG Tao,LUO Xiangyang. JPEG image steganalysis based on deep extraction of stego noise [J]. Journal of Xidian University, 2023, 50(4): 157-169. |
[2] | DONG Meng,GAO Yiming,PAN Weitao,QIU Zhiliang,YANG Jianlei,DI Zhixiong,ZHENG Ling. RELIC-GNN:an efficient state register identification algorithm [J]. Journal of Xidian University, 2023, 50(3): 142-150. |
[3] | CAI Gouqing,LIU Ling,ZHANG Chong,ZHOU Yiqing. Algorithm for prediction of the 6G vehicle trajectory based on the GNN-LSTM-CNN network [J]. Journal of Xidian University, 2023, 50(3): 50-60. |
[4] | CHEN Yong,NIU Kaiyu,KANG Jie. Handover algorithm for a high-speed railway based on the LSTM recurrent neural network [J]. Journal of Xidian University, 2023, 50(1): 76-84. |
[5] | ZHANG Zehuan, LIU Qiang, GUO Difei. High efficient framework for large-scale zero-shot image recognition [J]. Journal of Xidian University, 2022, 49(6): 103-110. |
[6] | WANG Kan, WANG Mengyang, LIU Xin, TIAN Guoqiang, LI Chuan, LIU Wei. Event detection by combining self-attention and CNN-BiGRU [J]. Journal of Xidian University, 2022, 49(5): 181-188. |
[7] | MA Lun,LIU Xin,ZHAO Bin,WANG Ruiping,LIAO Guisheng,ZHANG Yajing. Impaired behavior recognition by using the multi-head-siamese neural network [J]. Journal of Xidian University, 2022, 49(4): 100-108. |
[8] | JING Peiguang,LI Yaxin,SU Yuting. Micro-video multi-label classification method based on multi-modal feature encoding [J]. Journal of Xidian University, 2022, 49(4): 109-117. |
[9] | JIANG Fang,HUANG Xing,HU Mengyu,WANG Yi,XU Yaohua,HU Yanjun. Denoising autoencoder-aided downlink MIMO-SCMA codec method [J]. Journal of Xidian University, 2022, 49(3): 74-82. |
[10] | SHI Jiarong,LI Jinhong. Novel deep matrix factorization and its application in the recommendation system [J]. Journal of Xidian University, 2022, 49(3): 171-182. |
[11] | SHI Yunlong,YUAN Wenhao,HU Shaodong,LOU Yingxi. Convolutional quasi-recurrent network for real-time speech enhancement [J]. Journal of Xidian University, 2022, 49(3): 183-190. |
[12] | ZHOU Peng,YANG Jun. Index edge geometric convolution neural network for point cloud classification [J]. Journal of Xidian University, 2022, 49(2): 207-217. |
[13] | ZHANG Min,JIA Hairong,ZHANG Gangmin,WANG Suying. Speech enhancement combining the self-adaptive soft mask and mixed features [J]. Journal of Xidian University, 2022, 49(2): 108-115. |
[14] | WANG Le,ZHAO Peiyao,WANG Lanmei,WANG Guibao. Parameter estimation of the near-field source using the PCA-BPalgorithm with the array error [J]. Journal of Xidian University, 2022, 49(1): 181-187. |
[15] | WANG Yong,WANG Xiyuan,REN Zeyang. Algorithm for gradient optimization of hybrid precoding based on DNN in the millimeter wave MIMO system [J]. Journal of Xidian University, 2022, 49(1): 202-207. |
|