【打印本页】      【下载PDF全文】   查看/发表评论  下载PDF阅读器  关闭
←前一篇|后一篇→ 过刊浏览    高级检索
本文已被:浏览 10020次   下载 12523 本文二维码信息
码上扫一扫!
面向网络空间安全情报的知识图谱综述
董聪,姜波,卢志刚,刘宝旭,李宁,马平川,姜政伟,刘俊荣
分享到: 微信 更多
(中国科学院信息工程研究所 北京 中国 100093;中国科学院大学网络空间安全学院 北京 中国 100049)
摘要:
随着网络空间安全情报在网络犯罪、网络战和网络反恐等领域的作用日益凸显,迫切需要对网络空间安全情报的基本理论和综合分析方法进行深入研究。当前,安全情报在实际应用中主要面临着数据类型多样、分布离散、内容不一致等问题,因此引入知识图谱技术框架,旨在利用知识图谱面向海量数据时信息收集及加工整合的思想,提高安全情报的收集效率、情报质量,同时拓展情报的使用范围。本文首先简要回顾安全情报和知识图谱的研究现状,同时介绍知识图谱在安全领域的应用。其次给出面向安全情报的知识图谱构建框架。然后介绍安全情报知识图谱构建的关键技术,包括信息抽取、本体构建和知识推理等。最后,对安全情报知识图谱发展面临的问题进行了讨论。
关键词:  网络空间安全  安全情报  知识图谱  信息抽取  本体构建  知识推理
DOI:10.19363/J.cnki.cn10-1380/tn.2020.09.05
投稿时间:2018-08-02修订日期:2018-11-04
基金项目:本论文获得中国科学院网络测评技术重点实验室和网络安全防护技术北京市重点实验室,国家自然科学青年基金(No.61702508,No.61802404)、北京市科委重大研究项目(No.D181100000618003)、中国科学院战略性先导C类(No.XDC02000000)资助。
Knowledge Graph for Cyberspace Security Intelligence: A Survey
DONG Cong,JIANG Bo,LU Zhigang,LIU Baoxu,LI Ning,MA Pingchuan,JIANG Zhengwei,LIU Junrong
Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China;School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China
Abstract:
With the increasingly prominent application and role of cyberspace security intelligence in cybercrime, cyberwarfare, and network counter-terrorism, it's urgent to intensive study the basic theories and effective extraction methods of cyberspace security intelligence. At present, security intelligence mainly faces the problems of diverse data types, discrete distribution, and inconsistent content. Therefore, the knowledge graph technology framework is introduced to improve the security intelligence, which aims at using the knowledge graph to solve the problem of the information collection and processing integration of massive data, improving the collection efficiency and intelligence quality of security intelligence. This paper first briefly reviews the research status of security intelligence and knowledge graph, and shows the application cases of the knowledge graph of security intelligence in intelligence analysis. Second, it summarizes the framework for building a knowledge graph of security intelligence. Then, it introduces the key technologies for the construction of security knowledge graph, including information extraction, ontology construction and knowledge reasoning. Finally, the issues facing the development of security intelligence knowledge maps are discussed.
Key words:  cyber security  security intelligence  knowledge graph  information extraction  ontology construction  knowledge inference