期刊文献+

面向网络空间安全情报的知识图谱综述 被引量:23

Knowledge Graph for Cyberspace Security Intelligence:A Survey
下载PDF
导出
摘要 随着网络空间安全情报在网络犯罪、网络战和网络反恐等领域的作用日益凸显,迫切需要对网络空间安全情报的基本理论和综合分析方法进行深入研究。当前,安全情报在实际应用中主要面临着数据类型多样、分布离散、内容不一致等问题,因此引入知识图谱技术框架,旨在利用知识图谱面向海量数据时信息收集及加工整合的思想,提高安全情报的收集效率、情报质量,同时拓展情报的使用范围。本文首先简要回顾安全情报和知识图谱的研究现状,同时介绍知识图谱在安全领域的应用。其次给出面向安全情报的知识图谱构建框架。然后介绍安全情报知识图谱构建的关键技术,包括信息抽取、本体构建和知识推理等。最后,对安全情报知识图谱发展面临的问题进行了讨论。 With the increasingly prominent application and role of cyberspace security intelligence in cybercrime,cyberwarfare,and network counter-terrorism,it’s urgent to intensive study the basic theories and effective extraction methods of cyberspace security intelligence.At present,security intelligence mainly faces the problems of diverse data types,discrete distribution,and inconsistent content.Therefore,the knowledge graph technology framework is introduced to improve the security intelligence,which aims at using the knowledge graph to solve the problem of the information collection and processing integration of massive data,improving the collection efficiency and intelligence quality of security intelligence.This paper first briefly reviews the research status of security intelligence and knowledge graph,and shows the application cases of the knowledge graph of security intelligence in intelligence analysis.Second,it summarizes the framework for building a knowledge graph of security intelligence.Then,it introduces the key technologies for the construction of security knowledge graph,including information extraction,ontology construction and knowledge reasoning.Finally,the issues facing the development of security intelligence knowledge maps are discussed.
作者 董聪 姜波 卢志刚 刘宝旭 李宁 马平川 姜政伟 刘俊荣 DONG Cong;JIANG Bo;LU Zhigang;LIU Baoxu;LI Ning;MA Pingchuan;JIANG Zhengwei;LIU Junrong(Institute of Information Engineering,Chinese Academy of Sciences,Beijing 100093,China;School of Cyber Security,University of Chinese Academy of Sciences,Beijing 100049,China)
出处 《信息安全学报》 CSCD 2020年第5期56-76,共21页 Journal of Cyber Security
基金 中国科学院网络测评技术重点实验室和网络安全防护技术北京市重点实验室,国家自然科学青年基金(No.61702508,No.61802404) 北京市科委重大研究项目(No.D181100000618003) 中国科学院战略性先导C类(No.XDC02000000)资助。
关键词 网络空间安全 安全情报 知识图谱 信息抽取 本体构建 知识推理 cyber security security intelligence knowledge graph information extraction ontology construction knowledge inference
  • 相关文献

参考文献8

二级参考文献245

  • 1冯萍慧,连一峰,戴英侠,鲍旭华.基于可靠性理论的分布式系统脆弱性模型[J].软件学报,2006,17(7):1633-1640. 被引量:31
  • 2Ralph Grishman. 1997. Information Extraction : Tech- niques and Challenges[R]. New York: New York U-niversity, 1997. 被引量:1
  • 3Ralph Grishman, Beth Sundheim. Message Under- standing Conference-6: A Brief History[C]//Proceed- ings of COLING, 1996. 被引量:1
  • 4http://www, itl. nist. gov/iad/mig/tests/ace/[OL]. 被引量:1
  • 5http ://www. nist. gov/tac/[OL]. 被引量:1
  • 6Martina Naughton, N. Kushmerichand J. Carthy. Event Extraction from Hetergeneous News Sources [C]//Proceedings of AAAI, 2006. 被引量:1
  • 7D. McClosky, M. Surdeanu, C. D. Manning. Event Extraction as Dependency Parsing[C]//Proceedings ofACL-HLT, 2011. 被引量:1
  • 8Yu Hong, Jianfeng Zhang, Bin Ma, Jianmin Yao, Gu- odong Zhou, Qiaoming Zhu. Using Cross-Entity Infer ence to Improve Event Extraction[C]//Proeeedings ofACL-HLT, 2011. 被引量:1
  • 9Jun Zhao, Feifan Liu. Product Named Entity Recog nition in Chinese Texts[J]. International Journal of Language Resource and Evaluation. 2008, 42 (2) :132- 152. 被引量:1
  • 10Richard C. Wang, William Cohen. Automatic Set In- stance Extraction using the Web[C]//Proceedings of ACL-IJCNLP, 2009. 被引量:1

共引文献1782

同被引文献196

引证文献23

二级引证文献73

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部