Information Prediction using Knowledge Graphs for Contextual Malware Threat Intelligence

02/10/2021
by   Nidhi Rastogi, et al.
0

Large amounts of threat intelligence information about mal-ware attacks are available in disparate, typically unstructured, formats. Knowledge graphs can capture this information and its context using RDF triples represented by entities and relations. Sparse or inaccurate threat information, however, leads to challenges such as incomplete or erroneous triples. Named entity recognition (NER) and relation extraction (RE) models used to populate the knowledge graph cannot fully guaran-tee accurate information retrieval, further exacerbating this problem. This paper proposes an end-to-end approach to generate a Malware Knowledge Graph called MalKG, the first open-source automated knowledge graph for malware threat intelligence. MalKG dataset called MT40K1 contains approximately 40,000 triples generated from 27,354 unique entities and 34 relations. We demonstrate the application of MalKGin predicting missing malware threat intelligence information in the knowledge graph. For ground truth, we manually curate a knowledge graph called MT3K, with 3,027 triples generated from 5,741 unique entities and 22 relations. For entity prediction via a state-of-the-art entity prediction model(TuckER), our approach achieves 80.4 for the hits@10 metric (predicts the top 10 options for missing entities in the knowledge graph), and 0.75 for the MRR (mean reciprocal rank). We also propose a framework to automate the extraction of thousands of entities and relations into RDF triples, both manually and automatically, at the sentence level from1,100 malware threat intelligence reports and from the com-mon vulnerabilities and exposures (CVE) database.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/10/2021

Malware Knowledge Graph Generation

Cyber threat and attack intelligence information are available in non-st...
research
04/30/2023

Constructing a Knowledge Graph from Textual Descriptions of Software Vulnerabilities in the National Vulnerability Database

Knowledge graphs have shown promise for several cybersecurity tasks, suc...
research
05/01/2023

Uncovering CWE-CVE-CPE Relations with Threat Knowledge Graphs

Security assessment relies on public information about products, vulnera...
research
06/15/2022

Collaborative Knowledge Graph Fusion by Exploiting the Open Corpus

To alleviate the challenges of building Knowledge Graphs (KG) from scrat...
research
08/04/2023

Creating Android Malware Knowledge Graph Based on a Malware Ontology

As mobile and smart connectivity continue to grow, malware presents a pe...
research
11/05/2022

BEKG: A Built Environment Knowledge Graph

Practices in the built environment have become more digitalized with the...
research
06/25/2020

SPIDER: Selective Plotting of Interconnected Data and Entity Relations

Intelligence analysts have long struggled with an abundance of data that...

Please sign up or login with your details

Forgot password? Click here to reset