Malware Knowledge Graph Generation

02/10/2021
by   Sharmishtha Dutta, et al.
0

Cyber threat and attack intelligence information are available in non-standard format from heterogeneous sources. Comprehending them and utilizing them for threat intelligence extraction requires engaging security experts. Knowledge graphs enable converting this unstructured information from heterogeneous sources into a structured representation of data and factual knowledge for several downstream tasks such as predicting missing information and future threat trends. Existing large-scale knowledge graphs mainly focus on general classes of entities and relationships between them. Open-source knowledge graphs for the security domain do not exist. To fill this gap, we've built - a knowledge graph for threat intelligence (Threat INtelligence KnowlEdge gRaph). is generated using RDF triples describing entities and relations from tokenized unstructured natural language text from 83 threat reports published between 2006-2021. We built using classes and properties defined by open-source malware ontology and using hand-annotated RDF triples. We also discuss ongoing research and challenges faced while creating .

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/20/2020

MALOnt: An Ontology for Malware Threat Intelligence

Malware threat intelligence uncovers deep information about malware, thr...
research
02/10/2021

Information Prediction using Knowledge Graphs for Contextual Malware Threat Intelligence

Large amounts of threat intelligence information about mal-ware attacks ...
research
08/02/2022

Recognizing and Extracting Cybersecurtity-relevant Entities from Text

Cyber Threat Intelligence (CTI) is information describing threat vectors...
research
01/27/2023

Cybersecurity Threat Hunting and Vulnerability Analysis Using a Neo4j Graph Database of Open Source Intelligence

Open source intelligence is a powerful tool for cybersecurity analysts t...
research
09/08/2021

Knowledge mining of unstructured information: application to cyber-domain

Cyber intelligence is widely and abundantly available in numerous open o...
research
05/01/2023

Uncovering CWE-CVE-CPE Relations with Threat Knowledge Graphs

Security assessment relies on public information about products, vulnera...
research
07/14/2023

Time for aCTIon: Automated Analysis of Cyber Threat Intelligence in the Wild

Cyber Threat Intelligence (CTI) plays a crucial role in assessing risks ...

Please sign up or login with your details

Forgot password? Click here to reset