Constructing a Knowledge Graph from Textual Descriptions of Software Vulnerabilities in the National Vulnerability Database

04/30/2023
by   Anders Mølmen Høst, et al.
0

Knowledge graphs have shown promise for several cybersecurity tasks, such as vulnerability assessment and threat analysis. In this work, we present a new method for constructing a vulnerability knowledge graph from information in the National Vulnerability Database (NVD). Our approach combines named entity recognition (NER), relation extraction (RE), and entity prediction using a combination of neural models, heuristic rules, and knowledge graph embeddings. We demonstrate how our method helps to fix missing entities in knowledge graphs used for cybersecurity and evaluate the performance.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/10/2021

Information Prediction using Knowledge Graphs for Contextual Malware Threat Intelligence

Large amounts of threat intelligence information about mal-ware attacks ...
research
06/21/2023

ICAR, a categorical framework to connect vulnerability, threat and asset managements

We present ICAR, a mathematical framework derived from category theory f...
research
06/02/2022

Enriching a Fashion Knowledge Graph from Product Textual Descriptions

Knowledge Graphs offer a very useful and powerful structure for represen...
research
05/01/2023

Uncovering CWE-CVE-CPE Relations with Threat Knowledge Graphs

Security assessment relies on public information about products, vulnera...
research
10/05/2022

Common Vulnerability Scoring System Prediction based on Open Source Intelligence Information Sources

The number of newly published vulnerabilities is constantly increasing. ...
research
08/20/2021

SoMeSci- A 5 Star Open Data Gold Standard Knowledge Graph of Software Mentions in Scientific Articles

Knowledge about software used in scientific investigations is important ...
research
07/03/2023

CollabKG: A Learnable Human-Machine-Cooperative Information Extraction Toolkit for (Event) Knowledge Graph Construction

In order to construct or extend entity-centric and event-centric knowled...

Please sign up or login with your details

Forgot password? Click here to reset