Uncovering CWE-CVE-CPE Relations with Threat Knowledge Graphs

05/01/2023
by   Zhenpeng Shi, et al.
0

Security assessment relies on public information about products, vulnerabilities, and weaknesses. So far, databases in these categories have rarely been analyzed in combination. Yet, doing so could help predict unreported vulnerabilities and identify common threat patterns. In this paper, we propose a methodology for producing and optimizing a knowledge graph that aggregates knowledge from common threat databases (CVE, CWE, and CPE). We apply the threat knowledge graph to predict associations between threat databases, specifically between products, vulnerabilities, and weaknesses. We evaluate the prediction performance both in closed world with associations from the knowledge graph, and in open world with associations revealed afterward. Using rank-based metrics (i.e., Mean Rank, Mean Reciprocal Rank, and Hits@N scores), we demonstrate the ability of the threat knowledge graph to uncover many associations that are currently unknown but will be revealed in the future, which remains useful over different time periods. We propose approaches to optimize the knowledge graph, and show that they indeed help in further uncovering associations.

READ FULL TEXT
research
02/10/2021

Information Prediction using Knowledge Graphs for Contextual Malware Threat Intelligence

Large amounts of threat intelligence information about mal-ware attacks ...
research
02/10/2021

Malware Knowledge Graph Generation

Cyber threat and attack intelligence information are available in non-st...
research
04/30/2023

Constructing a Knowledge Graph from Textual Descriptions of Software Vulnerabilities in the National Vulnerability Database

Knowledge graphs have shown promise for several cybersecurity tasks, suc...
research
11/13/2019

Predicting microRNA-disease associations from knowledge graph using tensor decomposition with relational constraints

Motivation: MiRNAs are a kind of small non-coding RNAs that are not tran...
research
12/08/2021

Towards automation of threat modeling based on a semantic model of attack patterns and weaknesses

This works considers challenges of building and usage a formal knowledge...
research
06/18/2020

OMBA: User-Guided Product Representations for Online Market Basket Analysis

Market Basket Analysis (MBA) is a popular technique to identify associat...
research
09/19/2022

Rethinking Knowledge Graph Evaluation Under the Open-World Assumption

Most knowledge graphs (KGs) are incomplete, which motivates one importan...

Please sign up or login with your details

Forgot password? Click here to reset