2020
DOI: 10.1142/s0218213020400242
|View full text |Cite
|
Sign up to set email alerts
|

Research on Automatic Vulnerability Mining Model Based on Knowledge Graph

Abstract: In the information extraction, information sources can be screened according to the characteristics of the target network at the present stage, and the knowledge graph generated thereby can play a role in assisting the security analysis of the general network or power grid control network, mobile Internet and other special networks. In the method proposed in this paper, knowledge reasoning is mainly based on the attack conditions and attack methods to reason about the success rate and return of the attack. Thr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 0 publications
0
4
0
Order By: Relevance
“…Intelligent management is a management method that incorporates various disciplines and technologies such as artificial intelligence and management science, knowledge engineering, systems engineering, computing technology, communication technology, software engineering and information technology [7]. In addition, at the heart of intelligent management lies the information receiving device in the front section and the embedded control algorithm [31]- [33], which can also definite as Artificial Intelligence (AI). Intelligent management is already in use in a wide range of industries and sectors.…”
Section: Intelligent Risk Managementmentioning
confidence: 99%
See 1 more Smart Citation
“…Intelligent management is a management method that incorporates various disciplines and technologies such as artificial intelligence and management science, knowledge engineering, systems engineering, computing technology, communication technology, software engineering and information technology [7]. In addition, at the heart of intelligent management lies the information receiving device in the front section and the embedded control algorithm [31]- [33], which can also definite as Artificial Intelligence (AI). Intelligent management is already in use in a wide range of industries and sectors.…”
Section: Intelligent Risk Managementmentioning
confidence: 99%
“…In this cluster, the main research questions related to the most recent artificial intelligence techniques, with interchangeable cluster labels including knowledge graph; deep reinforcement; and dynamic pricing demand response. [31] built an automated vulnerabilities mining model using knowledge graph technique. First, a knowledge graph was constructed by extracting the basic information of engineering quality results and reasoning these results, resulting in a correlation analysis of information and visualizing the results of information processing.…”
Section: C1 Abstract Co-vision Network Analysismentioning
confidence: 99%
“…The KG was used to describe the attack-related resources (e.g., software, vulnerability, ports in use, and privilege of a successful attack) of each host, which would be of great benefit not only to generate the penetration path between hosts but also to integrate collected information of 0-day vulnerability attack for unknown attack prediction. In the power networks, Chen et al [106] generated an expansion attack graph for obtaining the maximum probability vulnerability path and providing the success rate of attacking the power grid and the loss.…”
Section: Attack Investigationmentioning
confidence: 99%
“…With the opening of the electricity market and wide access to renewable energy sources, the grid structure and operation mode have become more complex. This requires that the grid topology relationship constraint rules be optimized to adapt to the new operating conditions and ensure the safe, reliable, and economic operation of the grid [7][8][9].…”
Section: Introductionmentioning
confidence: 99%