2020
DOI: 10.1016/j.procs.2020.08.003
|View full text |Cite
|
Sign up to set email alerts
|

Rule Reduction after Knowledge Graph Mining for Cyber Situational Awareness Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…CALDERA Pathfinder [8] shows what vulnerability is exposed to an adversary based on threats linked via attack patterns from CAPEC. In addition, the data is also used in examples of modeling including situational awareness [11], predicting missing edges between CVE, CWE and CAPEC [29], and investigating data breaches with semantic analysis of ATT&CK [18].…”
Section: Related Workmentioning
confidence: 99%
“…CALDERA Pathfinder [8] shows what vulnerability is exposed to an adversary based on threats linked via attack patterns from CAPEC. In addition, the data is also used in examples of modeling including situational awareness [11], predicting missing edges between CVE, CWE and CAPEC [29], and investigating data breaches with semantic analysis of ATT&CK [18].…”
Section: Related Workmentioning
confidence: 99%
“…The portrait can be utilized for investigation in reasoning the opponent's attack purpose, evaluating the system security environment, and supporting by making defensive decisions. 22 Focusing on advanced persistent threat (APT) attacks in the network, Jia et al 23 constructed a network security knowledge graph, and set trigger conditions, fault tolerance thresholds, and analysis time intervals based on the relationship between time and space constraints and attack steps. This method can correlate security events corresponding to the attack steps of the same compound attack from a large number of security events, and make judgments and predictions about APT attacks.…”
Section: Introductionmentioning
confidence: 99%
“…The portrait technology can automatically analyze and generate the characteristics and relations of some intelligent attack behaviors from collected operation data. The portrait can be utilized for investigation in reasoning the opponent's attack purpose, evaluating the system security environment, and supporting by making defensive decisions 22 . Focusing on advanced persistent threat (APT) attacks in the network, Jia et al 23 constructed a network security knowledge graph, and set trigger conditions, fault tolerance thresholds, and analysis time intervals based on the relationship between time and space constraints and attack steps.…”
Section: Introductionmentioning
confidence: 99%