Sali, A, Al-Jumaily, A, Jiménez, VPG and Al-Jumeily, D (2023) Cybersecurity threat perception technology based on knowledge graph. Journal of Autonomous Intelligence, 6 (3).
|
Text
document.pdf - Published Version Available under License Creative Commons Attribution Non-commercial. Download (535kB) | Preview |
Abstract
The issue of complex sources, difficult to understand and share security threat intelligence, this paper realizes deep learning of threat intelligence features based on Restricted Boltzmann Machine, which graphs the original threat intelligence features from high dimensional space to low dimensional space layer by layer, and constructs the cyberspace security threat knowledge graphs. The deep learning used to build a multi-level and structured knowledge graph of cyberspace security threats can reflect the structural characteristics of the knowledge graph, making the graph have a lower dimension and a higher level of abstraction. The experiment verifies the feasibility of constructing the cyberspace security threat knowledge graph, and verifies the security threat perception method based on the knowledge graph is more suitable for the perception of high-intensity security threats by comparing with traditional threat detection methods.
Item Type: | Article |
---|---|
Subjects: | Q Science > QA Mathematics > QA75 Electronic computers. Computer science Q Science > QA Mathematics > QA76 Computer software T Technology > T Technology (General) Z Bibliography. Library Science. Information Resources > ZA Information resources > ZA4050 Electronic information resources |
Divisions: | Computer Science & Mathematics |
Publisher: | Frontier Scientific Publishing |
SWORD Depositor: | A Symplectic |
Date Deposited: | 21 Nov 2023 17:06 |
Last Modified: | 21 Nov 2023 17:15 |
DOI or ID number: | 10.32629/jai.v6i3.882 |
URI: | https://researchonline.ljmu.ac.uk/id/eprint/21918 |
View Item |