Research on Improving the Security Protection Capability of Critical Information Infrastructure based on Knowledge Graph

Yang Zhang, Songsen Yu

Abstract


Critical information infrastructure is an important information system to ensure national social stability and normal economic
operation, and it is also the main target of cyber-attacks. This paper proposes to build a threat-management knowledge graph, integrate
security management requirement data and cyber threat intelligence data, and associate two types of data by link prediction algorithm, to
realize the knowledge reasoning ability of threat management knowledge graph. The research shows that the threat-management knowledge
graph can be used to deduce the security events of critical information infrastructure, find the corresponding security management
requirements, and eff ectively improve the security ability of critical information infrastructure.

Keywords


Critical information infrastructure; Threat-management knowledge graph; Security protection capability;

Full Text:

PDF

Included Database


References


[1] Mengru Gao,Fangjun Xie,Hongqin Dong etal. Research on Cyber security evaluation system for critical information infrastructure [J]. Information Cyber

Security,2019,No.225(09):111-114.

[2] Tao Li,Erao Guo,Ankang Ju. [J]. Journal of Communications,20,41(10):80-91.

[3] Qinghua Wen,Hongyin Zhu,Lei Hou etal. Multi-strategy Chinese open relation Extraction. Journal of Chinese Information Processing,2023,37(01):88-96.

[4] Siyu Tang,Saifei Li,Lijie Zhang. Analysis of Cyber Security Knowledge graph construction based on Neo4j [J]. Information Security and Communication

Security,2022,No.345(08):60-70.

[5] Yingjie Wang,Chengye Zhang,Fengbo Bai etal. Research review on named entity recognition in Chinese [J]. Exploration of Computer Science and

Technology,2023,17(02):324-341.

[6] Shengbao Li,Jiao Cheng,Yu Zhao etal. Analysis of Cyber security situation and protection mechanism for regional critical information infrastructure [J].

Cyber Security Technology and Application,2021,No.247(07):27-29.

[7] Fangyuan Liao,Jianfeng Chen,Zhiwang Gan.Review of AI-driven Critical Information Infrastructure Defense research [J]. Computer Engineeri

ng,2019,45(07):181-187+193.

[8] Xiaobo Niu,Qun Fang,Xiao Shao. Cyber security emergency response based on threat assessment [J]. Cyber Security Technology and Application,2022,

No.263(11):3-4.




DOI: https://doi.org/10.18686/esta.v10i3.429

Refbacks

  • There are currently no refbacks.


Copyright (c) 2023 Yang Zhang,Songsen Yu