Research on Improving the Security Protection Capability of Critical Information Infrastructure based on Knowledge Graph
Abstract
operation, and it is also the main target of cyber-attacks. This paper proposes to build a threat-management knowledge graph, integrate
security management requirement data and cyber threat intelligence data, and associate two types of data by link prediction algorithm, to
realize the knowledge reasoning ability of threat management knowledge graph. The research shows that the threat-management knowledge
graph can be used to deduce the security events of critical information infrastructure, find the corresponding security management
requirements, and eff ectively improve the security ability of critical information infrastructure.
Keywords
Full Text:
PDFReferences
[1] Mengru Gao,Fangjun Xie,Hongqin Dong etal. Research on Cyber security evaluation system for critical information infrastructure [J]. Information Cyber
Security,2019,No.225(09):111-114.
[2] Tao Li,Erao Guo,Ankang Ju. [J]. Journal of Communications,20,41(10):80-91.
[3] Qinghua Wen,Hongyin Zhu,Lei Hou etal. Multi-strategy Chinese open relation Extraction. Journal of Chinese Information Processing,2023,37(01):88-96.
[4] Siyu Tang,Saifei Li,Lijie Zhang. Analysis of Cyber Security Knowledge graph construction based on Neo4j [J]. Information Security and Communication
Security,2022,No.345(08):60-70.
[5] Yingjie Wang,Chengye Zhang,Fengbo Bai etal. Research review on named entity recognition in Chinese [J]. Exploration of Computer Science and
Technology,2023,17(02):324-341.
[6] Shengbao Li,Jiao Cheng,Yu Zhao etal. Analysis of Cyber security situation and protection mechanism for regional critical information infrastructure [J].
Cyber Security Technology and Application,2021,No.247(07):27-29.
[7] Fangyuan Liao,Jianfeng Chen,Zhiwang Gan.Review of AI-driven Critical Information Infrastructure Defense research [J]. Computer Engineeri
ng,2019,45(07):181-187+193.
[8] Xiaobo Niu,Qun Fang,Xiao Shao. Cyber security emergency response based on threat assessment [J]. Cyber Security Technology and Application,2022,
No.263(11):3-4.
DOI: https://doi.org/10.18686/esta.v10i3.429
Refbacks
- There are currently no refbacks.
Copyright (c) 2023 Yang Zhang,Songsen Yu