A Cybersecurity Knowledge Graph Completion Method Based on Ensemble Learning and Adversarial Training

被引:4
作者
Wang, Peng [1 ,2 ]
Liu, Jingju [1 ,2 ]
Hou, Dongdong [1 ,2 ]
Zhou, Shicheng [1 ,2 ]
机构
[1] Natl Univ Def Technol, Coll Elect Engn, Hefei 230037, Peoples R China
[2] Anhui Prov Key Lab Cyberspace Secur Situat Awarene, Hefei 230037, Peoples R China
来源
APPLIED SCIENCES-BASEL | 2022年 / 12卷 / 24期
关键词
cybersecurity knowledge graph; knowledge graph completion; ensemble learning; adversarial training; CONSTRUCTION; ALGORITHMS;
D O I
10.3390/app122412947
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
The application of cybersecurity knowledge graphs is attracting increasing attention. However, many cybersecurity knowledge graphs are incomplete due to the sparsity of cybersecurity knowledge. Existing knowledge graph completion methods do not perform well in domain knowledge, and they are not robust enough relative to noise data. To address these challenges, in this paper we develop a new knowledge graph completion method called CSEA based on ensemble learning and adversarial training. Specifically, we integrate a variety of projection and rotation operations to model the relationships between entities, and use angular information to distinguish entities. A cooperative adversarial training method is designed to enhance the generalization and robustness of the model. We combine the method of generating perturbations for the embedding layers with the self-adversarial training method. The UCB (upper confidence bound) multi-armed bandit method is used to select the perturbations of the embedding layer. This achieves a balance between perturbation diversity and maximum loss. To this end, we build a cybersecurity knowledge graph based on the CVE, CWE, and CAPEC cybersecurity databases. Our experimental results demonstrate the superiority of our proposed model for completing cybersecurity knowledge graphs.
引用
收藏
页数:18
相关论文
共 59 条
[51]  
Yang B., 2015, CoRR
[52]   Translation-Based Embeddings with Octonion for Knowledge Graph Completion [J].
Yu, Mei ;
Bai, Chen ;
Yu, Jian ;
Zhao, Mankun ;
Xu, Tianyi ;
Liu, Hongwei ;
Li, Xuewei ;
Yu, Ruiguo .
APPLIED SCIENCES-BASEL, 2022, 12 (08)
[53]   Predicting Entity Relations across Different Security Databases by Using Graph Attention Network [J].
Yuan, Liu ;
Bai, Yude ;
Xing, Zhenchang ;
Chen, Sen ;
Li, Xiaohong ;
Deng, Zhidong .
2021 IEEE 45TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2021), 2021, :834-843
[54]   A Review of Knowledge Graph Completion [J].
Zamini, Mohamad ;
Reza, Hassan ;
Rabiei, Minou .
INFORMATION, 2022, 13 (08)
[55]   An Automated Penetration Semantic Knowledge Mining Algorithm Based on Bayesian Inference [J].
Zang, Yichao ;
Hu, Tairan ;
Zhou, Tianyang ;
Deng, Wanjiang .
CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 66 (03) :2573-2585
[56]  
Zhang S, 2019, ADV NEUR IN, V32
[57]  
Zhang ZQ, 2020, AAAI CONF ARTIF INTE, V34, P3065
[58]   Adversarial Training Methods for Deep Learning: A Systematic Review [J].
Zhao, Weimin ;
Alwidian, Sanaa ;
Mahmoud, Qusay H. .
ALGORITHMS, 2022, 15 (08)
[59]  
Zhu C., 2020, P 8 INT C LEARNING R