A Cybersecurity Knowledge Graph Completion Method Based on Ensemble Learning and Adversarial Training

被引:4
|
作者
Wang, Peng [1 ,2 ]
Liu, Jingju [1 ,2 ]
Hou, Dongdong [1 ,2 ]
Zhou, Shicheng [1 ,2 ]
机构
[1] Natl Univ Def Technol, Coll Elect Engn, Hefei 230037, Peoples R China
[2] Anhui Prov Key Lab Cyberspace Secur Situat Awarene, Hefei 230037, Peoples R China
来源
APPLIED SCIENCES-BASEL | 2022年 / 12卷 / 24期
关键词
cybersecurity knowledge graph; knowledge graph completion; ensemble learning; adversarial training; CONSTRUCTION; ALGORITHMS;
D O I
10.3390/app122412947
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
The application of cybersecurity knowledge graphs is attracting increasing attention. However, many cybersecurity knowledge graphs are incomplete due to the sparsity of cybersecurity knowledge. Existing knowledge graph completion methods do not perform well in domain knowledge, and they are not robust enough relative to noise data. To address these challenges, in this paper we develop a new knowledge graph completion method called CSEA based on ensemble learning and adversarial training. Specifically, we integrate a variety of projection and rotation operations to model the relationships between entities, and use angular information to distinguish entities. A cooperative adversarial training method is designed to enhance the generalization and robustness of the model. We combine the method of generating perturbations for the embedding layers with the self-adversarial training method. The UCB (upper confidence bound) multi-armed bandit method is used to select the perturbations of the embedding layer. This achieves a balance between perturbation diversity and maximum loss. To this end, we build a cybersecurity knowledge graph based on the CVE, CWE, and CAPEC cybersecurity databases. Our experimental results demonstrate the superiority of our proposed model for completing cybersecurity knowledge graphs.
引用
收藏
页数:18
相关论文
共 50 条
  • [41] Simplified Representation Learning Model Based on Parameter-Sharing for Knowledge Graph Completion
    Wang, Yashen
    Zhang, Huanhuan
    Li, Yifeng
    Xie, Haiyong
    INFORMATION RETRIEVAL (CCIR 2019), 2019, 11772 : 67 - 78
  • [42] Simple Knowledge Graph Completion Model Based on Differential Negative Sampling and Prompt Learning
    Duan, Li
    Wang, Jing
    Luo, Bing
    Sun, Qiao
    INFORMATION, 2023, 14 (08)
  • [43] Power Grid Knowledge Graph Completion with Complex Structure Learning
    Zheng, Zhou
    Guo, Jun
    Liao, Feilong
    Huang, Qiyao
    Zhang, Yingyue
    Zhao, Zhichao
    Lin, Chenxiang
    Zhang, Zhihong
    ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, ICIC 2023, PT V, 2023, 14090 : 669 - 679
  • [44] Multi-Concept Representation Learning for Knowledge Graph Completion
    Wang, Jiapu
    Wang, Boyue
    Gao, Junbin
    Hu, Yongli
    Yin, Baocai
    ACM TRANSACTIONS ON KNOWLEDGE DISCOVERY FROM DATA, 2023, 17 (01)
  • [45] Knowledge Graph Completion via Multi-feature Learning
    Zhang, Hanwen
    Yao, Juanjuan
    Zhu, Yi'an
    ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PT IV, ICIC 2024, 2024, 14878 : 269 - 280
  • [46] An Overview of Research on Knowledge Graph Completion Based on Graph Neural Network
    Yue W.
    Haichun S.
    Data Analysis and Knowledge Discovery, 2024, 8 (03) : 10 - 28
  • [47] Knowledge Graph Completion With Pattern-Based Methods
    Sabet, Maryam
    Pajoohan, Mohammadreza
    Moosavi, Mohammad Reza
    IEEE ACCESS, 2025, 13 : 5815 - 5831
  • [48] CombinE: A Fusion Method Enhanced Model for Knowledge Graph Completion
    Cui, Ziyuan
    Wang, Jinxin
    Guo, Zhongwen
    Wang, Weigang
    PROCEEDINGS OF THE 2024 27 TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, CSCWD 2024, 2024, : 383 - 388
  • [49] Contextualise Entities and Relations: An Interaction Method for Knowledge Graph Completion
    Chen, Kai
    Wang, Ye
    Li, Yitong
    Li, Aiping
    Zhao, Xiaojuan
    ARTIFICIAL NEURAL NETWORKS AND MACHINE LEARNING - ICANN 2021, PT III, 2021, 12893 : 179 - 191
  • [50] Knowledge Graph Based Adversarial Radar Threat Assessment
    Zhu, Chenyu
    Li, Yue
    Hou, Xinyue
    Wang, Peng
    Peng, Xiaoyan
    2022 IEEE 2ND INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND SOFTWARE ENGINEERING (ICICSE 2022), 2022, : 189 - 194