期刊文献+

基于知识图谱的网络空间安全威胁感知技术研究 被引量:2

Research on Cybersecurity Threat Perception Technology Based on Knowledge Map
下载PDF
导出
摘要 针对安全威胁情报存在来源复杂、不易理解、难以共享等问题,基于受限玻尔兹曼机实现威胁情报特征深度学习,将原始威胁情报特征从高维空间逐层向低维空间映射,构建网络空间安全威胁知识图谱.进而利用网络空间安全威胁知识图谱,结合当前上下文情境,基于事件流处理进行安全威胁路径演化和追踪溯源,精准感知网络空间安全威胁.实验验证了构建网络空间安全威胁知识图谱的可行性,并通过与传统威胁检测方法对比,验证了基于知识图谱的安全威胁感知方法更适用于对高强度安全威胁的感知. Aiming at the problems of complex sources,difficult to understand and share security threat intelligence,this paper realizes deep learning of threat intelligence features based on restricted Boltzmann machine,which maps the original threat intelligence features from high dimensional space to low dimensional space layer by layer,and constructs the cyberspace security threat knowledge map.By using the cyberspace security threat knowledge map,and combining with the current context,the path evolution and tracing of security threats are carried out through event flow processing to accurately perceive cyberspace security threats.The experiment verifies the feasibility of constructing the cyberspace security threat knowledge map,and verifies the security threat perception method based on the knowledge map is more suitable for the perception of high-intensity security threats by comparing with traditional threat detection methods.
作者 石波 于然 朱健 Shi Bo;Yu Ran;Zhu Jian(Beijing Institute of Computer Technology and Application,Beijing 100854;Jiangsu Aerospace 706 Information Technology Co.,Ltd.,Nanjing 210012)
出处 《信息安全研究》 2022年第8期845-853,共9页 Journal of Information Security Research
基金 国家重点研发计划项目(2018YFC0831400)。
关键词 知识图谱 威胁情报 受限玻尔兹曼机 安全威胁感知 威胁检测 knowledge map threat intelligence restricted Boltzmann machine security threat perception threat detection
  • 相关文献

参考文献10

二级参考文献219

  • 1叶世伟,史忠植.神经网络原理[M].北京:机械工业出版社,2006.
  • 2刘永安,程哲,徐保国.信息融合的D-S证据理论综述[C]//中国控制与决策学术年会论文集,2007:626-628.
  • 3Haykin S. Neural Networks and Learning Machines (3rd Edition) [M]. New Jersey: Pearson Education, 2009.
  • 4Hinton G E, Sejnowski T J. Learning and relearning in Boltzmann machines[C]// Parallel Distributed Processing: Explorations in the Microstructure of Cognition,Cambridge, USA, 1986.
  • 5Smolensky P. Information processing in dynamical systems: foundations of harmony theory[C]// Parallel Distributed Processing: Explorations in the Microstructure of Cognition, Cambridge, USA, 1986.
  • 6Freund Y, Haussler D. Unsupervised learning of distributions on binary vectors using two layer networks[R]. Santa Cruz: University of California, UCSC-CRL-94-25, 1994.
  • 7Roux N L, Bengio Y. Representational power of restricted Boltzmann machines and deep belief networks[J]. Neural Computation, 2008,20(6): 1631-1649.
  • 8Hinton G E. Training products of experts by minimizing contrastive divergence [J]. Neural Computation, 2002, 14(8): 1771-1800.
  • 9Cho K Y. Improved learning algorithms for restricted Boltzmann machines[D]. Espoo: Aalto University,2011.
  • 10Teh Y W, Hinton G E. Rate-coded restricted Boltzmann machines for face recognition[C]// Advances in Neural Information Processing Systems 13, MIT Press, 2001: 908-914.

共引文献651

同被引文献15

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部