Skip to main content

2022 | OriginalPaper | Buchkapitel

Cyber-Attack Behavior Knowledge Graph Based on CAPEC and CWE Towards 6G

verfasst von : Weilin Wang, Huachun Zhou, Kun Li, Zhe Tu, Feiyang Liu

Erschienen in: Mobile Internet Security

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

6G-oriented network intelligence needs the support of knowledge from inside and outside the network. CAPEC and CWE are network security databases targeting attack patterns and weaknesses respectively, which are relatively complete knowledge from outside the network. Constructing the important entities and relationships in CAPEC and CWE as knowledge graphs is conducive to comprehensively grasping the strategies and behaviors of certain attacks, thus providing a supplement for network internal knowledge and guidance for attack prediction and network situational awareness. Therefore, this paper analyzes the content and organizational structure of CAPEC and CWE, and proposes a method to construct cyber-attack knowledge graph based on CAPEC and CWE, which is implemented in the graph database Neo4j. This paper also introduces the application of the knowledge graph in DDoS flood attack and multi-stage attack.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Liu, G., et al.: Vision, requirements and network architecture of 6G mobile network beyond 2030. China Communications 17(9), 92–104 (2020)CrossRef Liu, G., et al.: Vision, requirements and network architecture of 6G mobile network beyond 2030. China Communications 17(9), 92–104 (2020)CrossRef
2.
Zurück zum Zitat Yang, H., Alphones, A., Xiong, Z., Niyato, D., Zhao, J., Kaishun, W.: Artificial-intelligence-enabled intelligent 6G networks. IEEE Network 34(6), 272–280 (2020)CrossRef Yang, H., Alphones, A., Xiong, Z., Niyato, D., Zhao, J., Kaishun, W.: Artificial-intelligence-enabled intelligent 6G networks. IEEE Network 34(6), 272–280 (2020)CrossRef
5.
Zurück zum Zitat Nickel, M., Murphy, K., Tresp, V., Gabrilovich, E.: A review of relational machine learning for knowledge graphs. Proc. IEEE 104(1), 11–33 (2016)CrossRef Nickel, M., Murphy, K., Tresp, V., Gabrilovich, E.: A review of relational machine learning for knowledge graphs. Proc. IEEE 104(1), 11–33 (2016)CrossRef
6.
Zurück zum Zitat Kim, H.: 5G core network security issues and attack classification from network protocol perspective. J. Internet Serv. Inf. Secur. 10(2), 1–15 (2020) Kim, H.: 5G core network security issues and attack classification from network protocol perspective. J. Internet Serv. Inf. Secur. 10(2), 1–15 (2020)
7.
Zurück zum Zitat Abhishta, A., van Heeswijk, W., Junger, M., Nieuwenhuis, L.J.M., Joosten, R.: Why would we get attacked? an analysis of attacker’s aims behind DDos attacks. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. 11(2), 3–22 (2020) Abhishta, A., van Heeswijk, W., Junger, M., Nieuwenhuis, L.J.M., Joosten, R.: Why would we get attacked? an analysis of attacker’s aims behind DDos attacks. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. 11(2), 3–22 (2020)
8.
Zurück zum Zitat Jia, Y., Qi, Y., Shang, H., Jiang, R., Li, A.: A practical approach to constructing a knowledge graph for cybersecurity. Engineering 4(1), 53–60 (2018)CrossRef Jia, Y., Qi, Y., Shang, H., Jiang, R., Li, A.: A practical approach to constructing a knowledge graph for cybersecurity. Engineering 4(1), 53–60 (2018)CrossRef
9.
Zurück zum Zitat Piplai, A., Mittal, S., Joshi, A., Finin, T., Holt, J., Zak, R.: Creating cybersecurity knowledge graphs from malware after action reports. IEEE Access 8, 211691–211703 (2020)CrossRef Piplai, A., Mittal, S., Joshi, A., Finin, T., Holt, J., Zak, R.: Creating cybersecurity knowledge graphs from malware after action reports. IEEE Access 8, 211691–211703 (2020)CrossRef
10.
Zurück zum Zitat Pingle, A., Piplai, A., Mittal, S., Joshi, A., Holt, J., Zak, R.: Relext: relation extraction using deep learning approaches for cybersecurity knowledge graph improvement. In: 2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 879–886 (2019) Pingle, A., Piplai, A., Mittal, S., Joshi, A., Holt, J., Zak, R.: Relext: relation extraction using deep learning approaches for cybersecurity knowledge graph improvement. In: 2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 879–886 (2019)
11.
Zurück zum Zitat Hooi, E.K.J., Zainal, A., Maarof, M.A., Kassim, M.N.: TAGraph: knowledge graph of threat actor. In: 2019 International Conference on Cybersecurity (ICoCSec), pp. 76–80 (2019) Hooi, E.K.J., Zainal, A., Maarof, M.A., Kassim, M.N.: TAGraph: knowledge graph of threat actor. In: 2019 International Conference on Cybersecurity (ICoCSec), pp. 76–80 (2019)
12.
Zurück zum Zitat Li, T., Paja, E., Mylopoulos, J., Horkoff, J., Beckers, K.: Security attack analysis using attack patterns. In: 2016 IEEE Tenth International Conference on Research Challenges in Information Science (RCIS), pp. 1–13 (2016) Li, T., Paja, E., Mylopoulos, J., Horkoff, J., Beckers, K.: Security attack analysis using attack patterns. In: 2016 IEEE Tenth International Conference on Research Challenges in Information Science (RCIS), pp. 1–13 (2016)
13.
Zurück zum Zitat Kotenko, I., Doynikova, E.: The CAPEC based generator of attack scenarios for network security evaluation. In: 2015 IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), vol. 1, pp. 436–441 (2015) Kotenko, I., Doynikova, E.: The CAPEC based generator of attack scenarios for network security evaluation. In: 2015 IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), vol. 1, pp. 436–441 (2015)
14.
Zurück zum Zitat Du, Y., Lu, Y.: A weakness relevance evaluation method based on PageRank. In: 2019 IEEE Fourth International Conference on Data Science in Cyberspace (DSC), pp. 422–427 (2019) Du, Y., Lu, Y.: A weakness relevance evaluation method based on PageRank. In: 2019 IEEE Fourth International Conference on Data Science in Cyberspace (DSC), pp. 422–427 (2019)
15.
Zurück zum Zitat Syed, Z., Padia, A., Finin, T., Mathews, L., Joshi, A.: UCO: a unified cybersecurity ontology. In: AAAI Workshop on Artificial Intelligence for Cyber Security (2016) Syed, Z., Padia, A., Finin, T., Mathews, L., Joshi, A.: UCO: a unified cybersecurity ontology. In: AAAI Workshop on Artificial Intelligence for Cyber Security (2016)
16.
Zurück zum Zitat Ansarinia, M., Asghari, S.A., Souzani, A., Ghaznavi, A.: Ontology-based modeling of DDoS attacks for attack plan detection. In: 6th International Symposium on Telecommunications (IST), pp. 993–998 (2012) Ansarinia, M., Asghari, S.A., Souzani, A., Ghaznavi, A.: Ontology-based modeling of DDoS attacks for attack plan detection. In: 6th International Symposium on Telecommunications (IST), pp. 993–998 (2012)
18.
Zurück zum Zitat Hutchins, E., Cloppert, M.J., Amin, R.M.: Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains (2010) Hutchins, E., Cloppert, M.J., Amin, R.M.: Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains (2010)
19.
Zurück zum Zitat Strom, B.E., Applebaum, A., Miller, D.P., Nickels, K.C., Pennington, A.G., Thomas, C.B.: Mitre att&ck: Design and philosophy. In: The MITRE Corporation, Tech Rep: MP180360 (2020) Strom, B.E., Applebaum, A., Miller, D.P., Nickels, K.C., Pennington, A.G., Thomas, C.B.: Mitre att&ck: Design and philosophy. In: The MITRE Corporation, Tech Rep: MP180360 (2020)
Metadaten
Titel
Cyber-Attack Behavior Knowledge Graph Based on CAPEC and CWE Towards 6G
verfasst von
Weilin Wang
Huachun Zhou
Kun Li
Zhe Tu
Feiyang Liu
Copyright-Jahr
2022
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-16-9576-6_24

Premium Partner