Automatic construction method of information security knowledge graph based on deep learning

A technology of information security and knowledge graph, which is applied in the field of automatic graph construction, can solve problems such as untimely update, insufficient algorithm effect, and incomplete automation of the construction process.

Active Publication Date: 2020-03-31
BEIHANG UNIV
View PDF2 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, there are two problems in the current existing technology. First, although the method based on manual sorting has a good accuracy rate, there is a problem that the update is not timely; second, the current research based on machine learning methods, the effect of the algorithm Not good enough, especially in the relationship extraction stage, learning is only possible with human assistance, and the construction process is still not fully automated

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Automatic construction method of information security knowledge graph based on deep learning
  • Automatic construction method of information security knowledge graph based on deep learning
  • Automatic construction method of information security knowledge graph based on deep learning

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention. In addition, the technical features involved in the various embodiments of the present invention described below may be combined with each other as long as they do not constitute a conflict with each other.

[0029] Before constructing the knowledge graph, the types of knowledge stored in the knowledge graph and the relationship between the knowledge are constructed firstly. The present invention defines a comprehensive ontology library of the information security knowledge graph in combination with the mode of the security knowledge base. Table 1 is the entity type table, and Table 2 is the definiti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An automatic construction method of an information security knowledge graph based on deep learning comprises the following steps: step 1, constructing an ontology database of the information securityknowledge graph; step 2, labeling the collected data based on a heuristic rule mode to obtain a training set of entity recognition, designing a model structure based on Bi-LSTM for learning to serve as a model of entity recognition, and extracting entity words of the text; and step 3, performing automatic labeling based on triple knowledge to obtain a training set of relationship extraction, and designing an attention mechanism-based LSTM structure as a model of relationship extraction so as to extract triples (relationships) in the text.

Description

technical field [0001] The invention relates to an automatic construction method of a map, in particular to an automatic construction method of an information security knowledge map based on deep learning. Background technique [0002] Most of the current information security knowledge bases are maintained and updated manually, such as the well-known CVE (Common Vulnerability Knowledge Base), but most of the updates of CVE are manually updated, and some newly discovered sites cannot be updated in time. Vulnerabilities and attack knowledge, and these knowledge are often published in the blogs of relevant companies, manufacturers or security teams at the first time, so it is necessary to adopt an automatic update method to mine and extract knowledge from text. [0003] In addition to the public knowledge base, there are some existing studies such as Stucco, which use machine learning methods to extract triples from text to construct knowledge graphs, and use maximum entropy mo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/35G06F16/36
CPCG06F16/35G06F16/367G06F16/374Y02D10/00
Inventor 李博左光胜
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products