2022 IEEE Conference on Dependable and Secure Computing (DSC) 2022
DOI: 10.1109/dsc54232.2022.9888860
|View full text |Cite
|
Sign up to set email alerts
|

Capturing Malware Behaviour with Ontology-based Knowledge Graphs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 26 publications
0
2
0
Order By: Relevance
“…Cybersecurity is one of the major application areas of graph-based representations where they are mostly used for malware and ransomware attacks analysis [7]. Experts rely on these representations to model the complex relationships between the different components of these attacks [10], while the analysis of the structure of these graphs allows understanding of the dynamics of these attacks [11]. Graph-based representations are mostly beneficial because they can portray the complex relationships between different entities involved in complex attacks; they can be used by scholars to model the propagation of malware through networks of targeted systems [11] [7].…”
Section: Previous Studiesmentioning
confidence: 99%
See 1 more Smart Citation
“…Cybersecurity is one of the major application areas of graph-based representations where they are mostly used for malware and ransomware attacks analysis [7]. Experts rely on these representations to model the complex relationships between the different components of these attacks [10], while the analysis of the structure of these graphs allows understanding of the dynamics of these attacks [11]. Graph-based representations are mostly beneficial because they can portray the complex relationships between different entities involved in complex attacks; they can be used by scholars to model the propagation of malware through networks of targeted systems [11] [7].…”
Section: Previous Studiesmentioning
confidence: 99%
“…Graph-based representations are mostly beneficial because they can portray the complex relationships between different entities involved in complex attacks; they can be used by scholars to model the propagation of malware through networks of targeted systems [11] [7]. Many scholars have tried to use knowledge representation techniques in many fields within cybersecurity; for instance, the study by some scholars [11][12][13] have reported the development of ontologies for cyberattacks' modelling on cyber supply chain systems, where these ontologies serve as a structured approach for depicting the relationships between the involved entities involved in the attacks. The nature of these cyber supply chain attacks can be understood via analysis of these ontologies.…”
Section: Previous Studiesmentioning
confidence: 99%