2021 IEEE International Conference on Cyber Security and Resilience (CSR) 2021
DOI: 10.1109/csr51186.2021.9527927
|View full text |Cite
|
Sign up to set email alerts
|

Machine learning on knowledge graphs for context-aware security monitoring

Abstract: Machine learning techniques are gaining attention in the context of intrusion detection due to the increasing amounts of data generated by monitoring tools, as well as the sophistication displayed by attackers in hiding their activity. However, existing methods often exhibit important limitations in terms of the quantity and relevance of the generated alerts. Recently, knowledge graphs are finding application in the cybersecurity domain, showing the potential to alleviate some of these drawbacks thanks to thei… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(9 citation statements)
references
References 24 publications
0
9
0
Order By: Relevance
“…Josep Soler Garrido et al [6] proposed to use relational learning on knowledge graphs to ensure security monitoring and accomplish intrusion detection. They apply ML techniques on knowledge graphs to detect unexpected activity in industrial automation systems.…”
Section: Related Workmentioning
confidence: 99%
“…Josep Soler Garrido et al [6] proposed to use relational learning on knowledge graphs to ensure security monitoring and accomplish intrusion detection. They apply ML techniques on knowledge graphs to detect unexpected activity in industrial automation systems.…”
Section: Related Workmentioning
confidence: 99%
“…Data structure processing, malicious behavior KG creation, behavior reasoning, and feedback are all handled by the network security knowledge base. In 2021, Garrido et al [100] applied a machine learning method to KGs to identify unusual behaviors in industrial automation systems integrating IT and OT elements. Using a readily available ontology [103], this study builds a KG by combining three major sources of knowledge: automation system information, application-level observations (e.g., data access events), and network observations (e.g., connections between hosts).…”
Section: Intrusion Detectionmentioning
confidence: 99%
“…The method closes a key gap and offers up a variety of data sources for KG construction by making the log data suitable for semantic analysis. As mentioned earlier in Section 4.2, Garrido et al [100] proposed the application of machine learning on KGs to increase the utility of the IDS-generated alerts for human operators by improving their quality and relevance in modern industrial systems.…”
Section: Security Alert or Event Correlation Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Sakthivel et al [29] employed a Recursive Neural Network (RNN) algorithm to monitor and prevent the cyber system from cyberattacks in a manufacturing company. Garrido et al [30] adopted a graph learning algorithm to detect intrusion, score anomalous activities and monitor security in industrial automation systems. These applications give the construction industry useful insights into how to create a monitoring system to identify any threat or vulnerability in real-time and simultaneously calculate the risk, based on which an action can be automatically elicited.…”
Section: Machine Learning In Risk Managementmentioning
confidence: 99%