Proceedings of the 2020 3rd International Conference on Geoinformatics and Data Analysis 2020
DOI: 10.1145/3397056.3397083
|View full text |Cite
|
Sign up to set email alerts
|

STIX-based Network Security Knowledge Graph Ontology Modeling Method

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 3 publications
0
7
0
Order By: Relevance
“…Another industry standard, STIX™ (Structured Threat Information Expression), is a language and serialization format that can be used in ontological modeling of cybersecurity knowledge graphs [29].…”
Section: Knowledge Graph-based Koses For Cybersecurity Applicationsmentioning
confidence: 99%
See 1 more Smart Citation
“…Another industry standard, STIX™ (Structured Threat Information Expression), is a language and serialization format that can be used in ontological modeling of cybersecurity knowledge graphs [29].…”
Section: Knowledge Graph-based Koses For Cybersecurity Applicationsmentioning
confidence: 99%
“…-Semantic graph databases, including RDF triplestores and quadstores: Allegrograph, 2 Amazon Neptune, 3 AnzoGraph DB, 4 CRAY Graph Engine 5 , Dgraph, 6 GraphDB, 7 MarkLogic, 8 Openlink Virtuoso, 9 RDFox, 10 Stardog 11 -Property graph databases: MEMGraph, 12 NebulaGraph, 13 Neo4j, 14 RedisGraph, 15 TigerGraph, 16 Trovares 17 -Multi-model graph databases: AgensGraph, 18 ArangoDB, 19 DataStax, 20 FlockDB, 21 graphbase.ai, 22 HyperGraphDB, 23 JanusGraph, 24 Microsoft Azure Cosmos DB, 25 Oracle Spatial and Graph, 26 OrientDB, 27 SAP HANA, 28 Sparksee, 29 TerminusDB, 30 TypeDB 31…”
Section: Introduction To Cybersecurity Knowledge Graphsmentioning
confidence: 99%
“…STIX is used as a serialization format to exchange CTI, and it is one of the most widely used threat intelligence sharing languages [31]. STIX can describe various characteristics of threat intelligence, such as threat signatures, threat activities, and security incidents.…”
Section: Threat Intelligence Sharing Standards and Platformsmentioning
confidence: 99%
“…However, due to the use of STIX 1.0, which is seen as an obstacle to sharing information about cyber threats, this ontology has a weakness in semantic expression [35]. In [36], a method was proposed to model a knowledge graph ontology based on STIX. This method generates an ontology schema by classifying the concepts in the network security field with low redundancy and a strong structural hierarchy.…”
Section: Threat Ontology Constructionmentioning
confidence: 99%