Data-Driven Cybersecurity Knowledge Graph Construc
Data-Driven Cybersecurity Knowledge Graph Construc
Research Article
Data-Driven Cybersecurity Knowledge Graph Construction for
Industrial Control System Security
Guowei Shen ,1,2,3 Wanling Wang,1 Qilin Mu,2,3 Yanhong Pu,2,3 Ya Qin,1 and Miao Yu 4
1
Guizhou Provincial Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University,
Guiyang 550025, China
2
Big Data Application on Improving Government Governance Capabilities National Engineering Laboratory, Guiyang 550022, China
3
CETC Big Data Research Institute Co., Ltd., Guiyang 550022, China
4
Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China
Received 14 July 2020; Revised 22 September 2020; Accepted 31 October 2020; Published 28 December 2020
Copyright © 2020 Guowei Shen et al. This is an open access article distributed under the Creative Commons Attribution License,
which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Industrial control systems (ICS) involve many key industries, which once attacked will cause heavy losses. However, traditional
passive defense methods of cybersecurity have difficulty effectively dealing with increasingly complex threats; a knowledge graph
is a new idea to analyze and process data in cybersecurity analysis. We propose a novel overall framework of data-driven
industrial control network security defense, which integrated fragmented multisource threat data with an industrial network
layout by a cybersecurity knowledge graph. In order to better correlate data to construct a knowledge graph, we propose a
distant supervised relation extraction model ResPCNN-ATT; it is based on a deep residual convolutional neural network and
attention mechanism, reduces the influence of noisy data in distant supervision, and better extracts deep semantic features in
sentences by using deep residuals. We empirically demonstrate the performance of the proposed method in the field of general
cybersecurity by using dataset CSER; the model proposed in this paper achieves higher accuracy than other models. And then,
the dataset ICSER was used to construct a cybersecurity knowledge graph (CSKG) on the basis of analyzing specific industrial
control scenarios, visualizing the knowledge graph for further security analysis to the industrial control system.
1. Introduction endanger the economy, public safety, human life, and other
aspects [3]. With the support of 5G technology, the industrial
Industrial control systems (ICS), which involve key indus- Internet will be integrated with the development of 5G [4],
tries such as oil and gas production, electricity, chemical which promotes industrial development while introducing
processing, transportation, and manufacturing, have seen more security risks, so it is necessary to further improve the
increasing security problems and cyberattacks in recent years guarantee of industrial network security.
due to access to the Internet, such as Stuxnet. Stuxnet [1] Data-driven prediction and analysis of cybersecurity
infected and manipulated programmable logic controller incidents is a hot topic in current cybersecurity research;
(PLC) and caused serious physical damage to equipment through mining correlations among industrial control
which led to system failure. In 2016, the power system of network data, the asset equipment information of the indus-
Ukraine was attacked by a variant of the BlackEnergy trial control system can be associated with corresponding
malicious code [2], resulting in a large-scale power outage vulnerabilities, to identify the potential internal and external
that affected 225,000 citizens. An industrial control network threat relationship with fine granularity and construct the
involves a lot of important infrastructure construction; in asset threat graph based on a specific industrial control
the event of a cyberattack, huge losses will be caused and network structure. It is more explicit to see threat situation
2 Wireless Communications and Mobile Computing
in security analysis of ICS by using visualization technology, Power and Intelligent Control Testbed (EPIC) and
which provides accurate support for industrial control use dataset ICSER to construct a cybersecurity
network security protection decision-making. Currently, knowledge graph for EPIC, visualizing the knowl-
there are numerous open source threat intelligence sources edge graph for further security analysis to the indus-
periodically updating threat feeds fed into various analytical trial control system
solutions. Security news, security forums, and vulnerability
information are important data sources for cyberthreat The rest of the paper is organized as follows. We describe
intelligence. However, the above data is fragmented, and it related works in Section 2 and propose the overall framework
is difficult to correlate such multisource data. in Section 3. The structure definition of CSKG is analyzed in
A cybersecurity knowledge graph (CSKG) is a powerful Section 4. The cybersecurity relation extraction model and
tool for data-driven thread intelligence computing. details are shown in Section 5, and performance evaluation of
Researchers can intuitively know cybersecurity entities and the model is discussed in Section 6. In Section 7, we construct
relations between the entities through CSKG, such as utiliza- and visualize a cybersecurity knowledge graph based on a spe-
tion relation between malware and vulnerabilities, employ- cific industrial control scenario. Section 8 draws conclusions.
ment relation between attackers and organizations, and
ownership between software and vulnerabilities. Relation 2. Related Work
extraction is a very important task in the construction of
CSKG from unstructured data. Industrial control systems (ICS) consist of integrated hardware
In relation extraction, the lack of labeled data for training is and software components for monitoring and controlling
a challenge when constructing a network security knowledge various industrial processes, often deployed in critical infra-
graph. A common technique for coping with this difficulty is structure such as water treatment plants, power grids, and gas
distant supervision in natural language processing. Distant pipelines [5]. In recent years, more and more components of
supervision strategy is an effective method of automatically ICS are connected to the Internet, exposing more and more
labeling training data. However, the assumption in the distant security vulnerabilities that may be exploited by attackers [6].
supervision method is too strong, leading to the wrong label Various vulnerabilities in Internet are important internal
problem. causes of network security risks. There are vulnerabilities in
In this paper, we first propose a novel overall framework all levels and links of the information network; once
of data-driven industrial control network security defense. In exploited by malicious actors, they will affect normal opera-
order to better mine entity relations in cybersecurity data, we tion of the system and its services [7]. Due to the increasing
propose a novel cybersecurity relation extraction model number of attack events and the serious consequences of
ResPCNN-ATT which combined Residual Learning, Piece- attacking, and the many threats in the complex industrial
wise Convolutional Neural Networks (PCNN), and multi- network environment [8, 9], it is crucial to study industrial
instance ATTention. The following list details the main network security. Traditional passive defense measures of
contributions of the article: cybersecurity have the difficulty of effectively dealing with
the increasingly complex threats; we must strengthen cyber-
(i) A novel data-driven industrial network security security analysis capability based on vulnerabilities, threat
defense framework is proposed, which structures intelligence, and other aspects and enhance the industrial
fragmented multisource data and integrates with network security active defense capability.
industrial network layout Structuring and organizing data can improve the
efficiency and accuracy of cybersecurity analysis. Sadighian
(ii) A distant supervised cybersecurity relation extrac-
et al. [10] proposed ONTIDS, an ontology alarm association
tion model based on ResPCNN-ATT is proposed
framework based on context information. By defining the
to reduce the impact of noise data in open source
ontology structure, security alarms are represented and
threat intelligence data sources
stored, and the association between alarm information is
(iii) ResPCNN-ATT first uses the pretrained word vector regularized; on this basis, rules are set to filter alarms to
and the position vector between cybersecurity entity reduce the false alarm rate and facilitate network security
pairs as the model input and then uses PCNN to analysis. In order to further achieve cybersecurity informa-
extract the semantic features. Deep residual learning tion correlation and semantic analysis, many researches
is used to solve the problem of gradient disappear- are devoted to improving the interpretation, feature
ance caused by noise data. A multi-instance atten- correlation, and data processing of the alarm log, reducing
tion mechanism is used to calculate the correlation the false alarm rate, and enhancing cybersecurity analysis
between instance and the corresponding relation to capability [11–13].
reduce the impact of noise data Data-driven cybersecurity event prediction and analysis
are hot topics in the current cybersecurity research [14].
(iv) The datasets CSER and ICSER are constructed. We Shu et al. introduced a new methodology that models threat
first empirically demonstrate the performance of discovery as a graph computation problem for threat
the proposed method in the field of general cyberse- intelligence [15]. Yu et al. proposed a relation extraction
curity by using dataset CSER. And then, we analyze method for the construction of a knowledge graph in the
asset information and network layout of Electric food field [16]. As a semantic knowledge base, a knowledge
Wireless Communications and Mobile Computing 3
Cybersecurity analysis
Precise decision- Hidden threat Knowledge
making for correlation iteration to assist
asset security prediction decision-making
Visualization Cypher
Neo4j database
Elasticsearch
database Focused
Data processing
crawling
Data sources
Figure 1: The overall framework of data-driven industrial control network security analysis.
SPLC TPLC
TAP
SAP
SIED3 SSW2 SSW1 CSW1 TSW1 TSW2 TIED3
Transmission
Smart home SIED4 HSR4 GOOSE
GOOSE HSR3
CAP1 TIED2 TIED1
SIED1
SIED2
Historian CSW2 CPLC
AP - access point
IED - intelligent electrical device
CAP2 TWS
SW - network switches
CSW3 - firewall
MMS
SCADA PLC - programmable logic control
CSW3
VSD - variable speed drive
wireless
workstations and IEDs and communicate through GOOSE in knowledge graph. The ontology structure we define in this
four stages. The fieldbus communication between physical paper is shown in Figure 3.
process and PLC, Master PLC, and SCADA of each stage is We define 9 relations including model, _have_, version_,
achieved through optional wired and wireless channels. AKA, version, _by_, CVSS_score, module, help_out, and
The key asset resources in EPIC [31] mainly include the conn and additionally define two relations, comm and
following: SCADA system, which uses Pcvue in EPIC and asset_info, to represent the connection relation in the EPIC
runs on a personal computer equipped with the Windows communication network and asset information. There are
operating system; PLCs, which use WAGO’s PLC series 11 relations in total. Use <head, tail, relation> to identify
PFC200 perform logic control in EPIC, located on control the head entity, tail entity, and the relation between them.
and network panel, and work based on firmware and control In this paper, the information of the network layout is
logic programs, and in a few cases, use Modbus TCP/IP com- mapped into triples <asset1, asset2, comm>, such as
munication; Codesys (Codesys v3), which is the program- <MIED1, MIED2, comm>. Furthermore, <asset, Product,
ming standard of PLC; IEDs, SIPROTEC Relays from asset_info> combines the internal network layout and exter-
Siemens for protection and control which is used in EPIC, nal threat intelligence through connecting asset nodes with
located in the control center and uses IEC61850 standard to the product information used by them. Through analysis of
communicate with the rest of the system, and maintains the vulnerability databases, the vulnerability number is associ-
entire process by firmware and control logic; VSD, SEW ated with CVSS score, solution, attack vector, and other
Eurodrive and the corresponding motor which are used as relevant vulnerability numbers, making vulnerability analysis
VSD in EPIC, located in the motor/generator room; and more multidimensional.
network switches and access points located in the network
control panel which adopt HIRSCHMANN products. 5. The Proposed Model
In this section, we describe the architecture of the proposed
4.2. Ontology Structure. Mining EPIC-related vulnerabilities
cybersecurity entity relation extraction model and then intro-
to form a knowledge graph correspond to network layout duce each component of the model in detail.
and asset information of EPIC. For the convenience of Under the framework of distant supervised learning, the
research, the study mainly considers assets involved in the problem of insufficient label data in deep learning can be
communication layout of EPIC. In this paper, we use assets solved, but at the same time, it also brings some problems,
as keywords to collect strong correlation information from such as the low-quality label data and the wrong label data.
vulnerability databases and form a relation extraction corpus This would have a great impact on subsequent tasks of entity
with common vulnerabilities in ICS. The communication relation extraction. In view of the above problems, we
layout in EPIC is mapped into multiple groups of bidirec- propose a distant supervised relation extraction model
tional communication relation between nodes and repre- ResPCNN-ATT based on the deep residual neural network
sented by triples. The connection between internal network and attention mechanism. The framework is shown in
layout and external threat information is established through Figure 4. The model is mainly composed of a vector
the matching between nodes and specific asset information, representation layer, a deep residual convolutional network
thus forming the final industrial control network security layer, and a multi-instance attention layer.
6 Wireless Communications and Mobile Computing
c3
c2
…
c1
f(x)+x
Alies x f(x) 𝛼1
discover
Chrome 𝛼2
+
has
…
…
Struts2 𝛼i
vulnerability
max (c1,3)
…
Residual
Identity shortcut convolution block
The model first uses the pretrained word vector and the
c p ⁎2
position vector between entity pairs as input, which can high- d d
light the role of the two entities, and then uses the piecewise
convolutional neural networks to extract semantic features. Alies …… –2 –4
At the same time, deep residual learning is introduced to solve
the problem of gradient disappearance caused by noise data, discover …… –1 –3
so as to extract more effective semantic features. Finally, in
order to better capture the more important semantic features Chrome …… 0 –2
in sentences, the multi-instance attention mechanism is used
to calculate the correlation between instances and correspond- has …… 1 –1
ing relation, so as to reduce the impact of noise data and
improve the performance of relation extraction. XSS …… 2 0
from “Alies” to “Chrome” is 2, the distance from “Alies” to where ai is the weight of the input instance vector gi , which
“XSS” is 4, the distance from “vulnerability” to “Chrome” is measures the correlation of the corresponding relation r.
-3, and the distance from “vulnerability” to “XSS” is -1. The calculation formula of αi is as follows:
5.2. Deep Residual Neural Network. In cybersecurity relation exp ðei Þ
extraction tasks, the main challenge is that the length of the αi = : ð5Þ
∑k expðek Þ
input sentence is variable and not fixed, and important fea-
ture information may appear in any area of the sentence.
Therefore, in order to be able to use all local features and ei is a query-based function, which indicates the degree of
predict relations globally, this paper uses a piecewise convo- matching between the input instance vector gi and the
lutional neural network PCNN model to extract semantic prediction relation r.
features in sentences. Conditional probability of prediction relation pðR ∣ SÞ is
In this paper, a residual convolution block is designed for calculated by softmax function:
residual learning. Each residual convolution block is a
sequence composed of two convolution layers. After each pðR ∣ SÞ = soft max ð~r S + bÞ, ð6Þ
convolution layer, the activation function ReLU is used for
nonlinear mapping, and features are then extracted using a where ~r is the relation matrix and b represents the bias vector.
local maximum pool. The kernel size of all convolution pðR ∣ SÞ is used to predict the relation between pairs of cyber-
operations in the residual convolution module is w, and security entities:
the newly generated features are guaranteed to be the
same size as the original ones through the border padding ~ = arg max pðR ∣ SÞ:
R ð7Þ
operation. The convolution kernels of the two-layer convo-
lution are W 1 , W 2 ∈ Rw∗1 . The first layer of the residual 6. Performance Evaluation
convolution block is
In this section, we empirically demonstrate the performance
of the proposed method on datasets CSER and ICSER. Com-
ci,1 = f ðW 1 ⋅ ci,i+w−1 + b1 Þ: ð2Þ monly used Precision-Recall (P‐R) curve, AUC value, and
average accuracy (P@N) are used to evaluate the model.
The second layer is The P‐R curve is a curve drawn with the recall rate R as the
abscissa and the accuracy rate P as the ordinate, using P
and R at different confidence levels. The AUC value is the
ci,2 = f ðW 2 ⋅ ci,i+w−1 + b2 Þ, ð3Þ area included under the P‐R curve. Generally, the larger the
AUC value is, the better the model performs. P@N is the
where b1 , b2 are bias vectors. In this paper, we optimize accuracy rate calculated by comparing the first N relation
the residual learning to get the output vector c of the instances.
residual convolution block [32, 33].
After the semantic feature is acquired by the convolution 6.1. Datasets and Parameters. In order to verify the perfor-
layer, the most representative local feature is further mance of our proposed model, we build a cybersecurity entity
extracted by the pooling layer. In order to capture character- relation (CSER) dataset. 10 types of relations were labeled.
istic information of different sentence structures, a piecewise The dataset CSER is clawed from the Freebuf (https://www
max pooling process is used. .freebuf.com/) website and wooyun vulnerability database,
which includes network text data such as technology sharing,
5.3. Multi-Instance Attention. In the relational extraction network security, and vulnerability information.
model, sentence-level attention is built on multiple instances, The set of dimensions of the word vector is f50, 60,⋯,
dynamically reducing the weight of noisy instances, and 300g. The set of dimensions of the position vector is f1,
making full use of semantic information in these sentences 2,⋯,10g. During the training process, the Adam optimizer
to obtain final sentence vector representation. performs optimization training. The value set of the learn-
For the instance set S = ðg1 , g2 , g3 ,⋯,gn Þ describing the ing rate is {0.01, 0.001, 0.0001}. The set of batch sizes
same entity pair <ei , e j > , gi is the instance vector output processed in one iteration is {40, 160, 640, 1280}. In order
by the convolution layer and n is the number of instances to prevent the model from overfitting, the dropout method
contained in the set S. This paper will calculate the correla- is used in CNN. Other parameters are shown in Table 1.
tion degree between the instance vector gi and the relation
6.2. Results and Analysis. The experimental comparison in
r. In order to reduce the impact of noise data and make full this paper mainly compares two aspects of the models.
use of the semantic information contained in each instance On the one hand, it uses the CNN algorithm with differ-
in the set, the calculation of instance set vector S will depend ent performances to encode the training data and extract the
on each instance gi in the set: semantic features in the sentence, mainly including the tradi-
tional models: CNN, PCNN, and ResPCNN.
S = 〠 αi g i , ð4Þ The second aspect is based on how CNN/PCNN/
i ResPCNN uses the information in the packaging bag for
8 Wireless Communications and Mobile Computing
Precision
0.6
Batch size 160
0.5
Epoch 60
0.4
Dimension of the position vector 5
Dropout rate 0.5 0.3
Precision-recall Precision-recall
1.0 1.0
0.9 0.9
0.8 0.8
0.7 0.7
Precision
Precision
0.6 0.6
0.5 0.5
0.4
0.4
0.3
0.3
0.2
0.2
0.1
0.00 0.05 0.10 0.15 0.20 0.25 0.30 0.1
Recall 0.00 0.05 0.10 0.15 0.20 0.25 0.30
Recall
ResPCNN_AVE
ResPCNN_ONE CNN-5_ATT ResPCNN-3_ATT
ResPCNN_ATT PCNN-5_ATT ResPCNN-7_ATT
ResPCNN-3_ATT ResPCNN-9_ATT
Figure 8: The results of different bag methods AVE/ONE/ATT
based on ResPCNN. Figure 10: The results on models with different depths.
Precision-recall
1.0 Precision-recall
1.0
0.9
0.9
0.8
0.7 0.8
Precision
0.6
Precision
0.7
0.5
0.4 0.6
0.3
0.5
0.2
0.4
0.1
0.00 0.05 0.10 0.15 0.20 0.25 0.30
Recall 0.3
0.00 0.05 0.10 0.15 0.20 0.25
CNN_ATT Recall
PCNN_ATT
ResPCNN_ATT ResPCNN-3_ATT
ResPCNN-5_ATT
Figure 9: The results of different sentence semantic feature
extraction models CNN/PCNN/ResPCNN. Figure 11: The results of ResPCNN-ATT with different depths on
dataset ICSER.
Table 2: Results for the first 100, 200, and 300 extracted relation entity pairs, and 4001 sentences were selected as test data,
instances upon manual evaluation.
which included 876 entity pairs.
Models P@100 P@200 P@300 Mean AUC In this paper, when the depth of the ResPCNN-ATT
model is 3 and 5, respectively, an experiment is carried out
CNN+AVE 0.3267 0.2537 0.2452 0.2743 0.1062
on dataset ICSER, corresponding to different layers of
CNN+ONE 0.2971 0.3035 0.2392 0.2799 0.1096 convolution layers. Figure 11 shows the P‐R curves at differ-
CNN+ATT 0.3267 0.2437 0.2425 0.2710 0.1121 ent depths. The P‐R curves above show the effectiveness of
PCNN+AVE 0.2971 0.2587 0.2645 0.2727 0.1096 introducing residual learning when the model depth is
PCNN+ONE 0.3168 0.2587 0.2358 0.2705 0.1109 shallow such as 3 and 5.
PCNN+ATT 0.3267 0.2736 0.2525 0.2842 0.1121 Table 3 shows the prediction accuracy and AUC values of
ResPCNN+AVE 0.3267 0.2686 0.2458 0.2804 0.1205 the test set in the first 100, 200, and 300 relation instances of
the model at two depths. Based on the complex industrial
ResPCNN+ONE 0.3564 0.2786 0.2558 0.2969 0.1184
control network security dataset, the model has performed
ResPCNN+ATT 0.4158 0.3084 0.2558 0.3267 0.1268 well.
10 Wireless Communications and Mobile Computing
Table 3: Results for the first 100, 200, and 300 extracted relation instances.
CVE-20...
SVUIGrd...
CEV-20...
ActiveX
e
CVE-20... dul
Mo
Pcvue
CSW3 HMI
ARC
le
informa...
u
Mod
Eagle
TWS SCADA
works...
Pcvue
MSW1
BAT-R
CAP2
TAP TSW2
CVE-20...
MSW2
Hirschm...
RSL
7.2. Visualization and Analysis. Finally, 3878 relationships can help to troubleshoot equipment failures and strengthen
are extracted and stored. Asset as an entity has the communi- security status. The asset vulnerability corresponding to the
cation relation between other assets in network layout. One vulnerability, such as the port number used, is associated
specific asset node matches one asset equipment at least; with the exploit relationship.
through brands, models, or components used by asset equip- The preliminary construction of the EPIC industrial
ment, the corresponding vulnerability information can be control network security knowledge graph not only facilitates
connected with the asset. A part of the relations of asset node daily management, daily maintenance, and network security
SCADA workstation is shown in Figure 12. analysis but also supports the completion of downstream
The versions, components, and vulnerabilities of WAGO tasks of the knowledge graph. The knowledge expression
RFC200 series of products used by PLC in EPIC can be seen form in the knowledge graph is simple, intuitive, flexible,
in Figure 13. The correlation between different vulnerabilities and rich. Based on the existing knowledge graph structure,
is defined, such as the correlation between vulnerabilities we can deepen the industrial control network security
from CVE and CWE, which enables the network analysis to defense at a deeper level and make network security defense
locate the source code faster and more accurately. research more diversified. Further, through knowledge
As shown in Figure 14, the CVSS score can quantify the reasoning, we can link to hidden entities and predict new
vulnerability threat level; information such as vulnerability relationships. It helps find out new attack behaviors and
solutions, patch links, and security recommendations is improve the richness and accuracy of the knowledge graph.
structurally related to the corresponding vulnerability, which The mining of entities and relationships offers constant
Wireless Communications and Mobile Computing 11
10 1SAP12...
6ES7211...
CVE-20... CVE-20...
ICSA-20...
ICSA-18... 6ED105...
CVE-20...
Web-GUI ICSA-19...
Module SIMATIC
S7-400
750-881
I/O-CHE... ICSA-19...
CWE-400 CVE-20...
0758-08...
PFC100 750-81xx
Module
I/O-Che...
CVE-20...
02.07.07... ICSA-20... Control
BeagleB...
Win V3
ule
CODESYS
od
M
Mod
ule
PFC200
CWE-522 750-87x
ICSA-19...
750-8202
750-82xx
ICSA-17…
CVE-20…
v4.30 v4.33
conn
http://gl…
MMS
on_
versio
versi
n_
9.8 ul
e
CWE-287
conn
od
m
help
_ou
t
CV IEC DNP3
SS
_S 61850
nn
co
re
co
ve_
CV
http://w… _ha
SS_
CV
S co
CVE-20…
SS
ICSA-19…
re
_S
ICSA-18…
c
he
or
lp_
e
ou
t PROFIN…
ve_
_have_
_ha
CVE-20…
nn
co
_ha
ve_
_have_
t CVE-20…
_ou n
help con
ut
nn
help_o
co
EN100
t Ethernet CWE-119
SINAMI… _ou
help module
ICSA-19… con
n
ut
_o
ICSA-18…
lp
ICSA-19…
he
EKI-136
n_
_hav
io
e_
rs
ve
le
Ethernet
du
_h
module
mo
Module
co
ave
modul
nn
_
co
e
https://s…
nn
_have_
v4.37 CWE-79
IEC104
PROFIN…
CWE-20
DNP3 DNP3
TCP TPOP TCP
supplement for the existing knowledge graph and makes 512 project promotion program,” Network Security and Infor-
sense in decision-making, to enhance the active defense matization, vol. 1, pp. 23-24, 2020.
capability of industrial control network security. [5] C. Feng, V. R. Palleti, A. Mathur, and D. Chana, “A systematic
framework to generate invariants for anomaly detection in
8. Conclusions industrial control systems,” in Proceedings 2019 Network and
Distributed System Security Symposium, San Diego, CA, USA,
In this paper, we propose a novel data-driven industrial 2019.
network security defense framework, which structures [6] S. McLaughlin, C. Konstantinou, X. Wang et al., “The cyberse-
fragmented multisource data and integrates these threat data curity landscape in industrial control systems,” Proceedings of
with the industrial network structure. In order to better mine the IEEE, vol. 104, no. 5, pp. 1039–1057, 2016.
entity relations in cybersecurity data, we introduce a novel [7] H. Holm, M. Karresand, A. Vidström, and E. Westring, “A
distant supervised cybersecurity relation extraction model survey of industrial control system testbeds,” in Secure IT Sys-
ResPCNN-ATT. The experimental results show that the tems, pp. 11–26, Springer International Publishing, Cham,
model proposed in this paper has the highest accuracy of 2015.
relation extraction compared with other model methods on [8] C. Wang, D. Wang, Y. Tu, G. Xu, and H. Wang, “Understand-
cybersecurity datasets. Further, based on specific industrial ing node capture attacks in user authentication schemes for
control network security scenarios, we constructed an ICS wireless sensor networks,” IEEE Transactions on Dependable
and Secure Computing, p. 1, 2020.
security knowledge graph by applying ResPCNN-ATT,
which strengthens the cybersecurity analysis capabilities. In [9] D. Wang, W. Li, and P. Wang, “Measuring two-factor authen-
tication schemes for real-time data access in industrial wireless
the future, we intend to introduce reinforcement learning
sensor networks,” IEEE Transactions on Industrial Informat-
to the model to further reduce the impact of noise and study ics, vol. 14, no. 9, pp. 4081–4092, 2018.
the downstream application tasks of the industrial control
[10] A. Sadighian, J. M. Fernandez, A. Lemay, and S. T. Zargar,
network security knowledge graph to strengthen the indus-
“Ontids: A highly flexible context-aware and ontology-based
trial control network security defense capabilities. alert correlation framework,” in Foundations and Practice of
Security. FPS 2013, J. Danger, M. Debbabi, J. Y. Marion, J.
Data Availability Garcia-Alfaro, and N. Zincir Heywood, Eds., vol. 8352 of Lec-
ture Notes in Computer Science, pp. 161–177, Springer, Cham,
All the data used to support this study were supplied by 2014.
Guowei Shen under license and so cannot be made freely [11] R. Shittu, A. Healing, R. Ghanea-Hercock, R. Bloomfield, and
available. Requests for access to these data should be made M. Rajarajan, “Intrusion alert prioritisation and attack detec-
to Guowei Shen (gwshen@gzu.edu.cn). tion using post-correlation analysis,” Computers & Security,
vol. 50, pp. 1–15, 2015.
Conflicts of Interest [12] Y. Yao, Z. Wang, C. Gan et al., “Multi-source alert data under-
standing for security semantic discovery based on rough set
The authors declare that there is no conflict of interest theory,” Neurocomputing, vol. 208, pp. 39–45, 2016.
regarding the publication of this paper. [13] A. A. Ramaki, A. Rasoolzadegan, and A. G. Bafghi, “A system-
atic mapping study on intrusion alert analysis in intrusion
Acknowledgments detection systems,” ACM Computing Surveys, vol. 51, no. 3,
pp. 1–41, 2018.
This work is supported by the National Natural Science [14] N. Sun, J. Zhang, P. Rimba, S. Gao, L. Y. Zhang, and Y. Xiang,
Foundation of China under Grant 61802081 and Big Data “Data-driven cybersecurity incident prediction: a survey,”
Application on Improving Government Governance Capa- IEEE Communications Surveys & Tutorials, vol. 21, no. 2,
bilities National Engineering Laboratory Open Fund Project pp. 1744–1772, 2019.
(No.W-2018023). [15] X. Shu, F. Araujo, D. L. Schales et al., “Threat intelligence com-
puting,” in Proceedings of the 2018 ACM SIGSAC Conference
References on Computer and Communications Security, pp. 1883–1898,
Toronto, Canada, 2018.
[1] N. Falliere, L. O. Murchu, and E. Chien, “W32. Stuxnet dos- [16] H. Yu, H. Li, D. Mao, and Q. Cai, “A relationship extraction
sier,” White paper, Symantec Corporation Security Response, method for domain knowledge graph construction,” World
vol. 5, no. 6, p. 29, 2011. Wide Web, vol. 23, no. 2, pp. 735–753, 2020.
[2] I. C. S. C. Alert, Cyber-attack against Ukrainian critical [17] X. Liao, K. Yuan, X. F. Wang, Z. Li, L. Xing, and R. Beyah,
infrastructure. Cybersecurity Infrastructure Security Agency, “Acing the ioc game: toward automatic discovery and analysis
Technical Report ICS Alert (IR-ALERT-H-16-056-01), of open-source cyber threat intelligence,” in Proceedings of the
Washington, DC, USA, 2016. 2016 ACM SIGSAC Conference on Computer and Communica-
[3] K. Coffey, R. Smith, L. Maglaras, and H. Janicke, “Vulnerabil- tions Security, pp. 755–766, Vienna, Austria, 2016.
ity analysis of network scanning on SCADA systems,” Security [18] G. Siracusano, M. Trevisan, R. Gonzalez, and R. Bifulco,
and Communication Networks, vol. 2018, Article ID 3794603, “Poster: on the application of NLP to discover relationships
21 pages, 2018. between malicious network entities,” in Proceedings of the
[4] L. Zhen, “Cultivate the 5G+ industrial internet to promote 2019 ACM SIGSAC Conference on Computer and Communica-
mutual progress-interpretation of "5G+ industrial internet" tions Security, pp. 2641–2643, London, United Kingdom, 2019.
Wireless Communications and Mobile Computing 13
[19] Z. Zhu and T. Dumitras, “Chainsmith: automatically learn- [32] Y. Y. Huang and W. Y. Wang, “Deep residual learning for
ing the semantics of malicious campaigns by mining threat weakly-supervised relation extraction,” 2017, https://arxiv
intelligence reports,” in 2018 IEEE European Symposium on .org/abs/1707.08866.
Security and Privacy (EuroS&P), pp. 458–472, London, UK, [33] K. He, X. Zhang, S. Ren, and J. Sun, “Deep residual learning for
2018. image recognition,” in 2016 IEEE Conference on Computer
[20] A. Pingle, A. Piplai, S. Mittal, A. Joshi, J. Holt, and R. Zak, Vision and Pattern Recognition (CVPR), pp. 770–778, Las
“RelExt: relation extraction using deep learning approaches Vegas, NV, USA, 2016.
for cybersecurity knowledge graph improvement,” in Proceed-
ings of the 2019 IEEE/ACM International Conference on
Advances in Social Networks Analysis and Mining, pp. 879–
886, Vancouver, British Columbia, Canada, 2019.
[21] Y. Dong, W. Guo, Y. Chen, X. Xing, Y. Zhang, and G. Wang,
“Towards the detection of inconsistencies in public security
vulnerability reports,” in 28th {USENIX} Security Symposium
({USENIX} Security 19), pp. 869–885, Santa Clara, CA, USA,
2019.
[22] R. Socher, B. Huval, C. D. Manning, and A. Y. Ng, “Semantic
compositionality through recursive matrix-vector spaces,”
in Proceedings of the 2012 Joint Conference on Empirical
Methods in Natural Language Processing and Computational
Natural Language Learning, pp. 1201–1211, Jeju Island,
Korea, 2012.
[23] Z. Daojian, L. Kang, L. Siwei, G. Zhou, and J. Zhao, “Relation
classification via convolutional deep neural network,” in Pro-
ceedings of COLING 2014, the 25th International Conference
on Computational Linguistics: Technical Papers, pp. 2335–
2344, Dublin, Ireland, 2014.
[24] P. Zhou, W. Shi, J. Tian et al., “Attention-based bidirectional
long short-term memory networks for relation classification,”
in Proceedings of the 54th Annual Meeting of the Association
for Computational Linguistics (Volume 2: Short Papers),
pp. 207–212, Berlin, Germany, 2016.
[25] C. N. D. Santos, B. Xiang, and B. Zhou, “Classifying relations
by ranking with convolutional neural networks,” Computer
Science, vol. 86, no. 86, pp. 132–137, 2015.
[26] Y. Lin, S. Shen, Z. Liu, H. Luan, and M. Sun, “Neural relation
extraction with selective attention over instances,” in Proceed-
ings of the 54th Annual Meeting of the Association for Compu-
tational Linguistics (Volume 1: Long Papers), pp. 2124–2133,
Berlin, Germany, 2016.
[27] D. Zeng, K. Liu, Y. Chen, and J. Zhao, “Distant supervision
for relation extraction via piecewise convolutional neural
networks,” in Proceedings of the 2015 Conference on Empir-
ical Methods in Natural Language Processing, pp. 1753–
1762, Lisbon, Portugal, 2015.
[28] P. Qin, W. Xu, and W. Y. Wang, “Robust distant supervision
relation extraction via deep reinforcement learning,” 2018,
https://arxiv.org/abs/1805.09927.
[29] Y. Qin, G. Shen, W. Zhao, Y. P. Chen, M. Yu, and X. Jin, “A
network security entity recognition method based on feature
template and CNN-BiLSTM-CRF,” Frontiers of Information
Technology & Electronic Engineering, vol. 20, no. 6, pp. 872–
884, 2019.
[30] S. Adepu, N. K. Kandasamy, and A. Mathur, “Epic: An electric
power testbed for research and training in cyber physical sys-
tems security,” in Computer Security, SECPRE 2018, Cyber-
ICPS 2018, S. Katsikas, Ed., vol. 11387 of Lecture Notes in
Computer Science, pp. 37–52, Springer, Cham, 2018.
[31] S. Adepu, N. K. Kandasamy, J. Zhou, and A. Mathur, “Attacks
on smart grid: power supply interruption and malicious power
generation,” International Journal of Information Security,
vol. 19, no. 2, pp. 189–211, 2020.