Quality assessment of cyber threat intelligence knowledge graph based on adaptive joining of embedding model

Abstract In the research of cyber threat intelligence knowledge graphs, the current challenge is that there are errors, inconsistencies, or missing knowledge graph triples, which makes it difficult to cope with the complexity and diversified application requirements. Currently, the predominant appro...

Full description

Saved in:
Bibliographic Details
Main Authors: Bin Chen, Hongyi Li, Di Zhao, Yitang Yang, Chengwei Pan
Format: Article
Language:English
Published: Springer 2024-11-01
Series:Complex & Intelligent Systems
Subjects:
Online Access:https://doi.org/10.1007/s40747-024-01661-3
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832571185396711424
author Bin Chen
Hongyi Li
Di Zhao
Yitang Yang
Chengwei Pan
author_facet Bin Chen
Hongyi Li
Di Zhao
Yitang Yang
Chengwei Pan
author_sort Bin Chen
collection DOAJ
description Abstract In the research of cyber threat intelligence knowledge graphs, the current challenge is that there are errors, inconsistencies, or missing knowledge graph triples, which makes it difficult to cope with the complexity and diversified application requirements. Currently, the predominant approach in quality assessment research for knowledge graphs involves employing word embeddings. This method evaluates the rationality of triples to assess the quality of knowledge graphs. Recent studies have found that better word representations can be obtained by splicing different types of embeddings, and applied to tasks such as named entity recognition (NER). However, amidst the proliferation of embedding typologies, the conundrum of selecting optimal embeddings for constructing connection representations has emerged as a pressing issue. In this paper, we propose an adaptive joining of embedding (AJE) model to automatically find better word embedding representations for knowledge graph quality assessment. The AJE model operates through a coordinated interplay between a task model and a selector. The former samples word embeddings generated by various models, while the latter generates rewards predicated on feedback obtained from current task outcomes to decide whether or not to splice the embedding. Experiments were conducted on two generic datasets and one cybersecurity dataset for knowledge graph quality assessment. The results show that our model outperforms the baseline model and achieves significant advantages in key metrics such as accuracy and F1 value, obtaining accuracy of 95.8%, 95.6% and 91.3% on the generic datasets WN11, FB13 and cybersecurity dataset CS13K, respectively, representing increases of 1.0%, 0.2% and 0.5% over the AttTucker model.
format Article
id doaj-art-9b91b68960cb4d9aa82d19747c7a066c
institution Kabale University
issn 2199-4536
2198-6053
language English
publishDate 2024-11-01
publisher Springer
record_format Article
series Complex & Intelligent Systems
spelling doaj-art-9b91b68960cb4d9aa82d19747c7a066c2025-02-02T12:49:47ZengSpringerComplex & Intelligent Systems2199-45362198-60532024-11-0111111410.1007/s40747-024-01661-3Quality assessment of cyber threat intelligence knowledge graph based on adaptive joining of embedding modelBin Chen0Hongyi Li1Di Zhao2Yitang Yang3Chengwei Pan4School of Cyber Science and Technology, Beihang UniversitySchool of Mathematical Sciences, Beihang UniversitySchool of Mathematical Sciences, Beihang UniversitySchool of Software, Beihang UniversitySchool of Artificial Intelligence, Beihang UniversityAbstract In the research of cyber threat intelligence knowledge graphs, the current challenge is that there are errors, inconsistencies, or missing knowledge graph triples, which makes it difficult to cope with the complexity and diversified application requirements. Currently, the predominant approach in quality assessment research for knowledge graphs involves employing word embeddings. This method evaluates the rationality of triples to assess the quality of knowledge graphs. Recent studies have found that better word representations can be obtained by splicing different types of embeddings, and applied to tasks such as named entity recognition (NER). However, amidst the proliferation of embedding typologies, the conundrum of selecting optimal embeddings for constructing connection representations has emerged as a pressing issue. In this paper, we propose an adaptive joining of embedding (AJE) model to automatically find better word embedding representations for knowledge graph quality assessment. The AJE model operates through a coordinated interplay between a task model and a selector. The former samples word embeddings generated by various models, while the latter generates rewards predicated on feedback obtained from current task outcomes to decide whether or not to splice the embedding. Experiments were conducted on two generic datasets and one cybersecurity dataset for knowledge graph quality assessment. The results show that our model outperforms the baseline model and achieves significant advantages in key metrics such as accuracy and F1 value, obtaining accuracy of 95.8%, 95.6% and 91.3% on the generic datasets WN11, FB13 and cybersecurity dataset CS13K, respectively, representing increases of 1.0%, 0.2% and 0.5% over the AttTucker model.https://doi.org/10.1007/s40747-024-01661-3Knowledge graphQuality assessmentReinforcement learningCyber threat intelligence
spellingShingle Bin Chen
Hongyi Li
Di Zhao
Yitang Yang
Chengwei Pan
Quality assessment of cyber threat intelligence knowledge graph based on adaptive joining of embedding model
Complex & Intelligent Systems
Knowledge graph
Quality assessment
Reinforcement learning
Cyber threat intelligence
title Quality assessment of cyber threat intelligence knowledge graph based on adaptive joining of embedding model
title_full Quality assessment of cyber threat intelligence knowledge graph based on adaptive joining of embedding model
title_fullStr Quality assessment of cyber threat intelligence knowledge graph based on adaptive joining of embedding model
title_full_unstemmed Quality assessment of cyber threat intelligence knowledge graph based on adaptive joining of embedding model
title_short Quality assessment of cyber threat intelligence knowledge graph based on adaptive joining of embedding model
title_sort quality assessment of cyber threat intelligence knowledge graph based on adaptive joining of embedding model
topic Knowledge graph
Quality assessment
Reinforcement learning
Cyber threat intelligence
url https://doi.org/10.1007/s40747-024-01661-3
work_keys_str_mv AT binchen qualityassessmentofcyberthreatintelligenceknowledgegraphbasedonadaptivejoiningofembeddingmodel
AT hongyili qualityassessmentofcyberthreatintelligenceknowledgegraphbasedonadaptivejoiningofembeddingmodel
AT dizhao qualityassessmentofcyberthreatintelligenceknowledgegraphbasedonadaptivejoiningofembeddingmodel
AT yitangyang qualityassessmentofcyberthreatintelligenceknowledgegraphbasedonadaptivejoiningofembeddingmodel
AT chengweipan qualityassessmentofcyberthreatintelligenceknowledgegraphbasedonadaptivejoiningofembeddingmodel