Enhancing cybersecurity through autonomous knowledge graph construction by integrating heterogeneous data sources

Cybersecurity plays a critical role in today’s modern human society, and leveraging knowledge graphs can enhance cybersecurity and privacy in the cyberspace. By harnessing the heterogeneous and vast amount of information on potential attacks, organizations can improve their ability to proactively de...

Full description

Saved in:
Bibliographic Details
Main Authors: Hatoon Alharbi, Ali Hur, Hasan Alkahtani, Hafiz Farooq Ahmad
Format: Article
Language:English
Published: PeerJ Inc. 2025-04-01
Series:PeerJ Computer Science
Subjects:
Online Access:https://peerj.com/articles/cs-2768.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849698502843564032
author Hatoon Alharbi
Ali Hur
Hasan Alkahtani
Hafiz Farooq Ahmad
author_facet Hatoon Alharbi
Ali Hur
Hasan Alkahtani
Hafiz Farooq Ahmad
author_sort Hatoon Alharbi
collection DOAJ
description Cybersecurity plays a critical role in today’s modern human society, and leveraging knowledge graphs can enhance cybersecurity and privacy in the cyberspace. By harnessing the heterogeneous and vast amount of information on potential attacks, organizations can improve their ability to proactively detect and mitigate any threat or damage to their online valuable resources. Integrating critical cyberattack information into a knowledge graph offers a significant boost to cybersecurity, safeguarding cyberspace from malicious activities. This information can be obtained from structured and unstructured data, with a particular focus on extracting valuable insights from unstructured text through natural language processing (NLP). By storing a wide range of cyber threat information in a semantic triples form which machines can interpret autonomously, cybersecurity experts gain improved visibility and are better equipped to identify and address cyber threats. However, constructing an efficient knowledge graph poses challenges. In our research, we construct a cybersecurity knowledge graph (CKG) autonomously using heterogeneous data sources. We further enhance the CKG by applying logical rules and employing graph analytic algorithms. To evaluate the effectiveness of our proposed CKG, we formulate a set of queries as questions to validate the logical rules. Ultimately, the CKG empowers experts to efficiently analyze data and gain comprehensive understanding of cyberattacks, thereby help minimize potential attack vectors.
format Article
id doaj-art-ec5a2e36120848a492ea799770d9ecfb
institution DOAJ
issn 2376-5992
language English
publishDate 2025-04-01
publisher PeerJ Inc.
record_format Article
series PeerJ Computer Science
spelling doaj-art-ec5a2e36120848a492ea799770d9ecfb2025-08-20T03:18:53ZengPeerJ Inc.PeerJ Computer Science2376-59922025-04-0111e276810.7717/peerj-cs.2768Enhancing cybersecurity through autonomous knowledge graph construction by integrating heterogeneous data sourcesHatoon Alharbi0Ali Hur1Hasan Alkahtani2Hafiz Farooq Ahmad3Computer Science Department, College of Computer Sciences and Information Technology (CCSIT), King Faisal University, Eastern Province, Al-Ahsa, Saudi ArabiaSchool of Science, Edith Cowan University, Joondalup, Western Australia, AustraliaComputer Science Department, College of Computer Sciences and Information Technology (CCSIT), King Faisal University, Eastern Province, Al-Ahsa, Saudi ArabiaComputer Science Department, College of Computer Sciences and Information Technology (CCSIT), King Faisal University, Eastern Province, Al-Ahsa, Saudi ArabiaCybersecurity plays a critical role in today’s modern human society, and leveraging knowledge graphs can enhance cybersecurity and privacy in the cyberspace. By harnessing the heterogeneous and vast amount of information on potential attacks, organizations can improve their ability to proactively detect and mitigate any threat or damage to their online valuable resources. Integrating critical cyberattack information into a knowledge graph offers a significant boost to cybersecurity, safeguarding cyberspace from malicious activities. This information can be obtained from structured and unstructured data, with a particular focus on extracting valuable insights from unstructured text through natural language processing (NLP). By storing a wide range of cyber threat information in a semantic triples form which machines can interpret autonomously, cybersecurity experts gain improved visibility and are better equipped to identify and address cyber threats. However, constructing an efficient knowledge graph poses challenges. In our research, we construct a cybersecurity knowledge graph (CKG) autonomously using heterogeneous data sources. We further enhance the CKG by applying logical rules and employing graph analytic algorithms. To evaluate the effectiveness of our proposed CKG, we formulate a set of queries as questions to validate the logical rules. Ultimately, the CKG empowers experts to efficiently analyze data and gain comprehensive understanding of cyberattacks, thereby help minimize potential attack vectors.https://peerj.com/articles/cs-2768.pdfCybersecurity knowledge graphDeduction ruleGraph analytics algorithmNatural language processing.
spellingShingle Hatoon Alharbi
Ali Hur
Hasan Alkahtani
Hafiz Farooq Ahmad
Enhancing cybersecurity through autonomous knowledge graph construction by integrating heterogeneous data sources
PeerJ Computer Science
Cybersecurity knowledge graph
Deduction rule
Graph analytics algorithm
Natural language processing.
title Enhancing cybersecurity through autonomous knowledge graph construction by integrating heterogeneous data sources
title_full Enhancing cybersecurity through autonomous knowledge graph construction by integrating heterogeneous data sources
title_fullStr Enhancing cybersecurity through autonomous knowledge graph construction by integrating heterogeneous data sources
title_full_unstemmed Enhancing cybersecurity through autonomous knowledge graph construction by integrating heterogeneous data sources
title_short Enhancing cybersecurity through autonomous knowledge graph construction by integrating heterogeneous data sources
title_sort enhancing cybersecurity through autonomous knowledge graph construction by integrating heterogeneous data sources
topic Cybersecurity knowledge graph
Deduction rule
Graph analytics algorithm
Natural language processing.
url https://peerj.com/articles/cs-2768.pdf
work_keys_str_mv AT hatoonalharbi enhancingcybersecuritythroughautonomousknowledgegraphconstructionbyintegratingheterogeneousdatasources
AT alihur enhancingcybersecuritythroughautonomousknowledgegraphconstructionbyintegratingheterogeneousdatasources
AT hasanalkahtani enhancingcybersecuritythroughautonomousknowledgegraphconstructionbyintegratingheterogeneousdatasources
AT hafizfarooqahmad enhancingcybersecuritythroughautonomousknowledgegraphconstructionbyintegratingheterogeneousdatasources