Enhancing cybersecurity through autonomous knowledge graph construction by integrating heterogeneous data sources
Cybersecurity plays a critical role in today’s modern human society, and leveraging knowledge graphs can enhance cybersecurity and privacy in the cyberspace. By harnessing the heterogeneous and vast amount of information on potential attacks, organizations can improve their ability to proactively de...
Saved in:
| Main Authors: | , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
PeerJ Inc.
2025-04-01
|
| Series: | PeerJ Computer Science |
| Subjects: | |
| Online Access: | https://peerj.com/articles/cs-2768.pdf |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1849698502843564032 |
|---|---|
| author | Hatoon Alharbi Ali Hur Hasan Alkahtani Hafiz Farooq Ahmad |
| author_facet | Hatoon Alharbi Ali Hur Hasan Alkahtani Hafiz Farooq Ahmad |
| author_sort | Hatoon Alharbi |
| collection | DOAJ |
| description | Cybersecurity plays a critical role in today’s modern human society, and leveraging knowledge graphs can enhance cybersecurity and privacy in the cyberspace. By harnessing the heterogeneous and vast amount of information on potential attacks, organizations can improve their ability to proactively detect and mitigate any threat or damage to their online valuable resources. Integrating critical cyberattack information into a knowledge graph offers a significant boost to cybersecurity, safeguarding cyberspace from malicious activities. This information can be obtained from structured and unstructured data, with a particular focus on extracting valuable insights from unstructured text through natural language processing (NLP). By storing a wide range of cyber threat information in a semantic triples form which machines can interpret autonomously, cybersecurity experts gain improved visibility and are better equipped to identify and address cyber threats. However, constructing an efficient knowledge graph poses challenges. In our research, we construct a cybersecurity knowledge graph (CKG) autonomously using heterogeneous data sources. We further enhance the CKG by applying logical rules and employing graph analytic algorithms. To evaluate the effectiveness of our proposed CKG, we formulate a set of queries as questions to validate the logical rules. Ultimately, the CKG empowers experts to efficiently analyze data and gain comprehensive understanding of cyberattacks, thereby help minimize potential attack vectors. |
| format | Article |
| id | doaj-art-ec5a2e36120848a492ea799770d9ecfb |
| institution | DOAJ |
| issn | 2376-5992 |
| language | English |
| publishDate | 2025-04-01 |
| publisher | PeerJ Inc. |
| record_format | Article |
| series | PeerJ Computer Science |
| spelling | doaj-art-ec5a2e36120848a492ea799770d9ecfb2025-08-20T03:18:53ZengPeerJ Inc.PeerJ Computer Science2376-59922025-04-0111e276810.7717/peerj-cs.2768Enhancing cybersecurity through autonomous knowledge graph construction by integrating heterogeneous data sourcesHatoon Alharbi0Ali Hur1Hasan Alkahtani2Hafiz Farooq Ahmad3Computer Science Department, College of Computer Sciences and Information Technology (CCSIT), King Faisal University, Eastern Province, Al-Ahsa, Saudi ArabiaSchool of Science, Edith Cowan University, Joondalup, Western Australia, AustraliaComputer Science Department, College of Computer Sciences and Information Technology (CCSIT), King Faisal University, Eastern Province, Al-Ahsa, Saudi ArabiaComputer Science Department, College of Computer Sciences and Information Technology (CCSIT), King Faisal University, Eastern Province, Al-Ahsa, Saudi ArabiaCybersecurity plays a critical role in today’s modern human society, and leveraging knowledge graphs can enhance cybersecurity and privacy in the cyberspace. By harnessing the heterogeneous and vast amount of information on potential attacks, organizations can improve their ability to proactively detect and mitigate any threat or damage to their online valuable resources. Integrating critical cyberattack information into a knowledge graph offers a significant boost to cybersecurity, safeguarding cyberspace from malicious activities. This information can be obtained from structured and unstructured data, with a particular focus on extracting valuable insights from unstructured text through natural language processing (NLP). By storing a wide range of cyber threat information in a semantic triples form which machines can interpret autonomously, cybersecurity experts gain improved visibility and are better equipped to identify and address cyber threats. However, constructing an efficient knowledge graph poses challenges. In our research, we construct a cybersecurity knowledge graph (CKG) autonomously using heterogeneous data sources. We further enhance the CKG by applying logical rules and employing graph analytic algorithms. To evaluate the effectiveness of our proposed CKG, we formulate a set of queries as questions to validate the logical rules. Ultimately, the CKG empowers experts to efficiently analyze data and gain comprehensive understanding of cyberattacks, thereby help minimize potential attack vectors.https://peerj.com/articles/cs-2768.pdfCybersecurity knowledge graphDeduction ruleGraph analytics algorithmNatural language processing. |
| spellingShingle | Hatoon Alharbi Ali Hur Hasan Alkahtani Hafiz Farooq Ahmad Enhancing cybersecurity through autonomous knowledge graph construction by integrating heterogeneous data sources PeerJ Computer Science Cybersecurity knowledge graph Deduction rule Graph analytics algorithm Natural language processing. |
| title | Enhancing cybersecurity through autonomous knowledge graph construction by integrating heterogeneous data sources |
| title_full | Enhancing cybersecurity through autonomous knowledge graph construction by integrating heterogeneous data sources |
| title_fullStr | Enhancing cybersecurity through autonomous knowledge graph construction by integrating heterogeneous data sources |
| title_full_unstemmed | Enhancing cybersecurity through autonomous knowledge graph construction by integrating heterogeneous data sources |
| title_short | Enhancing cybersecurity through autonomous knowledge graph construction by integrating heterogeneous data sources |
| title_sort | enhancing cybersecurity through autonomous knowledge graph construction by integrating heterogeneous data sources |
| topic | Cybersecurity knowledge graph Deduction rule Graph analytics algorithm Natural language processing. |
| url | https://peerj.com/articles/cs-2768.pdf |
| work_keys_str_mv | AT hatoonalharbi enhancingcybersecuritythroughautonomousknowledgegraphconstructionbyintegratingheterogeneousdatasources AT alihur enhancingcybersecuritythroughautonomousknowledgegraphconstructionbyintegratingheterogeneousdatasources AT hasanalkahtani enhancingcybersecuritythroughautonomousknowledgegraphconstructionbyintegratingheterogeneousdatasources AT hafizfarooqahmad enhancingcybersecuritythroughautonomousknowledgegraphconstructionbyintegratingheterogeneousdatasources |