Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Network attack knowledge inference with graph convolutional networks and convolutional 2D KG embeddings
by
Ren, Weiwu
, Lei, Ying
, Zhang, Hewen
in
639/705/117
/ 639/705/258
/ Artificial intelligence
/ Attack inference
/ Classification
/ Cloud computing
/ Collaboration
/ Cybersecurity
/ Decomposition
/ Exploitation
/ Graph convolutional neural networks
/ Graphs
/ Humanities and Social Sciences
/ Knowledge graph completion
/ Knowledge representation
/ multidisciplinary
/ Neural networks
/ Ontology
/ Privacy
/ Science
/ Science (multidisciplinary)
/ Security knowledge graph
/ Semantics
/ Threats
2025
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Network attack knowledge inference with graph convolutional networks and convolutional 2D KG embeddings
by
Ren, Weiwu
, Lei, Ying
, Zhang, Hewen
in
639/705/117
/ 639/705/258
/ Artificial intelligence
/ Attack inference
/ Classification
/ Cloud computing
/ Collaboration
/ Cybersecurity
/ Decomposition
/ Exploitation
/ Graph convolutional neural networks
/ Graphs
/ Humanities and Social Sciences
/ Knowledge graph completion
/ Knowledge representation
/ multidisciplinary
/ Neural networks
/ Ontology
/ Privacy
/ Science
/ Science (multidisciplinary)
/ Security knowledge graph
/ Semantics
/ Threats
2025
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Network attack knowledge inference with graph convolutional networks and convolutional 2D KG embeddings
by
Ren, Weiwu
, Lei, Ying
, Zhang, Hewen
in
639/705/117
/ 639/705/258
/ Artificial intelligence
/ Attack inference
/ Classification
/ Cloud computing
/ Collaboration
/ Cybersecurity
/ Decomposition
/ Exploitation
/ Graph convolutional neural networks
/ Graphs
/ Humanities and Social Sciences
/ Knowledge graph completion
/ Knowledge representation
/ multidisciplinary
/ Neural networks
/ Ontology
/ Privacy
/ Science
/ Science (multidisciplinary)
/ Security knowledge graph
/ Semantics
/ Threats
2025
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Network attack knowledge inference with graph convolutional networks and convolutional 2D KG embeddings
Journal Article
Network attack knowledge inference with graph convolutional networks and convolutional 2D KG embeddings
2025
Request Book From Autostore
and Choose the Collection Method
Overview
To address the challenge of analyzing large-scale penetration attacks under complex multi-relational and multi-hop paths, this paper proposes a graph convolutional neural network-based attack knowledge inference method, KGConvE, aimed at intelligent reasoning and effective association mining of implicit network attack knowledge. The core idea of this method is to obtain knowledge embeddings related to CVE, CWE, and CAPEC, which are then used to construct attack context feature data and a relation matrix. Subsequently, we employ a graph convolutional neural network model to classify the attacks, and use the KGConvE model to perform attack inference within the same attack category. Through improvements to the graph convolutional neural network model, we significantly enhance the accuracy and generalization capability of the attack classification task. Furthermore, we are the first to apply the KGConvE model to perform attack inference tasks. Experimental results show that this method can infer implicit relationships between CVE-CVE, CVE-CWE, and CVE-CAPEC, achieving a significant performance improvement in network attack knowledge inference tasks, with a mean reciprocal rank (MRR) of 0.68 and Hits@10 of 0.58, outperforming baseline methods.
Publisher
Nature Publishing Group UK,Nature Publishing Group,Nature Portfolio
Subject
This website uses cookies to ensure you get the best experience on our website.