Exploring foci of:
2021 IEEE International Conference on Big Data (Big Data)
Combating Fake Cyber Threat Intelligence using Provenance in Cybersecurity Knowledge Graphs
December 2021 • Shaswata Mitra, Aritran Piplai, Sudip Mittal, Anupam Joshi
Today there is a significant amount of fake cybersecurity related intelligence on the internet. To filter out such information, we build a system to capture the provenance information and represent it along with the captured Cyber Threat Intelligence (CTI). In the cybersecurity domain, such CTI is stored in Cybersecurity Knowledge Graphs (CKG). We enhance the exiting CKG model to incorporate intelligence provenance and fuse provenance graphs with CKG. This process includes modifying traditional approaches to entit…
Cyberspace
Computer Science
Internet
Computer Security
Process (Computing)
Data Mining