SlideShare una empresa de Scribd logo
1 de 37
Descargar para leer sin conexión
Knowledge Graph for Cybersecurity:
an Introduction
Presented By:
Kabul Kurniawan, S.Kom, M.Cs.
At: As-Salam Leaders Talk (ALT)
Vienna, 02/05/2021
Outline:
• Knowledge Graph
• Cybersecurity
• Knowledge graph for Cybersecurity
• Use Case
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan 2
Why Graph?
http://web.stanford.edu/class/cs224w/ 3
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
Google Knowledge Graph – Things not Strings
https://blog.google/products/search/introducing-knowledge-graph-things-not/
4
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
Google Knowledge Graph – Things not Strings
5
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
Resource Description Framework (RDF)
• Graph-based data model
• Subject-predicate-object triples
• Use of URIs as globally unique identifiers
7
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
RDF-Graph
:Kabul :Guntur
:hasColleague
http//example.org#
Kabul
http//example.org#
Guntur
http://example.org#
hasColleague
8
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
RDF-Graph
:Kabul :Guntur
:hasColleague
• Object of one statement may be the subject of another statement
• The result is a directed labelled (multi-)graph
• The object of a triple is a resource or a literal
9
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
RDF-Graph
:Kabul :Guntur
:UniWien
:studyAt
:hasColleague
• Object of one statement may be the subject of another statement
• The object of a triple is a resource or a literal
• The result is a directed labelled (multi-)graph 10
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
RDF-Graph
:Kabul :Guntur
:UniWien
:hasColleague
:studyAt :studyAt
• Object of one statement may be the subject of another statement
• The object of a triple is a resource or a literal
• The result is a directed labelled (multi-)graph 11
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
RDF-Serialization
@prefix : <http://example.org#>.
:Kabul :hasColleague :Guntur ;
:studyAt :UniWien.
:Guntur :studyAt :UniWien.
RDF (TURTLE)
:Kabul :Guntur
:UniWien
:studyAt :studyAt
:hasColleague
<http://example.org#Kabul> <http://example.org#hasColleague> <http://example.org#Guntur> .
<http://example.org#Kabul> <http://example.org#studyAt> <http://example.org#UniWien> .
<http://example.org#Guntur> <http://example.org#studyAt> <http://example.org#UniWien> .
N-triples
How do we manipulate RDF Graph?
12
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
SPARQL (SPARQL Protocol and RDF Query Language)
Lets us:
• Retrieve and manipulate data stored in RDF
• Explore data by querying unknown relationships
• Perform complex joins of disparate databases in a single, simple query
• Etc.
13
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
SPARQL Query Example
:Kabul :Guntur
:UniWien
SPARQL Query : Who is Kabul’s colleague?
SELECT
?o
WHERE {
:Kabul :hasColleague ?o
}
?o
:Guntur
:studyAt :studyAt
:hasColleague
Result:
14
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
SPARQL Query Example:
SPARQL Query : Where does Kabul study?
SELECT ?o
WHERE {
:Kabul :studyAt ?o
}
?o
:UniWien
Result:
:Kabul :Guntur
:UniWien
:studyAt :studyAt
:hasColleague
15
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
SPARQL Query
:Kabul :Guntur
:UniWien
SPARQL Query : Who study at UniWien?
SELECT ?s
WHERE {
?s :studyAt :UniWien
}
Result:
?s
:Kabul
:Guntur
:studyAt :studyAt
:hasColleague
16
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
Background Linking:
:Kabul :Guntur
:UniWien
:studyAt
:hasColleague
:studyAt
Datasource 1 (Internal) Datasource 2 (External) : DBPedia
dp:University_Of_Vienna
dbo:City
dp:Vienna dp:Austria
dbo:Country
owl:sameAs
Datasourcess can be varied and located at different location
Generate linking between existing graph onto an Internal/External Background Knowledge
How can we retrieve data from different/multiple heterogeneous data sources?
17
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
SPARQL Query Federation
https://www.researchgate.net/profile/Alban-Gaignard/publication/278643329/figure/fig2/AS:669574714359817@1536650460549/A-sample-federated-data-integration-setup-in-which-
result-data-is-dynamically-retrieved.png
• Federated Query extension for executing queries
distributed over different SPARQL endpoints
• The SERVICE keyword extends SPARQL 1.1 to
support queries that merge data distributed across the
Web.
18
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
SPARQL Query Federation : Example
Query : In which city do Kabul and Guntur study?
SELECT ?s ?city
WHERE {
?s :studyAt ?o.
SERVICE <http://dbpedia.org/sparql> {
?o owl:sameAs ?org.
?org dbo:City ?city. }
}
Results:
?s ?city
:Kabul dp:Vienna
:Guntur dp:Vienna
:Kabul :Guntur
:UniWien
:studyAt
:hasColleague
:studyAt
Datasource 1 (Internal) Datasource 2 (External)
dp:University_Of_Vienna
dbo:City
dp:Vienna dp:Austria
dbo:Country
owl:sameAs
19
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
Datasource 2 (External) DBPedia
Query : Construct triple indicating city where
Kabul and Guntur works !?
CONSTRUCT ?s :liveIn ?city.
WHERE {
?s :studyAt ?o.
SERVICE <http://dbpedia.org/sparql> {
?o owl:sameAs ?org.
?org dbo:City ?city. }
}
:Kabul :Guntur
:UniWien
dp:University_Of_Vienna
dp:Vienna
dp:Austria
dbo:City
dbo:Country
:liveIn
:studyAt
:hasColleague
:studyAt
Datasource 1
owl:sameAs
subj predicate object
:Kabul :liveIn dp:Vienna
:Guntur :liveIn dp:Vienna
Result:
CONSTRUCT Query
Generating new Triples from Existing one
Based on a certain patterns
20
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
Linked Open Data
https://lod-cloud.net/`
21
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
Cybersecurity & Information Security
Cyber security is the practice of defending
computers, servers, mobile devices, electronic
systems, networks, and data from malicious attacks
[1].
Information Security : The practice of preventing
unauthorized access, use, disclosure, disruption,
modification, inspection, recording or destruction of
information [2].
[1] https://www.kaspersky.com/resource-center/definitions/what-is-cyber-security
[2] https://www.geeksforgeeks.org/what-is-information-security 22
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
Cybersecurity Risks
Serious Impact:
 Business process
disruptions,
 Sensitive data thefts,
 Privacy loss,
 Decreased
trustworthiness,
 Reputational damages,
 etc.
https://www.linkedin.com/pulse/data-exfiltration-do-you-know-where-your-antonio-
fernandes/
23
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
ATT&CK Matrix for Enterprise
https://attack.mitre.org/ 24
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
ATT & CK Model
MITRE ATT&CK: Design and Philosophy 25
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
ATT & CK Model : Example
MITRE ATT&CK: Design and Philosophy 26
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
Related Cybersecurity Information/Tool
CTI (Cyber-threat Intelligence)
ICT Asset information
Log Data/Traces
SIEM/Tools/AV
Analyst
integration
contextualization ?
Interpretation ?
27
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
Log Data
28
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
Cyber-threat Information
29
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
Semantic Log Analysis (Architecture)
Kurniawan K., Ekelhart A., Ekaputra F., Kiesling E. (2020) Cross-Platform File System Activity Monitoring and Forensics – A Semantic Approach. In: Hölbl M., Rannenberg K.,
Welzer T. (eds) ICT Systems Security and Privacy Protection. SEC 2020. IFIP Advances in Information and Communication Technology, vol 580. Springer, Cham.
https://doi.org/10.1007/978-3-030-58201-2_26
30
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
Log Extraction & KG Construction
{
"timestamp":"2018−04−09T07:37:47.000Z",
“message”:”Mounted Huge Pages File System”,
"program":"systemd“,
"host":"kabul−VirtualBox“,
"pid":"1“,
….
}
Extracted Log Data
Raw Log
Data
Extracted
Log data
(example) Raw Log Data
Apr 9 09:37:47 kabul-VirtualBox systemd[1]: Mounted Huge Pages File System.
Other Technique(s) :
(Unstructured Log)
- Named Entity Recognition
- Entity Resolution
31
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
Background Linking
32
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
Use Case: Log analysis and Exploration
33
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
Use Case: File Access History
Query Evaluation:
Result:
Visualization
FileServer (Linux) Workstation (Windows)
34
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
Use Case:
Stream Detection
Query Evaluation:
Result:
Analyst
Cybersecurity
Knowledge-Base
Internal
Background
Knowledge
35
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
Summary
• Knowledge Graph provides flexible graph representation, integration,
contextualization and linking.
• SPARQL can be used to manipulate RDF Graph, perform query
federation and semantic integration.
• Cybersecurity information are complex, heterogeneous, dispersed
resources.
• Knowledge Graph can be potentially used to address cybersecurity
challenges (e.g. resource integration, log analysis, monitoring etc.)
36
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
Related Topic…
• Distributed Analysis (Decentralization)
• Scalable (Stream) Log Analysis
• Attack Graph Discovery and Construction
• Anomaly detection (combination with machine learning)
• Etc.
37
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
Thank you:
Twitter: @kabulkurniawan
Web: kabulkurniawan.github.io
Email: kabulkurniawan@gmail.com
38
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan

Más contenido relacionado

La actualidad más candente

Kubernetes Operators And The Redis Enterprise Journey: Michal Rabinowitch
Kubernetes Operators And The Redis Enterprise Journey: Michal RabinowitchKubernetes Operators And The Redis Enterprise Journey: Michal Rabinowitch
Kubernetes Operators And The Redis Enterprise Journey: Michal RabinowitchRedis Labs
 
The Kubernetes Operator Pattern - ContainerConf Nov 2017
The Kubernetes Operator Pattern - ContainerConf Nov 2017The Kubernetes Operator Pattern - ContainerConf Nov 2017
The Kubernetes Operator Pattern - ContainerConf Nov 2017Jakob Karalus
 
HBase Application Performance Improvement
HBase Application Performance ImprovementHBase Application Performance Improvement
HBase Application Performance ImprovementBiju Nair
 
Kubernetes internals (Kubernetes 해부하기)
Kubernetes internals (Kubernetes 해부하기)Kubernetes internals (Kubernetes 해부하기)
Kubernetes internals (Kubernetes 해부하기)DongHyeon Kim
 
Introduction to Docker Compose
Introduction to Docker ComposeIntroduction to Docker Compose
Introduction to Docker ComposeAjeet Singh Raina
 
Kubernetes in Docker
Kubernetes in DockerKubernetes in Docker
Kubernetes in DockerDocker, Inc.
 
Knowledge graphs + Chatbots with Neo4j
Knowledge graphs + Chatbots with Neo4jKnowledge graphs + Chatbots with Neo4j
Knowledge graphs + Chatbots with Neo4jChristophe Willemsen
 
Avro Tutorial - Records with Schema for Kafka and Hadoop
Avro Tutorial - Records with Schema for Kafka and HadoopAvro Tutorial - Records with Schema for Kafka and Hadoop
Avro Tutorial - Records with Schema for Kafka and HadoopJean-Paul Azar
 
Big Data Redis Mongodb Dynamodb Sharding
Big Data Redis Mongodb Dynamodb ShardingBig Data Redis Mongodb Dynamodb Sharding
Big Data Redis Mongodb Dynamodb ShardingAraf Karsh Hamid
 
DB Monitoring 개념 및 활용 (박명규)
DB Monitoring 개념 및 활용 (박명규)DB Monitoring 개념 및 활용 (박명규)
DB Monitoring 개념 및 활용 (박명규)WhaTap Labs
 
Introduction to Kubernetes Security
Introduction to Kubernetes SecurityIntroduction to Kubernetes Security
Introduction to Kubernetes SecurityAll Things Open
 
Architecture patterns for distributed, hybrid, edge and global Apache Kafka d...
Architecture patterns for distributed, hybrid, edge and global Apache Kafka d...Architecture patterns for distributed, hybrid, edge and global Apache Kafka d...
Architecture patterns for distributed, hybrid, edge and global Apache Kafka d...Kai Wähner
 
Large Scale Graph Analytics with JanusGraph
Large Scale Graph Analytics with JanusGraphLarge Scale Graph Analytics with JanusGraph
Large Scale Graph Analytics with JanusGraphDataWorks Summit
 
MongoDB WiredTiger Internals
MongoDB WiredTiger InternalsMongoDB WiredTiger Internals
MongoDB WiredTiger InternalsNorberto Leite
 
Introduction and Deep Dive Into Containerd
Introduction and Deep Dive Into ContainerdIntroduction and Deep Dive Into Containerd
Introduction and Deep Dive Into ContainerdKohei Tokunaga
 
Kubernetes Observability with Prometheus by Example
Kubernetes Observability with Prometheus by ExampleKubernetes Observability with Prometheus by Example
Kubernetes Observability with Prometheus by ExampleThomas Riley
 
Accelerating Local Search with PostgreSQL (KNN-Search)
Accelerating Local Search with PostgreSQL (KNN-Search)Accelerating Local Search with PostgreSQL (KNN-Search)
Accelerating Local Search with PostgreSQL (KNN-Search)Jonathan Katz
 

La actualidad más candente (20)

Infrastructure as Code (IaC)
Infrastructure as Code (IaC)Infrastructure as Code (IaC)
Infrastructure as Code (IaC)
 
Kubernetes Operators And The Redis Enterprise Journey: Michal Rabinowitch
Kubernetes Operators And The Redis Enterprise Journey: Michal RabinowitchKubernetes Operators And The Redis Enterprise Journey: Michal Rabinowitch
Kubernetes Operators And The Redis Enterprise Journey: Michal Rabinowitch
 
The Kubernetes Operator Pattern - ContainerConf Nov 2017
The Kubernetes Operator Pattern - ContainerConf Nov 2017The Kubernetes Operator Pattern - ContainerConf Nov 2017
The Kubernetes Operator Pattern - ContainerConf Nov 2017
 
HBase Application Performance Improvement
HBase Application Performance ImprovementHBase Application Performance Improvement
HBase Application Performance Improvement
 
Kubernetes internals (Kubernetes 해부하기)
Kubernetes internals (Kubernetes 해부하기)Kubernetes internals (Kubernetes 해부하기)
Kubernetes internals (Kubernetes 해부하기)
 
Introduction to Docker Compose
Introduction to Docker ComposeIntroduction to Docker Compose
Introduction to Docker Compose
 
Apache hive
Apache hiveApache hive
Apache hive
 
Kubernetes in Docker
Kubernetes in DockerKubernetes in Docker
Kubernetes in Docker
 
Knowledge graphs + Chatbots with Neo4j
Knowledge graphs + Chatbots with Neo4jKnowledge graphs + Chatbots with Neo4j
Knowledge graphs + Chatbots with Neo4j
 
Avro Tutorial - Records with Schema for Kafka and Hadoop
Avro Tutorial - Records with Schema for Kafka and HadoopAvro Tutorial - Records with Schema for Kafka and Hadoop
Avro Tutorial - Records with Schema for Kafka and Hadoop
 
Big Data Redis Mongodb Dynamodb Sharding
Big Data Redis Mongodb Dynamodb ShardingBig Data Redis Mongodb Dynamodb Sharding
Big Data Redis Mongodb Dynamodb Sharding
 
DB Monitoring 개념 및 활용 (박명규)
DB Monitoring 개념 및 활용 (박명규)DB Monitoring 개념 및 활용 (박명규)
DB Monitoring 개념 및 활용 (박명규)
 
Introduction to Kubernetes Security
Introduction to Kubernetes SecurityIntroduction to Kubernetes Security
Introduction to Kubernetes Security
 
Architecture patterns for distributed, hybrid, edge and global Apache Kafka d...
Architecture patterns for distributed, hybrid, edge and global Apache Kafka d...Architecture patterns for distributed, hybrid, edge and global Apache Kafka d...
Architecture patterns for distributed, hybrid, edge and global Apache Kafka d...
 
Large Scale Graph Analytics with JanusGraph
Large Scale Graph Analytics with JanusGraphLarge Scale Graph Analytics with JanusGraph
Large Scale Graph Analytics with JanusGraph
 
MongoDB WiredTiger Internals
MongoDB WiredTiger InternalsMongoDB WiredTiger Internals
MongoDB WiredTiger Internals
 
Introduction and Deep Dive Into Containerd
Introduction and Deep Dive Into ContainerdIntroduction and Deep Dive Into Containerd
Introduction and Deep Dive Into Containerd
 
Kubernetes Observability with Prometheus by Example
Kubernetes Observability with Prometheus by ExampleKubernetes Observability with Prometheus by Example
Kubernetes Observability with Prometheus by Example
 
Accelerating Local Search with PostgreSQL (KNN-Search)
Accelerating Local Search with PostgreSQL (KNN-Search)Accelerating Local Search with PostgreSQL (KNN-Search)
Accelerating Local Search with PostgreSQL (KNN-Search)
 
Mongo DB
Mongo DB Mongo DB
Mongo DB
 

Similar a Knowledge Graph for Cybersecurity: An Introduction By Kabul Kurniawan

Information Technology in Industry(ITII) - November Issue 2018
Information Technology in Industry(ITII) - November Issue 2018Information Technology in Industry(ITII) - November Issue 2018
Information Technology in Industry(ITII) - November Issue 2018ITIIIndustries
 
Knowledge graph construction with a façade - The SPARQL Anything Project
Knowledge graph construction with a façade - The SPARQL Anything ProjectKnowledge graph construction with a façade - The SPARQL Anything Project
Knowledge graph construction with a façade - The SPARQL Anything ProjectEnrico Daga
 
Knowledge graphs for knowing more and knowing for sure
Knowledge graphs for knowing more and knowing for sureKnowledge graphs for knowing more and knowing for sure
Knowledge graphs for knowing more and knowing for sureSteffen Staab
 
The Role of Machine Learning in Fluid Network Control and Data Planes.pdf
The Role of Machine Learning in Fluid Network Control and Data Planes.pdfThe Role of Machine Learning in Fluid Network Control and Data Planes.pdf
The Role of Machine Learning in Fluid Network Control and Data Planes.pdfFörderverein Technische Fakultät
 
CSE NEW_4th yr w.e.f. 2018-19.pdf
CSE NEW_4th yr w.e.f. 2018-19.pdfCSE NEW_4th yr w.e.f. 2018-19.pdf
CSE NEW_4th yr w.e.f. 2018-19.pdfssuser5a7261
 
Data integration with a façade. The case of knowledge graph construction.
Data integration with a façade. The case of knowledge graph construction.Data integration with a façade. The case of knowledge graph construction.
Data integration with a façade. The case of knowledge graph construction.Enrico Daga
 
Calit2-a Persistent UCSD/UCI Framework for Collaboration
Calit2-a Persistent UCSD/UCI Framework for CollaborationCalit2-a Persistent UCSD/UCI Framework for Collaboration
Calit2-a Persistent UCSD/UCI Framework for CollaborationLarry Smarr
 
A modified k means algorithm for big data clustering
A modified k means algorithm for big data clusteringA modified k means algorithm for big data clustering
A modified k means algorithm for big data clusteringSK Ahammad Fahad
 
Enabling Secure Data Discoverability (SC21 Tutorial)
Enabling Secure Data Discoverability (SC21 Tutorial)Enabling Secure Data Discoverability (SC21 Tutorial)
Enabling Secure Data Discoverability (SC21 Tutorial)Globus
 
Indexing data on the web a comparison of schema level indices for data search
Indexing data on the web a comparison of schema level indices for data searchIndexing data on the web a comparison of schema level indices for data search
Indexing data on the web a comparison of schema level indices for data searchTill Blume
 
Computing Outside The Box June 2009
Computing Outside The Box June 2009Computing Outside The Box June 2009
Computing Outside The Box June 2009Ian Foster
 
Serving Ireland's Geospatial Information as Linked Data
Serving Ireland's Geospatial Information as Linked DataServing Ireland's Geospatial Information as Linked Data
Serving Ireland's Geospatial Information as Linked DataChristophe Debruyne
 
Spark-MPI: Approaching the Fifth Paradigm with Nikolay Malitsky
Spark-MPI: Approaching the Fifth Paradigm with Nikolay MalitskySpark-MPI: Approaching the Fifth Paradigm with Nikolay Malitsky
Spark-MPI: Approaching the Fifth Paradigm with Nikolay MalitskyDatabricks
 
Grid Projects In The US July 2008
Grid Projects In The US July 2008Grid Projects In The US July 2008
Grid Projects In The US July 2008Ian Foster
 
Considerations for Abstracting Complexities of a Real-Time ML Platform, Zhenz...
Considerations for Abstracting Complexities of a Real-Time ML Platform, Zhenz...Considerations for Abstracting Complexities of a Real-Time ML Platform, Zhenz...
Considerations for Abstracting Complexities of a Real-Time ML Platform, Zhenz...HostedbyConfluent
 
FAIR Workflows: A step closer to the Scientific Paper of the Future
FAIR Workflows: A step closer to the Scientific Paper of the FutureFAIR Workflows: A step closer to the Scientific Paper of the Future
FAIR Workflows: A step closer to the Scientific Paper of the Futuredgarijo
 
Facilitating Data Curation: a Solution Developed in the Toxicology Domain
Facilitating Data Curation: a Solution Developed in the Toxicology DomainFacilitating Data Curation: a Solution Developed in the Toxicology Domain
Facilitating Data Curation: a Solution Developed in the Toxicology DomainChristophe Debruyne
 
Early Analysis and Debuggin of Linked Open Data Cubes
Early Analysis and Debuggin of Linked Open Data CubesEarly Analysis and Debuggin of Linked Open Data Cubes
Early Analysis and Debuggin of Linked Open Data CubesEnrico Daga
 

Similar a Knowledge Graph for Cybersecurity: An Introduction By Kabul Kurniawan (20)

Netsoft19 Keynote: Fluid Network Planes
Netsoft19 Keynote: Fluid Network PlanesNetsoft19 Keynote: Fluid Network Planes
Netsoft19 Keynote: Fluid Network Planes
 
Information Technology in Industry(ITII) - November Issue 2018
Information Technology in Industry(ITII) - November Issue 2018Information Technology in Industry(ITII) - November Issue 2018
Information Technology in Industry(ITII) - November Issue 2018
 
Knowledge graph construction with a façade - The SPARQL Anything Project
Knowledge graph construction with a façade - The SPARQL Anything ProjectKnowledge graph construction with a façade - The SPARQL Anything Project
Knowledge graph construction with a façade - The SPARQL Anything Project
 
Knowledge graphs for knowing more and knowing for sure
Knowledge graphs for knowing more and knowing for sureKnowledge graphs for knowing more and knowing for sure
Knowledge graphs for knowing more and knowing for sure
 
dishank CV
dishank CVdishank CV
dishank CV
 
The Role of Machine Learning in Fluid Network Control and Data Planes.pdf
The Role of Machine Learning in Fluid Network Control and Data Planes.pdfThe Role of Machine Learning in Fluid Network Control and Data Planes.pdf
The Role of Machine Learning in Fluid Network Control and Data Planes.pdf
 
CSE NEW_4th yr w.e.f. 2018-19.pdf
CSE NEW_4th yr w.e.f. 2018-19.pdfCSE NEW_4th yr w.e.f. 2018-19.pdf
CSE NEW_4th yr w.e.f. 2018-19.pdf
 
Data integration with a façade. The case of knowledge graph construction.
Data integration with a façade. The case of knowledge graph construction.Data integration with a façade. The case of knowledge graph construction.
Data integration with a façade. The case of knowledge graph construction.
 
Calit2-a Persistent UCSD/UCI Framework for Collaboration
Calit2-a Persistent UCSD/UCI Framework for CollaborationCalit2-a Persistent UCSD/UCI Framework for Collaboration
Calit2-a Persistent UCSD/UCI Framework for Collaboration
 
A modified k means algorithm for big data clustering
A modified k means algorithm for big data clusteringA modified k means algorithm for big data clustering
A modified k means algorithm for big data clustering
 
Enabling Secure Data Discoverability (SC21 Tutorial)
Enabling Secure Data Discoverability (SC21 Tutorial)Enabling Secure Data Discoverability (SC21 Tutorial)
Enabling Secure Data Discoverability (SC21 Tutorial)
 
Indexing data on the web a comparison of schema level indices for data search
Indexing data on the web a comparison of schema level indices for data searchIndexing data on the web a comparison of schema level indices for data search
Indexing data on the web a comparison of schema level indices for data search
 
Computing Outside The Box June 2009
Computing Outside The Box June 2009Computing Outside The Box June 2009
Computing Outside The Box June 2009
 
Serving Ireland's Geospatial Information as Linked Data
Serving Ireland's Geospatial Information as Linked DataServing Ireland's Geospatial Information as Linked Data
Serving Ireland's Geospatial Information as Linked Data
 
Spark-MPI: Approaching the Fifth Paradigm with Nikolay Malitsky
Spark-MPI: Approaching the Fifth Paradigm with Nikolay MalitskySpark-MPI: Approaching the Fifth Paradigm with Nikolay Malitsky
Spark-MPI: Approaching the Fifth Paradigm with Nikolay Malitsky
 
Grid Projects In The US July 2008
Grid Projects In The US July 2008Grid Projects In The US July 2008
Grid Projects In The US July 2008
 
Considerations for Abstracting Complexities of a Real-Time ML Platform, Zhenz...
Considerations for Abstracting Complexities of a Real-Time ML Platform, Zhenz...Considerations for Abstracting Complexities of a Real-Time ML Platform, Zhenz...
Considerations for Abstracting Complexities of a Real-Time ML Platform, Zhenz...
 
FAIR Workflows: A step closer to the Scientific Paper of the Future
FAIR Workflows: A step closer to the Scientific Paper of the FutureFAIR Workflows: A step closer to the Scientific Paper of the Future
FAIR Workflows: A step closer to the Scientific Paper of the Future
 
Facilitating Data Curation: a Solution Developed in the Toxicology Domain
Facilitating Data Curation: a Solution Developed in the Toxicology DomainFacilitating Data Curation: a Solution Developed in the Toxicology Domain
Facilitating Data Curation: a Solution Developed in the Toxicology Domain
 
Early Analysis and Debuggin of Linked Open Data Cubes
Early Analysis and Debuggin of Linked Open Data CubesEarly Analysis and Debuggin of Linked Open Data Cubes
Early Analysis and Debuggin of Linked Open Data Cubes
 

Último

Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...Boston Institute of Analytics
 
Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...Seán Kennedy
 
Heart Disease Classification Report: A Data Analysis Project
Heart Disease Classification Report: A Data Analysis ProjectHeart Disease Classification Report: A Data Analysis Project
Heart Disease Classification Report: A Data Analysis ProjectBoston Institute of Analytics
 
MK KOMUNIKASI DATA (TI)komdat komdat.docx
MK KOMUNIKASI DATA (TI)komdat komdat.docxMK KOMUNIKASI DATA (TI)komdat komdat.docx
MK KOMUNIKASI DATA (TI)komdat komdat.docxUnduhUnggah1
 
Thiophen Mechanism khhjjjjjjjhhhhhhhhhhh
Thiophen Mechanism khhjjjjjjjhhhhhhhhhhhThiophen Mechanism khhjjjjjjjhhhhhhhhhhh
Thiophen Mechanism khhjjjjjjjhhhhhhhhhhhYasamin16
 
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一F La
 
办理学位证加利福尼亚大学洛杉矶分校毕业证,UCLA成绩单原版一比一
办理学位证加利福尼亚大学洛杉矶分校毕业证,UCLA成绩单原版一比一办理学位证加利福尼亚大学洛杉矶分校毕业证,UCLA成绩单原版一比一
办理学位证加利福尼亚大学洛杉矶分校毕业证,UCLA成绩单原版一比一F sss
 
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...Boston Institute of Analytics
 
Advanced Machine Learning for Business Professionals
Advanced Machine Learning for Business ProfessionalsAdvanced Machine Learning for Business Professionals
Advanced Machine Learning for Business ProfessionalsVICTOR MAESTRE RAMIREZ
 
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一F sss
 
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...Boston Institute of Analytics
 
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024thyngster
 
Learn How Data Science Changes Our World
Learn How Data Science Changes Our WorldLearn How Data Science Changes Our World
Learn How Data Science Changes Our WorldEduminds Learning
 
办理(UWIC毕业证书)英国卡迪夫城市大学毕业证成绩单原版一比一
办理(UWIC毕业证书)英国卡迪夫城市大学毕业证成绩单原版一比一办理(UWIC毕业证书)英国卡迪夫城市大学毕业证成绩单原版一比一
办理(UWIC毕业证书)英国卡迪夫城市大学毕业证成绩单原版一比一F La
 
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degreeyuu sss
 
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort servicejennyeacort
 
IMA MSN - Medical Students Network (2).pptx
IMA MSN - Medical Students Network (2).pptxIMA MSN - Medical Students Network (2).pptx
IMA MSN - Medical Students Network (2).pptxdolaknnilon
 
Conf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
Conf42-LLM_Adding Generative AI to Real-Time Streaming PipelinesConf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
Conf42-LLM_Adding Generative AI to Real-Time Streaming PipelinesTimothy Spann
 
Real-Time AI Streaming - AI Max Princeton
Real-Time AI  Streaming - AI Max PrincetonReal-Time AI  Streaming - AI Max Princeton
Real-Time AI Streaming - AI Max PrincetonTimothy Spann
 
LLMs, LMMs, their Improvement Suggestions and the Path towards AGI
LLMs, LMMs, their Improvement Suggestions and the Path towards AGILLMs, LMMs, their Improvement Suggestions and the Path towards AGI
LLMs, LMMs, their Improvement Suggestions and the Path towards AGIThomas Poetter
 

Último (20)

Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
 
Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...
 
Heart Disease Classification Report: A Data Analysis Project
Heart Disease Classification Report: A Data Analysis ProjectHeart Disease Classification Report: A Data Analysis Project
Heart Disease Classification Report: A Data Analysis Project
 
MK KOMUNIKASI DATA (TI)komdat komdat.docx
MK KOMUNIKASI DATA (TI)komdat komdat.docxMK KOMUNIKASI DATA (TI)komdat komdat.docx
MK KOMUNIKASI DATA (TI)komdat komdat.docx
 
Thiophen Mechanism khhjjjjjjjhhhhhhhhhhh
Thiophen Mechanism khhjjjjjjjhhhhhhhhhhhThiophen Mechanism khhjjjjjjjhhhhhhhhhhh
Thiophen Mechanism khhjjjjjjjhhhhhhhhhhh
 
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
 
办理学位证加利福尼亚大学洛杉矶分校毕业证,UCLA成绩单原版一比一
办理学位证加利福尼亚大学洛杉矶分校毕业证,UCLA成绩单原版一比一办理学位证加利福尼亚大学洛杉矶分校毕业证,UCLA成绩单原版一比一
办理学位证加利福尼亚大学洛杉矶分校毕业证,UCLA成绩单原版一比一
 
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
 
Advanced Machine Learning for Business Professionals
Advanced Machine Learning for Business ProfessionalsAdvanced Machine Learning for Business Professionals
Advanced Machine Learning for Business Professionals
 
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
 
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
 
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
 
Learn How Data Science Changes Our World
Learn How Data Science Changes Our WorldLearn How Data Science Changes Our World
Learn How Data Science Changes Our World
 
办理(UWIC毕业证书)英国卡迪夫城市大学毕业证成绩单原版一比一
办理(UWIC毕业证书)英国卡迪夫城市大学毕业证成绩单原版一比一办理(UWIC毕业证书)英国卡迪夫城市大学毕业证成绩单原版一比一
办理(UWIC毕业证书)英国卡迪夫城市大学毕业证成绩单原版一比一
 
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
 
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
 
IMA MSN - Medical Students Network (2).pptx
IMA MSN - Medical Students Network (2).pptxIMA MSN - Medical Students Network (2).pptx
IMA MSN - Medical Students Network (2).pptx
 
Conf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
Conf42-LLM_Adding Generative AI to Real-Time Streaming PipelinesConf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
Conf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
 
Real-Time AI Streaming - AI Max Princeton
Real-Time AI  Streaming - AI Max PrincetonReal-Time AI  Streaming - AI Max Princeton
Real-Time AI Streaming - AI Max Princeton
 
LLMs, LMMs, their Improvement Suggestions and the Path towards AGI
LLMs, LMMs, their Improvement Suggestions and the Path towards AGILLMs, LMMs, their Improvement Suggestions and the Path towards AGI
LLMs, LMMs, their Improvement Suggestions and the Path towards AGI
 

Knowledge Graph for Cybersecurity: An Introduction By Kabul Kurniawan

  • 1. Knowledge Graph for Cybersecurity: an Introduction Presented By: Kabul Kurniawan, S.Kom, M.Cs. At: As-Salam Leaders Talk (ALT) Vienna, 02/05/2021
  • 2. Outline: • Knowledge Graph • Cybersecurity • Knowledge graph for Cybersecurity • Use Case Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan 2
  • 3. Why Graph? http://web.stanford.edu/class/cs224w/ 3 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 4. Google Knowledge Graph – Things not Strings https://blog.google/products/search/introducing-knowledge-graph-things-not/ 4 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 5. Google Knowledge Graph – Things not Strings 5 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 6. Resource Description Framework (RDF) • Graph-based data model • Subject-predicate-object triples • Use of URIs as globally unique identifiers 7 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 8. RDF-Graph :Kabul :Guntur :hasColleague • Object of one statement may be the subject of another statement • The result is a directed labelled (multi-)graph • The object of a triple is a resource or a literal 9 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 9. RDF-Graph :Kabul :Guntur :UniWien :studyAt :hasColleague • Object of one statement may be the subject of another statement • The object of a triple is a resource or a literal • The result is a directed labelled (multi-)graph 10 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 10. RDF-Graph :Kabul :Guntur :UniWien :hasColleague :studyAt :studyAt • Object of one statement may be the subject of another statement • The object of a triple is a resource or a literal • The result is a directed labelled (multi-)graph 11 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 11. RDF-Serialization @prefix : <http://example.org#>. :Kabul :hasColleague :Guntur ; :studyAt :UniWien. :Guntur :studyAt :UniWien. RDF (TURTLE) :Kabul :Guntur :UniWien :studyAt :studyAt :hasColleague <http://example.org#Kabul> <http://example.org#hasColleague> <http://example.org#Guntur> . <http://example.org#Kabul> <http://example.org#studyAt> <http://example.org#UniWien> . <http://example.org#Guntur> <http://example.org#studyAt> <http://example.org#UniWien> . N-triples How do we manipulate RDF Graph? 12 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 12. SPARQL (SPARQL Protocol and RDF Query Language) Lets us: • Retrieve and manipulate data stored in RDF • Explore data by querying unknown relationships • Perform complex joins of disparate databases in a single, simple query • Etc. 13 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 13. SPARQL Query Example :Kabul :Guntur :UniWien SPARQL Query : Who is Kabul’s colleague? SELECT ?o WHERE { :Kabul :hasColleague ?o } ?o :Guntur :studyAt :studyAt :hasColleague Result: 14 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 14. SPARQL Query Example: SPARQL Query : Where does Kabul study? SELECT ?o WHERE { :Kabul :studyAt ?o } ?o :UniWien Result: :Kabul :Guntur :UniWien :studyAt :studyAt :hasColleague 15 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 15. SPARQL Query :Kabul :Guntur :UniWien SPARQL Query : Who study at UniWien? SELECT ?s WHERE { ?s :studyAt :UniWien } Result: ?s :Kabul :Guntur :studyAt :studyAt :hasColleague 16 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 16. Background Linking: :Kabul :Guntur :UniWien :studyAt :hasColleague :studyAt Datasource 1 (Internal) Datasource 2 (External) : DBPedia dp:University_Of_Vienna dbo:City dp:Vienna dp:Austria dbo:Country owl:sameAs Datasourcess can be varied and located at different location Generate linking between existing graph onto an Internal/External Background Knowledge How can we retrieve data from different/multiple heterogeneous data sources? 17 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 17. SPARQL Query Federation https://www.researchgate.net/profile/Alban-Gaignard/publication/278643329/figure/fig2/AS:669574714359817@1536650460549/A-sample-federated-data-integration-setup-in-which- result-data-is-dynamically-retrieved.png • Federated Query extension for executing queries distributed over different SPARQL endpoints • The SERVICE keyword extends SPARQL 1.1 to support queries that merge data distributed across the Web. 18 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 18. SPARQL Query Federation : Example Query : In which city do Kabul and Guntur study? SELECT ?s ?city WHERE { ?s :studyAt ?o. SERVICE <http://dbpedia.org/sparql> { ?o owl:sameAs ?org. ?org dbo:City ?city. } } Results: ?s ?city :Kabul dp:Vienna :Guntur dp:Vienna :Kabul :Guntur :UniWien :studyAt :hasColleague :studyAt Datasource 1 (Internal) Datasource 2 (External) dp:University_Of_Vienna dbo:City dp:Vienna dp:Austria dbo:Country owl:sameAs 19 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 19. Datasource 2 (External) DBPedia Query : Construct triple indicating city where Kabul and Guntur works !? CONSTRUCT ?s :liveIn ?city. WHERE { ?s :studyAt ?o. SERVICE <http://dbpedia.org/sparql> { ?o owl:sameAs ?org. ?org dbo:City ?city. } } :Kabul :Guntur :UniWien dp:University_Of_Vienna dp:Vienna dp:Austria dbo:City dbo:Country :liveIn :studyAt :hasColleague :studyAt Datasource 1 owl:sameAs subj predicate object :Kabul :liveIn dp:Vienna :Guntur :liveIn dp:Vienna Result: CONSTRUCT Query Generating new Triples from Existing one Based on a certain patterns 20 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 20. Linked Open Data https://lod-cloud.net/` 21 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 21. Cybersecurity & Information Security Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks [1]. Information Security : The practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information [2]. [1] https://www.kaspersky.com/resource-center/definitions/what-is-cyber-security [2] https://www.geeksforgeeks.org/what-is-information-security 22 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 22. Cybersecurity Risks Serious Impact:  Business process disruptions,  Sensitive data thefts,  Privacy loss,  Decreased trustworthiness,  Reputational damages,  etc. https://www.linkedin.com/pulse/data-exfiltration-do-you-know-where-your-antonio- fernandes/ 23 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 23. ATT&CK Matrix for Enterprise https://attack.mitre.org/ 24 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 24. ATT & CK Model MITRE ATT&CK: Design and Philosophy 25 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 25. ATT & CK Model : Example MITRE ATT&CK: Design and Philosophy 26 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 26. Related Cybersecurity Information/Tool CTI (Cyber-threat Intelligence) ICT Asset information Log Data/Traces SIEM/Tools/AV Analyst integration contextualization ? Interpretation ? 27 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 27. Log Data 28 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 28. Cyber-threat Information 29 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 29. Semantic Log Analysis (Architecture) Kurniawan K., Ekelhart A., Ekaputra F., Kiesling E. (2020) Cross-Platform File System Activity Monitoring and Forensics – A Semantic Approach. In: Hölbl M., Rannenberg K., Welzer T. (eds) ICT Systems Security and Privacy Protection. SEC 2020. IFIP Advances in Information and Communication Technology, vol 580. Springer, Cham. https://doi.org/10.1007/978-3-030-58201-2_26 30 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 30. Log Extraction & KG Construction { "timestamp":"2018−04−09T07:37:47.000Z", “message”:”Mounted Huge Pages File System”, "program":"systemd“, "host":"kabul−VirtualBox“, "pid":"1“, …. } Extracted Log Data Raw Log Data Extracted Log data (example) Raw Log Data Apr 9 09:37:47 kabul-VirtualBox systemd[1]: Mounted Huge Pages File System. Other Technique(s) : (Unstructured Log) - Named Entity Recognition - Entity Resolution 31 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 31. Background Linking 32 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 32. Use Case: Log analysis and Exploration 33 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 33. Use Case: File Access History Query Evaluation: Result: Visualization FileServer (Linux) Workstation (Windows) 34 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 34. Use Case: Stream Detection Query Evaluation: Result: Analyst Cybersecurity Knowledge-Base Internal Background Knowledge 35 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 35. Summary • Knowledge Graph provides flexible graph representation, integration, contextualization and linking. • SPARQL can be used to manipulate RDF Graph, perform query federation and semantic integration. • Cybersecurity information are complex, heterogeneous, dispersed resources. • Knowledge Graph can be potentially used to address cybersecurity challenges (e.g. resource integration, log analysis, monitoring etc.) 36 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 36. Related Topic… • Distributed Analysis (Decentralization) • Scalable (Stream) Log Analysis • Attack Graph Discovery and Construction • Anomaly detection (combination with machine learning) • Etc. 37 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 37. Thank you: Twitter: @kabulkurniawan Web: kabulkurniawan.github.io Email: kabulkurniawan@gmail.com 38 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan