SlideShare una empresa de Scribd logo
1 de 37
Descargar para leer sin conexión
Knowledge Graph for Cybersecurity:
an Introduction
Presented By:
Kabul Kurniawan, S.Kom, M.Cs.
At: As-Salam Leaders Talk (ALT)
Vienna, 02/05/2021
Outline:
• Knowledge Graph
• Cybersecurity
• Knowledge graph for Cybersecurity
• Use Case
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan 2
Why Graph?
http://web.stanford.edu/class/cs224w/ 3
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
Google Knowledge Graph – Things not Strings
https://blog.google/products/search/introducing-knowledge-graph-things-not/
4
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
Google Knowledge Graph – Things not Strings
5
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
Resource Description Framework (RDF)
• Graph-based data model
• Subject-predicate-object triples
• Use of URIs as globally unique identifiers
7
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
RDF-Graph
:Kabul :Guntur
:hasColleague
http//example.org#
Kabul
http//example.org#
Guntur
http://example.org#
hasColleague
8
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
RDF-Graph
:Kabul :Guntur
:hasColleague
• Object of one statement may be the subject of another statement
• The result is a directed labelled (multi-)graph
• The object of a triple is a resource or a literal
9
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
RDF-Graph
:Kabul :Guntur
:UniWien
:studyAt
:hasColleague
• Object of one statement may be the subject of another statement
• The object of a triple is a resource or a literal
• The result is a directed labelled (multi-)graph 10
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
RDF-Graph
:Kabul :Guntur
:UniWien
:hasColleague
:studyAt :studyAt
• Object of one statement may be the subject of another statement
• The object of a triple is a resource or a literal
• The result is a directed labelled (multi-)graph 11
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
RDF-Serialization
@prefix : <http://example.org#>.
:Kabul :hasColleague :Guntur ;
:studyAt :UniWien.
:Guntur :studyAt :UniWien.
RDF (TURTLE)
:Kabul :Guntur
:UniWien
:studyAt :studyAt
:hasColleague
<http://example.org#Kabul> <http://example.org#hasColleague> <http://example.org#Guntur> .
<http://example.org#Kabul> <http://example.org#studyAt> <http://example.org#UniWien> .
<http://example.org#Guntur> <http://example.org#studyAt> <http://example.org#UniWien> .
N-triples
How do we manipulate RDF Graph?
12
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
SPARQL (SPARQL Protocol and RDF Query Language)
Lets us:
• Retrieve and manipulate data stored in RDF
• Explore data by querying unknown relationships
• Perform complex joins of disparate databases in a single, simple query
• Etc.
13
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
SPARQL Query Example
:Kabul :Guntur
:UniWien
SPARQL Query : Who is Kabul’s colleague?
SELECT
?o
WHERE {
:Kabul :hasColleague ?o
}
?o
:Guntur
:studyAt :studyAt
:hasColleague
Result:
14
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
SPARQL Query Example:
SPARQL Query : Where does Kabul study?
SELECT ?o
WHERE {
:Kabul :studyAt ?o
}
?o
:UniWien
Result:
:Kabul :Guntur
:UniWien
:studyAt :studyAt
:hasColleague
15
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
SPARQL Query
:Kabul :Guntur
:UniWien
SPARQL Query : Who study at UniWien?
SELECT ?s
WHERE {
?s :studyAt :UniWien
}
Result:
?s
:Kabul
:Guntur
:studyAt :studyAt
:hasColleague
16
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
Background Linking:
:Kabul :Guntur
:UniWien
:studyAt
:hasColleague
:studyAt
Datasource 1 (Internal) Datasource 2 (External) : DBPedia
dp:University_Of_Vienna
dbo:City
dp:Vienna dp:Austria
dbo:Country
owl:sameAs
Datasourcess can be varied and located at different location
Generate linking between existing graph onto an Internal/External Background Knowledge
How can we retrieve data from different/multiple heterogeneous data sources?
17
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
SPARQL Query Federation
https://www.researchgate.net/profile/Alban-Gaignard/publication/278643329/figure/fig2/AS:669574714359817@1536650460549/A-sample-federated-data-integration-setup-in-which-
result-data-is-dynamically-retrieved.png
• Federated Query extension for executing queries
distributed over different SPARQL endpoints
• The SERVICE keyword extends SPARQL 1.1 to
support queries that merge data distributed across the
Web.
18
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
SPARQL Query Federation : Example
Query : In which city do Kabul and Guntur study?
SELECT ?s ?city
WHERE {
?s :studyAt ?o.
SERVICE <http://dbpedia.org/sparql> {
?o owl:sameAs ?org.
?org dbo:City ?city. }
}
Results:
?s ?city
:Kabul dp:Vienna
:Guntur dp:Vienna
:Kabul :Guntur
:UniWien
:studyAt
:hasColleague
:studyAt
Datasource 1 (Internal) Datasource 2 (External)
dp:University_Of_Vienna
dbo:City
dp:Vienna dp:Austria
dbo:Country
owl:sameAs
19
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
Datasource 2 (External) DBPedia
Query : Construct triple indicating city where
Kabul and Guntur works !?
CONSTRUCT ?s :liveIn ?city.
WHERE {
?s :studyAt ?o.
SERVICE <http://dbpedia.org/sparql> {
?o owl:sameAs ?org.
?org dbo:City ?city. }
}
:Kabul :Guntur
:UniWien
dp:University_Of_Vienna
dp:Vienna
dp:Austria
dbo:City
dbo:Country
:liveIn
:studyAt
:hasColleague
:studyAt
Datasource 1
owl:sameAs
subj predicate object
:Kabul :liveIn dp:Vienna
:Guntur :liveIn dp:Vienna
Result:
CONSTRUCT Query
Generating new Triples from Existing one
Based on a certain patterns
20
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
Linked Open Data
https://lod-cloud.net/`
21
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
Cybersecurity & Information Security
Cyber security is the practice of defending
computers, servers, mobile devices, electronic
systems, networks, and data from malicious attacks
[1].
Information Security : The practice of preventing
unauthorized access, use, disclosure, disruption,
modification, inspection, recording or destruction of
information [2].
[1] https://www.kaspersky.com/resource-center/definitions/what-is-cyber-security
[2] https://www.geeksforgeeks.org/what-is-information-security 22
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
Cybersecurity Risks
Serious Impact:
 Business process
disruptions,
 Sensitive data thefts,
 Privacy loss,
 Decreased
trustworthiness,
 Reputational damages,
 etc.
https://www.linkedin.com/pulse/data-exfiltration-do-you-know-where-your-antonio-
fernandes/
23
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
ATT&CK Matrix for Enterprise
https://attack.mitre.org/ 24
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
ATT & CK Model
MITRE ATT&CK: Design and Philosophy 25
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
ATT & CK Model : Example
MITRE ATT&CK: Design and Philosophy 26
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
Related Cybersecurity Information/Tool
CTI (Cyber-threat Intelligence)
ICT Asset information
Log Data/Traces
SIEM/Tools/AV
Analyst
integration
contextualization ?
Interpretation ?
27
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
Log Data
28
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
Cyber-threat Information
29
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
Semantic Log Analysis (Architecture)
Kurniawan K., Ekelhart A., Ekaputra F., Kiesling E. (2020) Cross-Platform File System Activity Monitoring and Forensics – A Semantic Approach. In: Hölbl M., Rannenberg K.,
Welzer T. (eds) ICT Systems Security and Privacy Protection. SEC 2020. IFIP Advances in Information and Communication Technology, vol 580. Springer, Cham.
https://doi.org/10.1007/978-3-030-58201-2_26
30
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
Log Extraction & KG Construction
{
"timestamp":"2018−04−09T07:37:47.000Z",
“message”:”Mounted Huge Pages File System”,
"program":"systemd“,
"host":"kabul−VirtualBox“,
"pid":"1“,
….
}
Extracted Log Data
Raw Log
Data
Extracted
Log data
(example) Raw Log Data
Apr 9 09:37:47 kabul-VirtualBox systemd[1]: Mounted Huge Pages File System.
Other Technique(s) :
(Unstructured Log)
- Named Entity Recognition
- Entity Resolution
31
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
Background Linking
32
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
Use Case: Log analysis and Exploration
33
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
Use Case: File Access History
Query Evaluation:
Result:
Visualization
FileServer (Linux) Workstation (Windows)
34
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
Use Case:
Stream Detection
Query Evaluation:
Result:
Analyst
Cybersecurity
Knowledge-Base
Internal
Background
Knowledge
35
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
Summary
• Knowledge Graph provides flexible graph representation, integration,
contextualization and linking.
• SPARQL can be used to manipulate RDF Graph, perform query
federation and semantic integration.
• Cybersecurity information are complex, heterogeneous, dispersed
resources.
• Knowledge Graph can be potentially used to address cybersecurity
challenges (e.g. resource integration, log analysis, monitoring etc.)
36
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
Related Topic…
• Distributed Analysis (Decentralization)
• Scalable (Stream) Log Analysis
• Attack Graph Discovery and Construction
• Anomaly detection (combination with machine learning)
• Etc.
37
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
Thank you:
Twitter: @kabulkurniawan
Web: kabulkurniawan.github.io
Email: kabulkurniawan@gmail.com
38
Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan

Más contenido relacionado

La actualidad más candente

ICS/SCADA/PLC Google/Shodanhq Cheat Sheet
ICS/SCADA/PLC Google/Shodanhq Cheat SheetICS/SCADA/PLC Google/Shodanhq Cheat Sheet
ICS/SCADA/PLC Google/Shodanhq Cheat Sheet
qqlan
 
Data Mining with WEKA WEKA
Data Mining with WEKA WEKAData Mining with WEKA WEKA
Data Mining with WEKA WEKA
butest
 

La actualidad más candente (20)

The WAF book (Web App Firewall )
The WAF book  (Web App Firewall )The WAF book  (Web App Firewall )
The WAF book (Web App Firewall )
 
20221209-ApacheSolrによるはじめてのセマンティックサーチ.pdf
20221209-ApacheSolrによるはじめてのセマンティックサーチ.pdf20221209-ApacheSolrによるはじめてのセマンティックサーチ.pdf
20221209-ApacheSolrによるはじめてのセマンティックサーチ.pdf
 
あなたの Azure Windows VM がもっと速くなるかもしれない!! ~Azure Windows VM Performance Monitori...
あなたの Azure Windows VM がもっと速くなるかもしれない!! ~Azure Windows VM Performance Monitori...あなたの Azure Windows VM がもっと速くなるかもしれない!! ~Azure Windows VM Performance Monitori...
あなたの Azure Windows VM がもっと速くなるかもしれない!! ~Azure Windows VM Performance Monitori...
 
サーバーレスWebアプリケーションを作ろう~AWSと比べてみる~
サーバーレスWebアプリケーションを作ろう~AWSと比べてみる~サーバーレスWebアプリケーションを作ろう~AWSと比べてみる~
サーバーレスWebアプリケーションを作ろう~AWSと比べてみる~
 
Jdbc_ravi_2016
Jdbc_ravi_2016Jdbc_ravi_2016
Jdbc_ravi_2016
 
Cloud Summit Canada com Rodrigo Montoro
Cloud Summit Canada com Rodrigo MontoroCloud Summit Canada com Rodrigo Montoro
Cloud Summit Canada com Rodrigo Montoro
 
Classification of vulnerabilities
Classification of vulnerabilitiesClassification of vulnerabilities
Classification of vulnerabilities
 
ICS/SCADA/PLC Google/Shodanhq Cheat Sheet
ICS/SCADA/PLC Google/Shodanhq Cheat SheetICS/SCADA/PLC Google/Shodanhq Cheat Sheet
ICS/SCADA/PLC Google/Shodanhq Cheat Sheet
 
Content Security Policy
Content Security PolicyContent Security Policy
Content Security Policy
 
Cisco ACI 情報源
Cisco ACI 情報源Cisco ACI 情報源
Cisco ACI 情報源
 
Mongodb
MongodbMongodb
Mongodb
 
SINIFLANDIRMA TEMELLİ KORELASYON YAKLAŞIMI
SINIFLANDIRMA TEMELLİ KORELASYON YAKLAŞIMISINIFLANDIRMA TEMELLİ KORELASYON YAKLAŞIMI
SINIFLANDIRMA TEMELLİ KORELASYON YAKLAŞIMI
 
MongoDB World 2019: The Sights (and Smells) of a Bad Query
MongoDB World 2019: The Sights (and Smells) of a Bad QueryMongoDB World 2019: The Sights (and Smells) of a Bad Query
MongoDB World 2019: The Sights (and Smells) of a Bad Query
 
Elasticsearchインデクシングのパフォーマンスを測ってみた
Elasticsearchインデクシングのパフォーマンスを測ってみたElasticsearchインデクシングのパフォーマンスを測ってみた
Elasticsearchインデクシングのパフォーマンスを測ってみた
 
Paper - semi-automated information gathering tools for subdomain enumeration ...
Paper - semi-automated information gathering tools for subdomain enumeration ...Paper - semi-automated information gathering tools for subdomain enumeration ...
Paper - semi-automated information gathering tools for subdomain enumeration ...
 
F5's IP Intelligence Service
F5's IP Intelligence ServiceF5's IP Intelligence Service
F5's IP Intelligence Service
 
Data Mining with WEKA WEKA
Data Mining with WEKA WEKAData Mining with WEKA WEKA
Data Mining with WEKA WEKA
 
BGA Staj Okulu Sınavı'17
BGA Staj Okulu Sınavı'17BGA Staj Okulu Sınavı'17
BGA Staj Okulu Sınavı'17
 
Azure DevOpsとセキュリティ
Azure DevOpsとセキュリティAzure DevOpsとセキュリティ
Azure DevOpsとセキュリティ
 
Güvenli Veri Silme ve Dosya Kurtarma
Güvenli Veri Silme ve Dosya KurtarmaGüvenli Veri Silme ve Dosya Kurtarma
Güvenli Veri Silme ve Dosya Kurtarma
 

Similar a Knowledge Graph for Cybersecurity: An Introduction By Kabul Kurniawan

A modified k means algorithm for big data clustering
A modified k means algorithm for big data clusteringA modified k means algorithm for big data clustering
A modified k means algorithm for big data clustering
SK Ahammad Fahad
 

Similar a Knowledge Graph for Cybersecurity: An Introduction By Kabul Kurniawan (20)

Netsoft19 Keynote: Fluid Network Planes
Netsoft19 Keynote: Fluid Network PlanesNetsoft19 Keynote: Fluid Network Planes
Netsoft19 Keynote: Fluid Network Planes
 
Information Technology in Industry(ITII) - November Issue 2018
Information Technology in Industry(ITII) - November Issue 2018Information Technology in Industry(ITII) - November Issue 2018
Information Technology in Industry(ITII) - November Issue 2018
 
Knowledge graph construction with a façade - The SPARQL Anything Project
Knowledge graph construction with a façade - The SPARQL Anything ProjectKnowledge graph construction with a façade - The SPARQL Anything Project
Knowledge graph construction with a façade - The SPARQL Anything Project
 
Knowledge graphs for knowing more and knowing for sure
Knowledge graphs for knowing more and knowing for sureKnowledge graphs for knowing more and knowing for sure
Knowledge graphs for knowing more and knowing for sure
 
dishank CV
dishank CVdishank CV
dishank CV
 
The Role of Machine Learning in Fluid Network Control and Data Planes.pdf
The Role of Machine Learning in Fluid Network Control and Data Planes.pdfThe Role of Machine Learning in Fluid Network Control and Data Planes.pdf
The Role of Machine Learning in Fluid Network Control and Data Planes.pdf
 
CSE NEW_4th yr w.e.f. 2018-19.pdf
CSE NEW_4th yr w.e.f. 2018-19.pdfCSE NEW_4th yr w.e.f. 2018-19.pdf
CSE NEW_4th yr w.e.f. 2018-19.pdf
 
Data integration with a façade. The case of knowledge graph construction.
Data integration with a façade. The case of knowledge graph construction.Data integration with a façade. The case of knowledge graph construction.
Data integration with a façade. The case of knowledge graph construction.
 
Calit2-a Persistent UCSD/UCI Framework for Collaboration
Calit2-a Persistent UCSD/UCI Framework for CollaborationCalit2-a Persistent UCSD/UCI Framework for Collaboration
Calit2-a Persistent UCSD/UCI Framework for Collaboration
 
A modified k means algorithm for big data clustering
A modified k means algorithm for big data clusteringA modified k means algorithm for big data clustering
A modified k means algorithm for big data clustering
 
Enabling Secure Data Discoverability (SC21 Tutorial)
Enabling Secure Data Discoverability (SC21 Tutorial)Enabling Secure Data Discoverability (SC21 Tutorial)
Enabling Secure Data Discoverability (SC21 Tutorial)
 
Indexing data on the web a comparison of schema level indices for data search
Indexing data on the web a comparison of schema level indices for data searchIndexing data on the web a comparison of schema level indices for data search
Indexing data on the web a comparison of schema level indices for data search
 
Computing Outside The Box June 2009
Computing Outside The Box June 2009Computing Outside The Box June 2009
Computing Outside The Box June 2009
 
Serving Ireland's Geospatial Information as Linked Data
Serving Ireland's Geospatial Information as Linked DataServing Ireland's Geospatial Information as Linked Data
Serving Ireland's Geospatial Information as Linked Data
 
Spark-MPI: Approaching the Fifth Paradigm with Nikolay Malitsky
Spark-MPI: Approaching the Fifth Paradigm with Nikolay MalitskySpark-MPI: Approaching the Fifth Paradigm with Nikolay Malitsky
Spark-MPI: Approaching the Fifth Paradigm with Nikolay Malitsky
 
Grid Projects In The US July 2008
Grid Projects In The US July 2008Grid Projects In The US July 2008
Grid Projects In The US July 2008
 
Considerations for Abstracting Complexities of a Real-Time ML Platform, Zhenz...
Considerations for Abstracting Complexities of a Real-Time ML Platform, Zhenz...Considerations for Abstracting Complexities of a Real-Time ML Platform, Zhenz...
Considerations for Abstracting Complexities of a Real-Time ML Platform, Zhenz...
 
FAIR Workflows: A step closer to the Scientific Paper of the Future
FAIR Workflows: A step closer to the Scientific Paper of the FutureFAIR Workflows: A step closer to the Scientific Paper of the Future
FAIR Workflows: A step closer to the Scientific Paper of the Future
 
Facilitating Data Curation: a Solution Developed in the Toxicology Domain
Facilitating Data Curation: a Solution Developed in the Toxicology DomainFacilitating Data Curation: a Solution Developed in the Toxicology Domain
Facilitating Data Curation: a Solution Developed in the Toxicology Domain
 
Early Analysis and Debuggin of Linked Open Data Cubes
Early Analysis and Debuggin of Linked Open Data CubesEarly Analysis and Debuggin of Linked Open Data Cubes
Early Analysis and Debuggin of Linked Open Data Cubes
 

Último

Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
amitlee9823
 
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
amitlee9823
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
amitlee9823
 
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts ServiceCall Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
amitlee9823
 
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...
only4webmaster01
 
Just Call Vip call girls roorkee Escorts ☎️9352988975 Two shot with one girl ...
Just Call Vip call girls roorkee Escorts ☎️9352988975 Two shot with one girl ...Just Call Vip call girls roorkee Escorts ☎️9352988975 Two shot with one girl ...
Just Call Vip call girls roorkee Escorts ☎️9352988975 Two shot with one girl ...
gajnagarg
 
Call Girls In Nandini Layout ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Nandini Layout ☎ 7737669865 🥵 Book Your One night StandCall Girls In Nandini Layout ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Nandini Layout ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men 🔝Dindigul🔝 Escor...
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men  🔝Dindigul🔝   Escor...➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men  🔝Dindigul🔝   Escor...
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men 🔝Dindigul🔝 Escor...
amitlee9823
 
Call Girls In Attibele ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Attibele ☎ 7737669865 🥵 Book Your One night StandCall Girls In Attibele ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Attibele ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
amitlee9823
 
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
amitlee9823
 
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
amitlee9823
 
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
amitlee9823
 

Último (20)

Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
 
Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -
Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -
Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -
 
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
 
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts ServiceCall Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
 
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
 
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
 
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Discover Why Less is More in B2B Research
Discover Why Less is More in B2B ResearchDiscover Why Less is More in B2B Research
Discover Why Less is More in B2B Research
 
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
 
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...
 
Just Call Vip call girls roorkee Escorts ☎️9352988975 Two shot with one girl ...
Just Call Vip call girls roorkee Escorts ☎️9352988975 Two shot with one girl ...Just Call Vip call girls roorkee Escorts ☎️9352988975 Two shot with one girl ...
Just Call Vip call girls roorkee Escorts ☎️9352988975 Two shot with one girl ...
 
Call Girls In Nandini Layout ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Nandini Layout ☎ 7737669865 🥵 Book Your One night StandCall Girls In Nandini Layout ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Nandini Layout ☎ 7737669865 🥵 Book Your One night Stand
 
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men 🔝Dindigul🔝 Escor...
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men  🔝Dindigul🔝   Escor...➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men  🔝Dindigul🔝   Escor...
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men 🔝Dindigul🔝 Escor...
 
Call Girls In Attibele ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Attibele ☎ 7737669865 🥵 Book Your One night StandCall Girls In Attibele ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Attibele ☎ 7737669865 🥵 Book Your One night Stand
 
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
 
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
 
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
 

Knowledge Graph for Cybersecurity: An Introduction By Kabul Kurniawan

  • 1. Knowledge Graph for Cybersecurity: an Introduction Presented By: Kabul Kurniawan, S.Kom, M.Cs. At: As-Salam Leaders Talk (ALT) Vienna, 02/05/2021
  • 2. Outline: • Knowledge Graph • Cybersecurity • Knowledge graph for Cybersecurity • Use Case Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan 2
  • 3. Why Graph? http://web.stanford.edu/class/cs224w/ 3 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 4. Google Knowledge Graph – Things not Strings https://blog.google/products/search/introducing-knowledge-graph-things-not/ 4 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 5. Google Knowledge Graph – Things not Strings 5 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 6. Resource Description Framework (RDF) • Graph-based data model • Subject-predicate-object triples • Use of URIs as globally unique identifiers 7 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 8. RDF-Graph :Kabul :Guntur :hasColleague • Object of one statement may be the subject of another statement • The result is a directed labelled (multi-)graph • The object of a triple is a resource or a literal 9 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 9. RDF-Graph :Kabul :Guntur :UniWien :studyAt :hasColleague • Object of one statement may be the subject of another statement • The object of a triple is a resource or a literal • The result is a directed labelled (multi-)graph 10 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 10. RDF-Graph :Kabul :Guntur :UniWien :hasColleague :studyAt :studyAt • Object of one statement may be the subject of another statement • The object of a triple is a resource or a literal • The result is a directed labelled (multi-)graph 11 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 11. RDF-Serialization @prefix : <http://example.org#>. :Kabul :hasColleague :Guntur ; :studyAt :UniWien. :Guntur :studyAt :UniWien. RDF (TURTLE) :Kabul :Guntur :UniWien :studyAt :studyAt :hasColleague <http://example.org#Kabul> <http://example.org#hasColleague> <http://example.org#Guntur> . <http://example.org#Kabul> <http://example.org#studyAt> <http://example.org#UniWien> . <http://example.org#Guntur> <http://example.org#studyAt> <http://example.org#UniWien> . N-triples How do we manipulate RDF Graph? 12 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 12. SPARQL (SPARQL Protocol and RDF Query Language) Lets us: • Retrieve and manipulate data stored in RDF • Explore data by querying unknown relationships • Perform complex joins of disparate databases in a single, simple query • Etc. 13 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 13. SPARQL Query Example :Kabul :Guntur :UniWien SPARQL Query : Who is Kabul’s colleague? SELECT ?o WHERE { :Kabul :hasColleague ?o } ?o :Guntur :studyAt :studyAt :hasColleague Result: 14 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 14. SPARQL Query Example: SPARQL Query : Where does Kabul study? SELECT ?o WHERE { :Kabul :studyAt ?o } ?o :UniWien Result: :Kabul :Guntur :UniWien :studyAt :studyAt :hasColleague 15 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 15. SPARQL Query :Kabul :Guntur :UniWien SPARQL Query : Who study at UniWien? SELECT ?s WHERE { ?s :studyAt :UniWien } Result: ?s :Kabul :Guntur :studyAt :studyAt :hasColleague 16 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 16. Background Linking: :Kabul :Guntur :UniWien :studyAt :hasColleague :studyAt Datasource 1 (Internal) Datasource 2 (External) : DBPedia dp:University_Of_Vienna dbo:City dp:Vienna dp:Austria dbo:Country owl:sameAs Datasourcess can be varied and located at different location Generate linking between existing graph onto an Internal/External Background Knowledge How can we retrieve data from different/multiple heterogeneous data sources? 17 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 17. SPARQL Query Federation https://www.researchgate.net/profile/Alban-Gaignard/publication/278643329/figure/fig2/AS:669574714359817@1536650460549/A-sample-federated-data-integration-setup-in-which- result-data-is-dynamically-retrieved.png • Federated Query extension for executing queries distributed over different SPARQL endpoints • The SERVICE keyword extends SPARQL 1.1 to support queries that merge data distributed across the Web. 18 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 18. SPARQL Query Federation : Example Query : In which city do Kabul and Guntur study? SELECT ?s ?city WHERE { ?s :studyAt ?o. SERVICE <http://dbpedia.org/sparql> { ?o owl:sameAs ?org. ?org dbo:City ?city. } } Results: ?s ?city :Kabul dp:Vienna :Guntur dp:Vienna :Kabul :Guntur :UniWien :studyAt :hasColleague :studyAt Datasource 1 (Internal) Datasource 2 (External) dp:University_Of_Vienna dbo:City dp:Vienna dp:Austria dbo:Country owl:sameAs 19 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 19. Datasource 2 (External) DBPedia Query : Construct triple indicating city where Kabul and Guntur works !? CONSTRUCT ?s :liveIn ?city. WHERE { ?s :studyAt ?o. SERVICE <http://dbpedia.org/sparql> { ?o owl:sameAs ?org. ?org dbo:City ?city. } } :Kabul :Guntur :UniWien dp:University_Of_Vienna dp:Vienna dp:Austria dbo:City dbo:Country :liveIn :studyAt :hasColleague :studyAt Datasource 1 owl:sameAs subj predicate object :Kabul :liveIn dp:Vienna :Guntur :liveIn dp:Vienna Result: CONSTRUCT Query Generating new Triples from Existing one Based on a certain patterns 20 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 20. Linked Open Data https://lod-cloud.net/` 21 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 21. Cybersecurity & Information Security Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks [1]. Information Security : The practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information [2]. [1] https://www.kaspersky.com/resource-center/definitions/what-is-cyber-security [2] https://www.geeksforgeeks.org/what-is-information-security 22 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 22. Cybersecurity Risks Serious Impact:  Business process disruptions,  Sensitive data thefts,  Privacy loss,  Decreased trustworthiness,  Reputational damages,  etc. https://www.linkedin.com/pulse/data-exfiltration-do-you-know-where-your-antonio- fernandes/ 23 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 23. ATT&CK Matrix for Enterprise https://attack.mitre.org/ 24 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 24. ATT & CK Model MITRE ATT&CK: Design and Philosophy 25 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 25. ATT & CK Model : Example MITRE ATT&CK: Design and Philosophy 26 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 26. Related Cybersecurity Information/Tool CTI (Cyber-threat Intelligence) ICT Asset information Log Data/Traces SIEM/Tools/AV Analyst integration contextualization ? Interpretation ? 27 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 27. Log Data 28 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 28. Cyber-threat Information 29 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 29. Semantic Log Analysis (Architecture) Kurniawan K., Ekelhart A., Ekaputra F., Kiesling E. (2020) Cross-Platform File System Activity Monitoring and Forensics – A Semantic Approach. In: Hölbl M., Rannenberg K., Welzer T. (eds) ICT Systems Security and Privacy Protection. SEC 2020. IFIP Advances in Information and Communication Technology, vol 580. Springer, Cham. https://doi.org/10.1007/978-3-030-58201-2_26 30 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 30. Log Extraction & KG Construction { "timestamp":"2018−04−09T07:37:47.000Z", “message”:”Mounted Huge Pages File System”, "program":"systemd“, "host":"kabul−VirtualBox“, "pid":"1“, …. } Extracted Log Data Raw Log Data Extracted Log data (example) Raw Log Data Apr 9 09:37:47 kabul-VirtualBox systemd[1]: Mounted Huge Pages File System. Other Technique(s) : (Unstructured Log) - Named Entity Recognition - Entity Resolution 31 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 31. Background Linking 32 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 32. Use Case: Log analysis and Exploration 33 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 33. Use Case: File Access History Query Evaluation: Result: Visualization FileServer (Linux) Workstation (Windows) 34 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 34. Use Case: Stream Detection Query Evaluation: Result: Analyst Cybersecurity Knowledge-Base Internal Background Knowledge 35 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 35. Summary • Knowledge Graph provides flexible graph representation, integration, contextualization and linking. • SPARQL can be used to manipulate RDF Graph, perform query federation and semantic integration. • Cybersecurity information are complex, heterogeneous, dispersed resources. • Knowledge Graph can be potentially used to address cybersecurity challenges (e.g. resource integration, log analysis, monitoring etc.) 36 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 36. Related Topic… • Distributed Analysis (Decentralization) • Scalable (Stream) Log Analysis • Attack Graph Discovery and Construction • Anomaly detection (combination with machine learning) • Etc. 37 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan
  • 37. Thank you: Twitter: @kabulkurniawan Web: kabulkurniawan.github.io Email: kabulkurniawan@gmail.com 38 Knowledge Graph for Cybersecurity: an Introduction by Kabul Kurniawan