Netinfo Security ›› 2025, Vol. 25 ›› Issue (3): 451-466.doi: 10.3969/j.issn.1671-1122.2025.03.008

Previous Articles     Next Articles

Construction Method of Cybersecurity Knowledge Graph Based on Ontology

XU Zhishuang1, ZHANG Kun2, FAN Junchao1, CHANG Xiaolin1()   

  1. 1. School of Cyberspace Science and Technology, Beijing Jiaotong University, Beijing 100044, China
    2. State Information Center, Beijing 100045, China
  • Received:2024-12-30 Online:2025-03-10 Published:2025-03-26
  • Contact: CHANG Xiaolin E-mail:xlchang@bjtu.edu.cn

Abstract:

With the rapid development of information technology, the connection between cyberspace and the real world has become increasingly close. Applying knowledge graph technology to the field of cybersecurity allows for the extraction and integration of fragmented, valuable security knowledge from vast amounts of data in cyberspace, providing support for decision-making. Existing methods face issues such as the lack of a unified standard for ontology models and poor knowledge extraction performance. This paper proposed an ontology-based method for constructing a cybersecurity knowledge graph, which included two models: named entity recognition and relation extraction. The named entity recognition model integrated the BERT pre-trained model, bidirectional long short-term memory network, multi-head attention mechanism, and conditional random fields; the relation extraction model combined the BERT pre-trained model, self-attention mechanism and convolutional neural network. These two models improved the accuracy of named entity recognition and enhanced the accuracy and automation of relation extraction tasks. The proposed method for constructing the cybersecurity knowledge graph can integrate and analyze cybersecurity data, enabling intelligent retrieval of cybersecurity knowledge and automatic updates and expansion of the knowledge graph.

Key words: cybersecurity, knowledge graph, ontology, knowledge extraction

CLC Number: