Research on Parameter-Efficient Knowledge Graph Completion Methods and Their Performance in the Cybersecurity Field

As an advanced knowledge management and reasoning tool, knowledge graph technology can significantly enhance the efficiency of managing and analyzing cyberthreat intelligence, providing strong technical support for cybersecurity threat identification and situational awareness. This paper proposes a...

Full description

Saved in:
Bibliographic Details
Main Authors: Bin Chen, Hongyi Li, Ze Shi
Format: Article
Language:English
Published: IEEE 2025-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10855434/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1825207034343063552
author Bin Chen
Hongyi Li
Ze Shi
author_facet Bin Chen
Hongyi Li
Ze Shi
author_sort Bin Chen
collection DOAJ
description As an advanced knowledge management and reasoning tool, knowledge graph technology can significantly enhance the efficiency of managing and analyzing cyberthreat intelligence, providing strong technical support for cybersecurity threat identification and situational awareness. This paper proposes a multi-level graph clustering-based model for completing cyberthreat intelligence knowledge graphs (GCCKG). The model utilizes a multi-level graph clustering approach to divide the knowledge graph into communities and selects a portion of high-degree entities within each community as the reserved entities. Additionally, we propose a path-enhanced cosine similarity measurement method to measure the similarity between entities, and a graph attention network is employed to iteratively update the embeddings of entities and relations, capturing key information in the graph-structured data. Experimental results demonstrate that the proposed GCCKG model significantly improves evaluation values such as MRR and Hits@K in knowledge graph completion tasks on several general domain knowledge graphs, including FB15K, WN18, FB15K-237, as well as the cyberthreat intelligence knowledge graph CS13K, while also significantly reducing the model’s parameter size. This provides a novel solution for knowledge graph completion in the field of cyberthreat intelligence.
format Article
id doaj-art-9978dea207ac4e328948c01fba34f915
institution Kabale University
issn 2169-3536
language English
publishDate 2025-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj-art-9978dea207ac4e328948c01fba34f9152025-02-07T00:01:07ZengIEEEIEEE Access2169-35362025-01-0113229982301210.1109/ACCESS.2025.353514310855434Research on Parameter-Efficient Knowledge Graph Completion Methods and Their Performance in the Cybersecurity FieldBin Chen0Hongyi Li1https://orcid.org/0000-0002-6891-0858Ze Shi2https://orcid.org/0000-0002-4273-6927School of Cyber Science and Technology, Beihang University, Beijing, ChinaSchool of Cyber Science and Technology, Beihang University, Beijing, ChinaSchool of Cyber Science and Technology, Beihang University, Beijing, ChinaAs an advanced knowledge management and reasoning tool, knowledge graph technology can significantly enhance the efficiency of managing and analyzing cyberthreat intelligence, providing strong technical support for cybersecurity threat identification and situational awareness. This paper proposes a multi-level graph clustering-based model for completing cyberthreat intelligence knowledge graphs (GCCKG). The model utilizes a multi-level graph clustering approach to divide the knowledge graph into communities and selects a portion of high-degree entities within each community as the reserved entities. Additionally, we propose a path-enhanced cosine similarity measurement method to measure the similarity between entities, and a graph attention network is employed to iteratively update the embeddings of entities and relations, capturing key information in the graph-structured data. Experimental results demonstrate that the proposed GCCKG model significantly improves evaluation values such as MRR and Hits@K in knowledge graph completion tasks on several general domain knowledge graphs, including FB15K, WN18, FB15K-237, as well as the cyberthreat intelligence knowledge graph CS13K, while also significantly reducing the model’s parameter size. This provides a novel solution for knowledge graph completion in the field of cyberthreat intelligence.https://ieeexplore.ieee.org/document/10855434/Knowledge graphscybersecuritycyberthreat intelligenceknowledge graph completion
spellingShingle Bin Chen
Hongyi Li
Ze Shi
Research on Parameter-Efficient Knowledge Graph Completion Methods and Their Performance in the Cybersecurity Field
IEEE Access
Knowledge graphs
cybersecurity
cyberthreat intelligence
knowledge graph completion
title Research on Parameter-Efficient Knowledge Graph Completion Methods and Their Performance in the Cybersecurity Field
title_full Research on Parameter-Efficient Knowledge Graph Completion Methods and Their Performance in the Cybersecurity Field
title_fullStr Research on Parameter-Efficient Knowledge Graph Completion Methods and Their Performance in the Cybersecurity Field
title_full_unstemmed Research on Parameter-Efficient Knowledge Graph Completion Methods and Their Performance in the Cybersecurity Field
title_short Research on Parameter-Efficient Knowledge Graph Completion Methods and Their Performance in the Cybersecurity Field
title_sort research on parameter efficient knowledge graph completion methods and their performance in the cybersecurity field
topic Knowledge graphs
cybersecurity
cyberthreat intelligence
knowledge graph completion
url https://ieeexplore.ieee.org/document/10855434/
work_keys_str_mv AT binchen researchonparameterefficientknowledgegraphcompletionmethodsandtheirperformanceinthecybersecurityfield
AT hongyili researchonparameterefficientknowledgegraphcompletionmethodsandtheirperformanceinthecybersecurityfield
AT zeshi researchonparameterefficientknowledgegraphcompletionmethodsandtheirperformanceinthecybersecurityfield