Font Size: a A A

Construction And Implementation Of Information Extraction And Knowledge Graph Display System Of Malware

Posted on:2021-03-22Degree:MasterType:Thesis
Country:ChinaCandidate:Y S WenFull Text:PDF
GTID:2428330632962656Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the rapid development of information technology,human beings have entered the digital age,and people pay more and more attention to their privacy and the security of computer network.However,hackers use a variety of intrusion tools and network attacks to cause enterprises and users to suffer property losses,among which the most extensive,the most influential is the use of malicious software programs to attack.These malicious software programs not only have a large number,but also have complex function modules and advanced vulnerability exploitation,covert survival,anti-soft and other technologies.It is a great challenge for security personnel to analyze malicious software,draw pictures of network attack organizations and trace the source.Network security practitioners are eager to have a complete knowledge base to guide them to better analyze malicious programs and provide guidance on security defense strategies.In order to alleviate these problems,this paper puts forward a solution using knowledge graph technology.This topic will take binary files as the direct data source to extract knowledge and translate it into knowledge graph elements.Based on the knowledge graph,malware analysts can abandon the previous work of sample screening and family clustering through manual annotation or subjective judgment,and also provide support for the technical countermeasures against malware.The main work of this paper includes the following points:1)research on the construction method of technical knowledge base and knowledge graph in the field of malware.Sort out the technical points in the field,and study the construction scheme of malware knowledge graph;2)design of malware knowledge representation model.Including domain entity,relationship,attribute and other information extraction method research;3)research on knowledge extraction methods of malware.Study and design a set of stable and reliable domain knowledge extraction scheme;4)research on the application of knowledge graph of malware.The algorithm implementation based on knowledge graph of malware is studied.5)design and implement the malware knowledge graph system.Based on the above four aspects,complete the malware knowledge graph system...
Keywords/Search Tags:knowledge, malware knowledge base, malware clustering, Cuckoo, Neo4j
PDF Full Text Request
Related items