Computer Science ›› 2024, Vol. 51 ›› Issue (11): 321-328.doi: 10.11896/jsjkx.231000127

• Information Security • Previous Articles     Next Articles

Knowledge Graph Based Approach to Cyberspace Geographic Mapping Construction

WU Yue1, HU Wei2, LI Chenglong1, YANG Jiahai1, LI Zhiqi3, YIN Qin3, XIA Ang2, DANG Fangfang4   

  1. 1 Institute for Network Sciences and Cyberspace,Tsinghua University,Beijing 100084,China
    2 State Grid Information & Telecommunication Co.,Ltd.,Beijing 100053,China
    3 State Grid Cyber Security Technology(Beijing) Co.,Ltd.,Beijing 102209,China
    4 State Grid Henan Information & Telecommunication Company Data Center,Zhengzhou 450000,China
  • Received:2023-10-20 Revised:2024-08-26 Online:2024-11-15 Published:2024-11-06
  • About author:WU Yue,born in 2002,Ph.D.Her main research interests include network measurement and security and so on.
    HU Wei,born in 1977,professor.His main research interests include network information security and situational awareness.
  • Supported by:
    Science and Technology Project of State Grid Corporation of China(5700-202252199A-1-1-ZN).

Abstract: In the digital information era of rapid development of the Internet and increasing importance of cybersecurity,cyberspace geographic mapping is regarded as a new type of means of cognition and management of cyberspace.By synthesizing the information of cyberspace and geospatial information,it is able to display the cyberspace situation more comprehensively from multiple perspectives.However,the current research work on cyberspace geographic mapping lacks a fine-grained portrayal of cyberspace model,as well as specific construction methods and application methods of cyberspace geographic mapping.To address the above problems,with the goal of cyberspace cognition,this paper proposes a four-layer,four-level cyberspace hierarchical model with a time reference axis.In addition,in order to better understand the complex cyberspace environment,a specific framework for constructing a cyberspace geographic mapping,as well as a method for constructing a cyberspace ontology,is proposed in conjunction with the knowledge graph technology.Based on real mapping data from Censys,a prototype cyberspace geographic mapping of a simulated park network is successfully constructed.This study proposes an improved approach to the hierarchical structure of cyberspace,and also introduces knowledge mapping into the research field of cyberspace geography,which not only helps to improve the understanding of cyberspace,but also has practical application significance in cybersecurity,resource management,fault recovery,and decision making.

Key words: Cyberspace geography, Knowledge graph, Cyberspace hierarchy model, Cyberspace ontology, Cyberspace geographic mapping

CLC Number: 

  • TP393.2
[1] FENG D G,LIAN Y F.Challenges and Countermeasures to Cyberspace Security[J].Proceedings of the Chinese Academy of Sciences,2021,36(10):1239-1245.
[2] MORGAN S.2022 Official Cybercrime Report[EB/OL].(2022-10-17)[2023-09-01].https://s3.ca-central-1.amazonaws.com/esentire-dot-com-assets/assets/resourcefiles/2022-Official-Cybercrime-Report.pdf.
[3] MIAO C,WANG J,ZHUANG S,et al.A Coordinated View of Cyberspace[J].arXiv:1910.09787,2019.
[4] FANG B X.Coverage Areas of Cyberspace Security Technologies From a Hierarchical Perspective[J].Journal of Network and Information Security,2015,1(1):2-7.
[5] GUO L,CAO Y N,SU M J,et al.Cyberspace Resource Mapping:Concepts and Techniques[J].Journal of Information Security,2018,3(4):1-14.
[6] GUO Q Q,GAO C D,SUN K F,et al.Construction of a Hierarchical System of Cyberspace Elements based on the “People-Place-Network” relationship[J].Geographical Studies,2021,40(1):109-118.
[7] ZHANG L,ZHOU Y,SHI Q S,et al.Cyberspace Map Model with Tight Geospatial Correlation[J].Journal of Information Security,2018,3(4):63-72.
[8] CHEN S,GUO Q Q,GAO C D,et al.Concepts and Methods of Cyberspace Geographic Mapping[J].Science & Technology Review,2023,41(13):14-22.
[9] DONG C,JIANG B,LU Z G,et al.A Review of Knowledge Graphs for Cyberspace Security Intelligence[J].Journal of Information Security,2020,5(5):56-76.
[10] BATTY M.The geography of cyberspace[J].Environment andPlanning B:Planning and Design,1993,20(6):615-616.
[11] WANG H F,DING J,HU F H,et al.An Overview of Large-Scale Enterprise-Class Knowledge Graph Practices[J].Compu-ter Engineering,2020,46(7):1-13.
[12] SINGHAL A.Introducing the knowledge graph:Things,notstrings.official blog[EB/OL].(2012-05-16)[2023-09-01].https://blog.google/products/search/introducing-knowledge-gra-ph-things-not/.
[13] CICALESE D,AUGE J,JOUMBLATT D,et al.Characterizing IPv4 Anycast Adoption and Deployment[C]//Proceedings of the 11th ACM Conference on Emerging Networking Experiments and Technologies.2015:1-13.
[14] YANG J H,HE L,LI C L.Cyberspace Mapping-Principles,Techniques and Applications[M]//Posts and Telecom Press,2023.
[15] COX K C,EICK S G,HE T.3D Geographic Network Displays[J].ACM SIGMOD Record,1996,25(4):50-54.
[16] NSA/CSS Threat Operations Center.Bad Guys Are Every-where,Good Guys Are Somewhere[EB/OL].(2014-09-14)[2023-09-01].https://nsarchive.gwu.edu/sites/default/files/documents/3469146/Document-01-NSA-CSS-Threat-Operations-Center.pdf.
[17] HE J B,LI X T.Awareness and Reflection on Geographic Information Classification and Coding[J].Geography and Geographic Information Science,2002,18(3):1-7.
[18] Cyberspace of the Central Cyberspace Affairs Commission.Na-tional cybersecurity incident response plan[EB/OL].(2017-06-27)[2023-09-01].http://www.cac.gov.cn/2017-06/27/c_1121220113.htm.
[19] Neo4j.Neo4j Graph Database[EB/OL].(2023-09-01)[2023-09-01].https://neo4j.com/.
[20] Neo4j.Cypher Manual[EB/OL].(2023-09-01)[2023-09-01].https://neo4j.com/docs/cypher-manual/current/.
[21] GRUBER T R.A Translation Approach to Portable OntologySpecifications[J].Knowledge Acquisition,1993,5(2):199-220.
[22] BIZER C.The D2RQ Platform[EB/OL].(2010-03-04)[2023-09-01].http://d2rq.org/.
[23] The D2RQ Mapping Language[EB/OL].(2012-06-22)[2023-09-01].http://d2rq.org/d2rq-language.
[24] CENSYS.The Censys Internet Map[EB/OL].(2023-09-01)[2023-09-01].https://about.censys.io/.
[25] CAIDA.Caida[EB/OL].2023.https://www.caida.org./.
[26] ZoomEye.Zoomeye[EB/OL].https://www.zoomeye.org/.
[27] BEN-ARTZI A,CHANDNA A,WARRIER U.Network ma-nagement of tcp/ip networks:present and future[J].IEEE Network,1990,4(4):35-43.
[1] NIU Guanglin, LIN Zhen. Survey of Knowledge Graph Representation Learning for Relation Feature Modeling [J]. Computer Science, 2024, 51(9): 182-195.
[2] CHEN Shanshan, YAO Subin. Study on Recommendation Algorithms Based on Knowledge Graph and Neighbor PerceptionAttention Mechanism [J]. Computer Science, 2024, 51(8): 313-323.
[3] ZHANG Hui, ZHANG Xiaoxiong, DING Kun, LIU Shanshan. Device Fault Inference and Prediction Method Based on Dynamic Graph Representation [J]. Computer Science, 2024, 51(7): 310-318.
[4] PENG Bo, LI Yaodong, GONG Xianfu, LI Hao. Method for Entity Relation Extraction Based on Heterogeneous Graph Neural Networks and TextSemantic Enhancement [J]. Computer Science, 2024, 51(6A): 230700071-5.
[5] HE Jing, ZHAO Rui, ZHANG Hengshuo. Visual Bibliometric Analysis of Knowledge Graph [J]. Computer Science, 2024, 51(6A): 230500123-10.
[6] TANG Xin, SUN Yufei, WANG Yujue, SHI Min, ZHU Dengming. Three Layer Knowledge Graph Architecture for Industrial Digital Twins [J]. Computer Science, 2024, 51(6A): 230400153-6.
[7] ZHU Yuliang, LIU Juntao, RAO Ziyun, ZHANG Yi, CAO Wanhua. Knowledge Reasoning Model Combining HousE with Attention Mechanism [J]. Computer Science, 2024, 51(6A): 230600209-8.
[8] SUN Shounan, WANG Jingbin, WU Renfei, YOU Changkai, KE Xifan, HUANG Hao. TMGAT:Graph Attention Network with Type Matching Constraint [J]. Computer Science, 2024, 51(3): 235-243.
[9] ZHOU Honglin, SONG Huazhu, ZHANG Juan. Knowledge Graph Embedding Model with Entity Description on Cement Manufacturing Domain [J]. Computer Science, 2024, 51(3): 251-256.
[10] ZOU Chunling, ZHU Zhengzhou. Fusion Model of Housekeeping Service Course Recommendation Based on Knowledge Graph [J]. Computer Science, 2024, 51(2): 47-54.
[11] XU Tianyue, LIU Xianhui, ZHAO Weidong. Knowledge Graph and User Interest Based Recommendation Algorithm [J]. Computer Science, 2024, 51(2): 55-62.
[12] HAN Yijian, WANG Baohui. Study on DistMult Decoder in Knowledge Graph Entity Relationship Prediction [J]. Computer Science, 2024, 51(11A): 231200118-5.
[13] WANG Yuhan, MA Fuyuan, WANG Ying. Construction of Fine-grained Medical Knowledge Graph Based on Deep Learning [J]. Computer Science, 2024, 51(11A): 230900157-7.
[14] GU Zhaojun, YANG Wen, SUI He, LI Zhiping. Threat Assessment of Air Traffic Control Information System Based on Knowledge Graph [J]. Computer Science, 2024, 51(11A): 240200052-11.
[15] ZHAO Weidong, JIN Yanfeng, ZHANG Rui, LIN Yanzheng. KBQA Algorithm Introducing Core Entity Attention Evaluation [J]. Computer Science, 2024, 51(11): 239-247.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!