Visible to the public Node Importance Evaluation Method for Cyberspace Security Risk Control

TitleNode Importance Evaluation Method for Cyberspace Security Risk Control
Publication TypeConference Paper
Year of Publication2021
AuthorsYao, Jiaxin, Lin, Bihai, Huang, Ruiqi, Fan, Junyi, Chen, Biqiong, Liu, Yanhua
Date Publishednov
KeywordsBig Data, control theory, Correlation, Cyber security data fusion, cyber security knowledge graph, Cyberspace, Education, Human Behavior, human factors, Key nodes, Node importance, Ontologies, pubcrawl, Resiliency, Scalability, security, Topology
Abstract{With the rapid development of cyberspace, cyber security incidents are increasing, and the means and types of network attacks are becoming more and more complex and refined, which brings greater challenges to security risk control. First, the knowledge graph technology is used to construct a cyber security knowledge graph based on ontology to realize multi-source heterogeneous security big data fusion calculation, and accurately express the complex correlation between different security entities. Furthermore, for cyber security risk control, a key node assessment method for security risk diffusion is proposed. From the perspectives of node communication correlation and topological level, the calculation method of node communication importance based on improved PageRank Algorithm and based on the improved K-shell Algorithm calculates the importance of node topology are studied, and then organically combine the two calculation methods to calculate the importance of different nodes in security risk defense. Experiments show that this method can evaluate the importance of nodes more accurately than the PageRank algorithm and the K-shell algorithm.
DOI10.1109/ITME53901.2021.00036
Citation Keyyao_node_2021