User's Permission Reasoning Method Based on Knowledge Graph Reward Guidance Reinforcement Learning in Data Center | SpringerLink
Skip to main content

User's Permission Reasoning Method Based on Knowledge Graph Reward Guidance Reinforcement Learning in Data Center

  • Conference paper
  • First Online:
Data Mining and Big Data (DMBD 2022)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1744))

Included in the following conference series:

  • 591 Accesses

Abstract

In general, multiple domain cyberspace security assessments are very important for data center security and can be implemented by reasoning user's permissions. However, while existing methods include some information from the physical and social domains, they do not provide a comprehensive representation of cyberspace. Existing reasoning methods are also based on expert given rules, resulting in inefficiency and a low degree of intelligence. To address this challenge, we create a Knowledge Graph (KG) of multiple domain cyberspace in order to provide a standard semantic description of the multiple domain cyberspace. Following that, we proposed a user's permissions reasoning method based on reinforcement learning. All permissions in cyberspace are represented as nodes, and an agent is trained to find all permissions that user can have according to user's initial permissions and cyberspace KG. We set 10 reward setting rules based on the features of cyberspace KG in the reinforcement learning of reward information setting, so that the agent can better locate user's all permissions and avoid blindly finding user's permissions. The results of the experiments showed that the proposed method can successfully reason about user's permissions and increase the intelligence level of the user's permissions reasoning method. At the same time, the F1 value of the proposed method is 6% greater than that of the Translating Embedding (TransE) method.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 10295
Price includes VAT (Japan)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 12869
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Bai, W., Pan, Z., Guo, S., Chen, Z., Xia, S.: MDC-checker: A novel network risk assessment framework for multiple domain conjurations. Comput. Secur. 86(Sep.), 388–401 (2019)

    Google Scholar 

  2. Eder, J.S.: Knowledge graph based search system. US (2012)

    Google Scholar 

  3. Guo, L., Wen, S., Wang, D., Wang, S., Wang, Q., Liu, H.: Overview of cyber threat intelligence description. In: International Conference on Applications and Techniques in Cyber Security and Intelligence, pp. 343–350. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-79197-1

  4. Zhao, H.: Knowledge graph oriented information extraction. Hans J. Data Mining 10(4), 282–302 (2020)

    Article  Google Scholar 

  5. Wang, X., Zou, L., Wang, C., Peng, P., Feng, Z.: Research on knowledge graph data management: a survey. J. Softw. 30(7), 2140 (2019)

    Google Scholar 

  6. Undercoffer, J., Joshi, A., Pinkston, J.: Modeling computer attacks: an ontology for intrusion detection. In: Vigna, G., Kruegel, C., Jonsson, E. (eds.) RAID 2003. LNCS, vol. 2820, pp. 113–135. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-540-45248-5_7

    Chapter  Google Scholar 

  7. Joshi, A., Lal, R., Finin, T., Joshi, A.: Extracting cybersecurity related linked data from text. In: 2013 IEEE Seventh International Conference on Semantic Computing, pp. 252–259. IEEE (2013)

    Google Scholar 

  8. More, S., Matthews, M., Joshi, A., Finin, T.: A knowledge-based approach to intrusion detection modeling. In: 2012 IEEE Symposium on Security and Privacy Workshops (2012)

    Google Scholar 

  9. Yang, Y., Xu, B., Hu, J., Tong, M., Zhang, P., Zheng, L.: Accurate and ancient method for constructing domain knowledge graph. J. Softw. 29(10), 2931–2947 (2018)

    Google Scholar 

  10. He, Z.H.: Research on knowledge extraction method for Chinese knowledge graph construction, Doctoral thesis. National University of Defense Technology (2017)

    Google Scholar 

  11. Lal, R.: Information extraction of cyber security related terms and concepts from unstructured text. Ph.D. thesis, University of Maryland, Baltimore County (2013)

    Google Scholar 

  12. Mulwad, V., Li, W., Joshi, A., Finin, T., Viswanathan, K.: Extracting information about security vulnerabilities from web text. In: 2011EEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology, vol. 3, pp. 257–260. IEEE (2011)

    Google Scholar 

  13. Hui-Xiang, G.U., Yong, Y.U.: Domain ontology and knowledge inference based semantic web application. J. Shanghai Jiaotong Univ. (Chin. Ed.) 38(4), 583–585 (2004)

    Google Scholar 

  14. Paulheim, H., Bizer, C.: Type inference on noisy RDF data. In: Alani, H., et al. (eds.) ISWC 2013. LNCS, vol. 8218, pp. 510–525. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-41335-3_32

    Chapter  Google Scholar 

  15. Gangemi, A., Nuzzolese, A.G., Presutti, V., Draicchio, F., Musetti, A., Ciancarini, P.: Automatic typing of dbpedia entities. In: Cudré-Mauroux, P., et al. (eds.) ISWC 2012. LNCS, vol. 7649, pp. 65–81. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-35176-1_5

    Chapter  Google Scholar 

  16. Kliegr, T.: Linked hypernyms: enriching dbpedia with targeted hypernym discovery. J. Web Semant. 31, 59–69 (2015)

    Article  Google Scholar 

  17. Xiong, W., Hoang, T.-L.-G., Wang, W.Y.: Deeppath: a reinforcement learning method for knowledge graph reasoning. In: EMNLP (2017)

    Google Scholar 

  18. Quan, W., Jing, L., Luo, Y., Wang, B., Lin, C.Y.: Knowledge base completion via coupled path ranking. In: Meeting of the Association for Computational Linguistics (2016)

    Google Scholar 

Download references

Acknowledgements

This work was supported by the National Science Foundation for Young Scientists of China (No. 62106281).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wei Qin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Pan, Y. et al. (2022). User's Permission Reasoning Method Based on Knowledge Graph Reward Guidance Reinforcement Learning in Data Center. In: Tan, Y., Shi, Y. (eds) Data Mining and Big Data. DMBD 2022. Communications in Computer and Information Science, vol 1744. Springer, Singapore. https://doi.org/10.1007/978-981-19-9297-1_4

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-9297-1_4

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-9296-4

  • Online ISBN: 978-981-19-9297-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics