no code implementations • 3 Sep 2021 • Ryan Christian, Sharmishtha Dutta, Youngja Park, Nidhi Rastogi
This ontology forms the basis for the malware threat intelligence knowledge graph, MalKG, which we exemplify using three different, non-overlapping demonstrations.
no code implementations • 10 Feb 2021 • Sharmishtha Dutta, Nidhi Rastogi, Destin Yee, Chuqiao Gu, Qicheng Ma
Cyber threat and attack intelligence information are available in non-standard format from heterogeneous sources.
no code implementations • 10 Feb 2021 • Nidhi Rastogi, Sharmishtha Dutta, Mohammed J. Zaki, Alex Gittens, Charu Aggarwal
The information is extracted and stored in a structured format using knowledge graphs such that the semantics of the threat intelligence can be preserved and shared at scale with other security analysts.
1 code implementation • 20 Jun 2020 • Nidhi Rastogi, Sharmishtha Dutta, Mohammed J. Zaki, Alex Gittens, Charu Aggarwal
The knowledge graph that uses MALOnt is instantiated from a corpus comprising hundreds of annotated malware threat reports.