Datasets:
update readme
Browse files- README.md +59 -22
- requirements.txt +1 -0
README.md
CHANGED
|
@@ -9,7 +9,6 @@ tags:
|
|
| 9 |
- ontology
|
| 10 |
- cybersecurity
|
| 11 |
annotations_creators:
|
| 12 |
-
- crowdsourced
|
| 13 |
- expert-generated
|
| 14 |
pretty_name: D3FEND
|
| 15 |
size_categories:
|
|
@@ -33,35 +32,73 @@ dataset_info:
|
|
| 33 |
viewer: false
|
| 34 |
---
|
| 35 |
|
| 36 |
-
# D3FEND
|
|
|
|
| 37 |
|
| 38 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 39 |
|
| 40 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 41 |
|
| 42 |
-
|
| 43 |
-
https://github.com/d3fend/d3fend-ontology/tree/release/0.13.0-BETA-1/extensions/cwe
|
| 44 |
|
| 45 |
-
|
| 46 |
-
|
| 47 |
-
|
| 48 |
-
|
| 49 |
|
| 50 |
-
|
| 51 |
-
|
| 52 |
-
|
| 53 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 54 |
|
| 55 |
-
|
| 56 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 57 |
|
| 58 |
-
|
| 59 |
-
|
| 60 |
-
|
|
|
|
| 61 |
|
| 62 |
-
```
|
| 63 |
-
|
|
|
|
| 64 |
```
|
| 65 |
|
| 66 |
-
|
|
|
|
|
|
|
|
|
|
| 67 |
|
|
|
|
|
|
|
|
|
| 9 |
- ontology
|
| 10 |
- cybersecurity
|
| 11 |
annotations_creators:
|
|
|
|
| 12 |
- expert-generated
|
| 13 |
pretty_name: D3FEND
|
| 14 |
size_categories:
|
|
|
|
| 32 |
viewer: false
|
| 33 |
---
|
| 34 |
|
| 35 |
+
# D3FEND
|
| 36 |
+
A knowledge graph of cybersecurity countermeasures
|
| 37 |
|
| 38 |
+
### Overview
|
| 39 |
+
D3FEND encodes a countermeasure knowledge base in the form of a
|
| 40 |
+
knowledge graph. It meticulously organizes key concepts and relations
|
| 41 |
+
in the cybersecurity countermeasure domain, linking each to pertinent
|
| 42 |
+
references in the cybersecurity literature. This robust representation
|
| 43 |
+
offers a detailed insight into the complexities of cybersecurity
|
| 44 |
+
countermeasures.
|
| 45 |
|
| 46 |
+
### Use-cases
|
| 47 |
+
Researchers can leverage this dataset to develop graph-based learning
|
| 48 |
+
models, fine-tune language models for cybersecurity knowledge graph
|
| 49 |
+
completion, or explore the intricate realm of ontologies in
|
| 50 |
+
cybersecurity, gaining insights into the complexities and nuances of
|
| 51 |
+
cybersecurity countermeasures and their implications with their own
|
| 52 |
+
datasets.
|
| 53 |
|
| 54 |
+
### Preprocessing
|
|
|
|
| 55 |
|
| 56 |
+
### Source:
|
| 57 |
+
- [Dataset Repository - 0.13.0-BETA-1](https://github.com/d3fend/d3fend-ontology/tree/release/0.13.0-BETA-1)
|
| 58 |
+
- [Commit Details](https://github.com/d3fend/d3fend-ontology/commit/3dcc495879bb62cee5c4109e9b784dd4a2de3c9d)
|
| 59 |
+
- [CWE Extension](https://github.com/d3fend/d3fend-ontology/tree/release/0.13.0-BETA-1/extensions/cwe)
|
| 60 |
|
| 61 |
+
#### Building and Verification:
|
| 62 |
+
1. **Construction**: The ontology, denoted as `d3fend-full.owl`, was
|
| 63 |
+
built from the beta version of the D3FEND ontology referenced
|
| 64 |
+
above using documented README in d3fend-ontology. This includes the
|
| 65 |
+
CWE extensions.
|
| 66 |
+
2. **Importation and Reasoning**: Imported into Protege version 5.6.1,
|
| 67 |
+
utilizing the Pellet reasoner plugin for logical reasoning and
|
| 68 |
+
verification.
|
| 69 |
+
3. **Coherence Check**: Utilized the Debug Ontology plugin in Protege
|
| 70 |
+
to ensure the ontology's coherence and consistency.
|
| 71 |
|
| 72 |
+
#### Exporting, Transformation, and Compression:
|
| 73 |
+
1. **Exporting Inferred Axioms**: Post-verification, I exported
|
| 74 |
+
inferred axioms along with asserted axioms and
|
| 75 |
+
annotations. [Detailed
|
| 76 |
+
Process](https://www.michaeldebellis.com/post/export-inferred-axioms)
|
| 77 |
+
2. **Filtering**: The materialized ontology was filtered using
|
| 78 |
+
`d3fend.rq` to retain relevant triples.
|
| 79 |
+
3. **Format Transformation**: Subsequently transformed to Turtle and
|
| 80 |
+
N-Triples formats for diverse usability.
|
| 81 |
+
```shell
|
| 82 |
+
arq --query=d3fend.rq --data=d3fend.owl --results=turtle > d3fend.ttl
|
| 83 |
+
riot --output=nt d3fend.ttl > d3fend.nt
|
| 84 |
+
```
|
| 85 |
+
4. **Compression**: Compressed the resulting ontology files using
|
| 86 |
+
gzip.
|
| 87 |
|
| 88 |
+
### How to Load the Dataset:
|
| 89 |
+
|
| 90 |
+
You can load this dataset using the Hugging Face Datasets library with
|
| 91 |
+
the following Python code:
|
| 92 |
|
| 93 |
+
```python
|
| 94 |
+
from datasets import load_dataset
|
| 95 |
+
dataset = load_dataset('wikipunk/d3fend', split='train')
|
| 96 |
```
|
| 97 |
|
| 98 |
+
### Acknowledgements
|
| 99 |
+
This ontology is developed by MITRE Corporation and is licensed under
|
| 100 |
+
the MIT license. I would like to thank the authors for their work
|
| 101 |
+
which has opened my eyes to a new world of cybersecurity modeling.
|
| 102 |
|
| 103 |
+
If you are a cybersecurity expert please consider [contributing to
|
| 104 |
+
D3FEND](https://d3fend.mitre.org/contribute/).
|
requirements.txt
ADDED
|
@@ -0,0 +1 @@
|
|
|
|
|
|
|
| 1 |
+
rdflib>=6.0.0
|