Datasets:
language:
- en
license: mit
tags:
- knowledge-graph
- rdf
- owl
- ontology
- cybersecurity
annotations_creators:
- expert-generated
pretty_name: D3FEND
size_categories:
- 100K<n<1M
task_categories:
- graph-ml
dataset_info:
features:
- name: subject
dtype: string
- name: predicate
dtype: string
- name: object
dtype: string
config_name: default
splits:
- name: train
num_bytes: 46899451
num_examples: 231842
dataset_size: 46899451
viewer: false
D3FEND: A knowledge graph of cybersecurity countermeasures
Overview
D3FEND encodes a countermeasure knowledge base in the form of a knowledge graph. It meticulously organizes key concepts and relations in the cybersecurity countermeasure domain, linking each to pertinent references in the cybersecurity literature.
Use-cases
Researchers and cybersecurity enthusiasts can leverage D3FEND to:
- Develop sophisticated graph-based models.
- Fine-tune large language models, focusing on cybersecurity knowledge graph completion.
- Explore the complexities and nuances of defensive techniques, mappings to MITRE ATT&CK, weaknesses (CWEs), and cybersecurity taxonomies.
- Gain insight into ontology development and modeling in the cybersecurity domain.
Preprocessing
Source:
Building and Verification:
- Construction: The ontology, denoted as
d3fend-full.owl
, was built from the beta version of the D3FEND ontology referenced above using documented README in d3fend-ontology. This includes the CWE extensions. - Importation and Reasoning: Imported into Protege version 5.6.1, utilizing the Pellet reasoner plugin for logical reasoning and verification.
- Coherence Check: Utilized the Debug Ontology plugin in Protege to ensure the ontology's coherence and consistency.
Exporting, Transformation, and Compression:
Note: The following steps were performed using Apache Jena's command line tools. (https://jena.apache.org/documentation/tools/)
- Exporting Inferred Axioms: Post-verification, I exported inferred axioms along with asserted axioms and annotations. Detailed Process
- Filtering: The materialized ontology was filtered using
d3fend.rq
to retain relevant triples. - Format Transformation: Subsequently transformed to Turtle and
N-Triples formats for diverse usability. Note: I export in Turtle
first because it is easier to read and verify. Then I convert to
N-Triples.
arq --query=d3fend.rq --data=d3fend.owl --results=turtle > d3fend.ttl riot --output=nt d3fend.ttl > d3fend.nt
- Compression: Compressed the resulting ontology files using gzip.
How to Load the Dataset:
You can load this dataset using the Hugging Face Datasets library with the following Python code:
from datasets import load_dataset
dataset = load_dataset('wikipunk/d3fend', split='train')
Acknowledgements
This ontology is developed by MITRE Corporation and is licensed under the MIT license. I would like to thank the authors for their work which has opened my eyes to a new world of cybersecurity modeling.
If you are a cybersecurity expert please consider contributing to D3FEND.