hajarmerbouh/Cybersecurity-Knowledge-graph

The repository consists of : Construction of the corpus, Named Entity Recognition , Relationship Extraction , Construction of knowledge graph using py2neo , Analysis on the constructed KG with cypher commands

21
/ 100
Experimental

This project helps cybersecurity analysts organize and understand complex threat intelligence information from various reports. It takes unstructured text documents related to cybersecurity incidents, vulnerabilities, or threats as input, and outputs a structured knowledge graph that shows how different entities like specific threats, actors, and vulnerabilities are connected. Security operations center (SOC) analysts or threat intelligence researchers would use this.

No commits in the last 6 months.

Use this if you need to transform large volumes of unstructured cybersecurity text data into an organized, queryable knowledge graph to enhance threat analysis and incident response.

Not ideal if you're looking for an out-of-the-box solution for real-time threat detection or automated vulnerability assessment without needing to build a custom knowledge graph.

cyber-threat-intelligence security-operations incident-response vulnerability-management threat-modeling
No License Stale 6m No Package No Dependents
Maintenance 0 / 25
Adoption 7 / 25
Maturity 8 / 25
Community 6 / 25

How are scores calculated?

Stars

36

Forks

2

Language

Jupyter Notebook

License

Last pushed

Dec 05, 2022

Commits (30d)

0

Get this data via API

curl "https://pt-edge.onrender.com/api/v1/quality/nlp/hajarmerbouh/Cybersecurity-Knowledge-graph"

Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.