
tion to support improved security planning. To achieve
this, we developed an architecture that leverages a sep-
arate Vulnerability Knowledge Graph (VKG), which
provides fine-grained, structured insights into system
weaknesses. Unlike traditional approaches, our VKG is
built on a comprehensive, in-depth vulnerability dataset
and designed to function independently from the AG
while enabling seamless knowledge transfer. We for-
mally defined the structure of both graphs along with
the algorithms for generation and querying, ensuring a
granular-level integration of vulnerability attributes into
the AG without introducing inter-dependencies. The fu-
ture goal is to develop automated mechanisms for up-
dating the VKG with emerging vulnerabilities, ensur-
ing its continued relevance and accuracy. Additionally,
incorporating a feedback loop from AG to VKG could
enable dynamic refinement of vulnerability insights, fa-
cilitating more advanced reasoning and analysis.
REFERENCES
Anders, Lison, P., and Moonen, L. (2023). Construct-
ing a knowledge graph from textual descriptions of
software vulnerabilities in the national vulnerability
database. In Alum
¨
ae, T. and Fishel, M., editors,
Proceedings of the 24th Nordic Conference on Com-
putational Linguistics (NoDaLiDa), pages 386–391,
T
´
orshavn, Faroe Islands. University of Tartu Library.
Bashir, S. K., Podder, R., Sreedharan, S., Ray, I., and Ray,
I. (2024). Resiliency graphs: Modelling the interplay
between cyber attacks and system failures through ai
planning. In 2024 IEEE 6th International Conference
on Trust, Privacy and Security in Intelligent Systems,
and Applications (TPS-ISA), pages 292–302. IEEE.
Dewri, R., Poolsappasit, N., Ray, I., and Whitley, D. (2007).
Optimal security hardening using multi-objective op-
timization on attack tree models of networks. In Pro-
ceedings of the 14th ACM conference on Computer
and communications security, pages 204–213.
Inokuchi, M., Ohta, Y., Kinoshita, S., Yagyu, T., Stan, O.,
Bitton, R., Elovici, Y., and Shabtai, A. (2019). De-
sign procedure of knowledge base for practical attack
graph generation. In Proceedings of the 2019 ACM
Asia Conference on Computer and Communications
Security, Asia CCS ’19, page 594–601, New York,
NY, USA. Association for Computing Machinery.
Jia, F., Hong, J. B., and Kim, D. S. (2015). Towards
automated generation and visualization of hierarchi-
cal attack representation models. In 2015 IEEE In-
ternational Conference on Computer and Informa-
tion Technology; Ubiquitous Computing and Commu-
nications; Dependable, Autonomic and Secure Com-
puting; Pervasive Intelligence and Computing, pages
1689–1696. IEEE.
Jing, J. T. W., Yong, L. W., Divakaran, D. M., and Thing,
V. L. L. (2017). Augmenting mulval with automated
extraction of vulnerabilities descriptions. In TENCON
2017 - 2017 IEEE Region 10 Conference, pages 476–
481.
Lallie, H. S., Debattista, K., and Bal, J. (2017). An em-
pirical evaluation of the effectiveness of attack graphs
and fault trees in cyber-attack perception. IEEE
Transactions on Information Forensics and Security,
13(5):1110–1122.
Liu, X., Guo, X., and Gu, W. (2025). Seckg2vec: A novel
security knowledge graph relational reasoning method
based on semantic and structural fusion embedding.
Computers & Security, 149:104192.
Ou, X., Boyer, W. F., and McQueen, M. A. (2006). A scal-
able approach to attack graph generation. In Proceed-
ings of the 13th ACM conference on Computer and
communications security, pages 336–345.
Ou, X., Govindavajhala, S., and Appel, A. W. (2005). Mul-
VAL: A logic-based network security analyzer. In
14th USENIX Security Symposium (USENIX Security
05), Baltimore, MD. USENIX Association.
Poolsappasit, N., Dewri, R., and Ray, I. (2011). Dy-
namic security risk management using bayesian attack
graphs. IEEE Transactions on Dependable and Secure
Computing, 9(1):61–74.
Ray, I., Sreedharan, S., Podder, R., Bashir, S. K., and Ray, I.
(2023). Explainable ai for prioritizing and deploying
defenses for cyber-physical system resiliency. In 2023
5th IEEE International Conference on Trust, Privacy
and Security in Intelligent Systems and Applications
(TPS-ISA), pages 184–192. IEEE.
Yin, J., Hong, W., Wang, H., Cao, J., Miao, Y., and Zhang,
Y. (2024). A compact vulnerability knowledge graph
for risk assessment. ACM Trans. Knowl. Discov. Data,
18(8).
Zhang, Y., Du, T., Ma, Y., Wang, X., Xie, Y., Yang, G.,
Lu, Y., and Chang, E.-C. (2024). Attackg+:boosting
attack knowledge graph construction with large lan-
guage models. arXiv 2405.04753, Available from
https://arxiv.org/abs/2405.04753.
SECRYPT 2025 - 22nd International Conference on Security and Cryptography
428