
ACKNOWLEDGMENTS
This work was partly supported by the HORIZON
Europe Framework Programme by the MUR PRIN-
2022-PNRR ASSISTANTS (P2022WEAH7) project
funded under the EU RESTART program.
REFERENCES
abuse.ch (2025). Malwarebazaar - malware samples and
feeds.
Bhalekar, P. M. and Saini, J. R. (2024). Comprehensive
exploration of the role of graph databases like neo4j
in cyber security. In 2024 International Conference on
Emerging Smart Computing and Informatics (ESCI),
pages 1–4. IEEE.
Bolton, J., Elluri, L., and Joshi, K. P. (2023). An overview
of cybersecurity knowledge graphs mapped to the
mitre att&ck framework domains. In 2023 IEEE In-
ternational Conference on Intelligence and Security
Informatics (ISI), pages 01–06. IEEE.
Canary, R. (2025). Threat detection report - top att&ck tech-
niques.
Chen, S., Hwang, R., Ali, A., Lin, Y., Wei, Y., and
Pai, T. (2024). Improving quality of indicators of
compromise using STIX graphs. Comput. Secur.,
144:103972.
Corporation, M. (2025a). Common Attack Pattern Enumer-
ation and Classification (CAPEC).
Corporation, M. (2025b). MITRE ATT&CK.
Corporation, M. (2025c). Mitre cti github repository.
Corporation, M. (2025d). MITRE DEF3ND.
Elastic (2025). Elasticsearch - distributed, restful search and
analytics engine.
Fender, A., Emad, N., Petiton, S. G., Eaton, J., and Naumov,
M. (2017). Parallel jaccard and related graph clus-
tering techniques. In Alexandrov, V., Geist, A., and
Dongarra, J. J., editors, Proceedings of the 8th Work-
shop on Latest Advances in Scalable Algorithms for
Large-Scale Systems, ScalA@SC 2017, Denver, CO,
USA, November 13, 2017, pages 4:1–4:8. ACM.
for Threat-Informed Defense, C. (2025). Top 15 techniques
sightings ecosystem.
Gleich, D. F. (2015). Pagerank beyond the web. SIAM Rev.,
57(3):321–363.
Habaybeh, N. and Marshall, A. M. Towards a historic mal-
ware frequency database. Available at SSRN 4392182.
Lewis, P., Perez, E., Piktus, A., Petroni, F., Karpukhin,
V., Goyal, N., K
¨
uttler, H., Lewis, M., Yih, W.-t.,
Rockt
¨
aschel, T., et al. (2020). Retrieval-augmented
generation for knowledge-intensive nlp tasks. Ad-
vances in Neural Information Processing Systems,
33:9459–9474.
Li, H., Shi, Z., Pan, C., Zhao, D., and Sun, N. (2024). Cy-
bersecurity knowledge graphs construction and qual-
ity assessment. Complex & Intelligent Systems,
10(1):1201–1217.
Li, J., Li, J., Xie, C., Liang, Y., Qu, K., Cheng, L., and Zhao,
Z. (2023a). Pipckg-bs: A method to build cybersecu-
rity knowledge graph for blockchain systems via the
pipeline approach. Journal of Circuits, Systems and
Computers, 32(16):2350274.
Li, Z.-X., Li, Y.-J., Liu, Y.-W., Liu, C., and Zhou, N.-X.
(2023b). K-ctiaa: automatic analysis of cyber threat
intelligence based on a knowledge graph. Symmetry,
15(2):337.
Liu, Z., Sun, Z., Chen, J., Zhou, Y., Yang, T., Yang, H., and
Liu, J. (2020). Stix-based network security knowledge
graph ontology modeling method. In ICGDA 2020:
3rd International Conference on Geoinformatics and
Data Analysis, Marseille, France, April 15-17, 2020,
pages 152–157. ACM.
Mandiant (2025a). Capa rules - mandiant.
Mandiant (2025b). M-trends report.
MITRE (2025). Top 10 lists.
Morato, D., Berrueta, E., Maga
˜
na, E., and Izal, M. (2018).
Ransomware early detection by the analysis of file
sharing traffic. Journal of Network and Computer Ap-
plications, 124:14–32.
Neo4j (2021). Graphs for cybersecurity: Defending against
sophisticated attacks.
OASIS (2020). Stix version 2.1.
Pontecorvi, M. and Ramachandran, V. (2015). A faster
algorithm for fully dynamic betweenness centrality.
CoRR, abs/1506.05783.
Project, M. (2025a). Exploit mapping to maec.
Project, M. (2025b). Malware behavior catalog stix reposi-
tory.
Rapid7 (2025). Metasploit framework.
Reading, D. (2021). Picking the right database tech for cy-
bersecurity defense.
Ren, Y., Xiao, Y., Zhou, Y., Zhang, Z., and Tian, Z. (2022).
Cskg4apt: A cybersecurity knowledge graph for ad-
vanced persistent threat organization attribution. IEEE
Transactions on Knowledge and Data Engineering.
Security, P. (2025). The top ten mitre att&ck techniques.
Shaddy43 (2025). Emotet malware analysis.
Sheikhalishahi, M., Saracino, A., Martinelli, F., and Marra,
A. L. (2022). Privacy preserving data sharing and
analysis for edge-based architectures. Int. J. Inf. Sec.,
21(1):79–101.
SigmaHQ (2025). Sigma rules - generic signature format
for siem systems.
Sikos, L. F. (2023). Cybersecurity knowledge graphs.
Knowledge and Information Systems, 65(9):3511–
3531.
VirusShare.com (2025). Virusshare - collection of malware
samples.
VirusTotal (2025). Virustotal - free online virus, malware
and url scanner.
Wang, W., Zhou, H., Li, K., Tu, Z., and Liu, F. (2021).
Cyber-attack behavior knowledge graph based on
capec and cwe towards 6g. In International Sym-
posium on Mobile Internet Security, pages 352–364.
Springer.
SECRYPT 2025 - 22nd International Conference on Security and Cryptography
502