GithubHelp home page GithubHelp logo

ashs21 / cybersecurity-ontology-scoring-system Goto Github PK

View Code? Open in Web Editor NEW
1.0 1.0 0.0 1010 KB

final-year-project-ASHS21 created by GitHub Classroom

JavaScript 14.59% HTML 69.84% Python 15.57%

cybersecurity-ontology-scoring-system's Introduction

๐ŸŒ Welcome to the Cyber Eye

An undergraduate-final-year-project.

Welcome to your guide for navigating through our repositories and setting up the project. Follow the steps below to get everything up and running smoothly. ๐Ÿš€

๐Ÿ“‘ Table of Contents

๐Ÿ“‹ Pre-requisites

Ensure you have the following software installed:

  • Python3 ๐Ÿ
  • Neo4j ๐ŸŒ
  • Protege ๐Ÿฆ‰

๐Ÿ—‚ Project Layout

Here's an overview to help you set up the software:

  • Cloning the GitHub repository ๐Ÿ“ฆ
  • Installing Protege (Ontology Editor) ๐Ÿ“š
  • Installing Neo4j Desktop (GraphDB) ๐Ÿ–ฅ
  • Running the Dashboard ๐Ÿ“Š

๐Ÿ“ฆ Cloning the GitHub Repository

Clone the repository including submodules with the following command:

git clone --recurse-submodules https://github.com/uol-feps-soc-comp3931-2324-classroom/final-year-project-ASHS21.git

Navigate to the directory:

cd final-year-project-ASHS21/

๐Ÿ“š Installing Protege (Ontology Editor)

Choose the installation guide based on your operating system:

For beginners: Getting Started with Protege

๐Ÿ–ฅ Installing Neo4j Desktop (GraphDB)

Download Neo4j Desktop for your OS: Download Neo4j Desktop

๐Ÿ“Š Running the Dashboard and the Evaluation

Start by navigating to the working directory inside the repo:

cd csonto/target/csonto/

Install the required Python packages:

pip install -r requirements.txt

Ensure the Neo4j database is running, then launch the dashboard:

streamlit run streamlit_app.py

Follow the pop-up page or the link on the terminal.

๐Ÿ“‹ Running the Evaluation

Navigate to the main directory in the repo:

cd csonto/target/csonto/

Go to the evaluation directory:

cd evaluation/

Execute the following files to evaluate the ontology and knowledge graph:

python3 modelEval.py 
python3 ontologyEval.py
python3 kgEval.py
python3 ML-LinkPredict.py

๐Ÿ“˜ Ontology Guidance

OOPS Results

Follow this guide to navigate through the various ontology files within the project repository.

๐Ÿ“‚ Accessing Ontology Files

To begin working with the ontology files, please ensure you are in the correct directory within the repository.

  1. Navigate to the ontology directory by running the following command in your terminal:

    cd csonto/target/csonto/src/ontology/
  2. Within this directory, you will find several files named csonto-edit. You can open any of these files using Protege to view or modify the ontology.

๐Ÿ›  Scripts for Ontology Manipulation

If you need to work with scripts related to the ontology, follow these steps:

  1. If you're already in the ontology directory, navigate to the scripts directory by executing:

    cd csonto/target/csonto/src/scripts/
  2. StatusChecker Script: This script is responsible for checking the status of various policies within the ontology.

  3. OntologyBuilder Script: This script aids in building and evolving the ontology throughout the development process.

  4. Onto_Definitions & Updates Script: Use this script for defining and updating instances within the ontology.

The ontology documentation

To find the full ontology documentation, follow this link: CyberSecurity Ontology Docs Or, find the alternative docs : Alternative Ontology Docs

๐ŸŒ Knowledge Graph Guide

Welcome to the guide on accessing the Cybersecurity Knowledge Graph (CSKG) via the Neo4j Desktop. Follow these steps to navigate and execute queries within the Neo4j browser.

๐Ÿš€ Getting Started

Once you have opened Neo4j Desktop, proceed to the Neo4j Browser to start interacting with the database.

๐Ÿ“Š Querying the CSKG

To explore the complete Cybersecurity Knowledge Graph, execute the following Cypher query. This query retrieves all nodes connected by either REPORTS_TO or PART_OF relationships, providing a comprehensive view of the graph.

MATCH (n:CyberSecurityScore)<-[r:REPORTS_TO]-(m) RETURN n, r, m 
UNION 
MATCH (n)<-[r:PART_OF]-(m) RETURN n, r, m

๐Ÿ” Focused Query for Core CSKG

If you are interested in a more focused view of the CSKG's core elements, use the query below. This query specifically retrieves nodes and relationships where nodes report directly to a CyberSecurityScore.

MATCH (n:CyberSecurityScore)<-[r:REPORTS_TO]-(m) RETURN n, r, m

Depending on your needs for analysis or data visualization, you can utilize these queries to delve into different aspects of the CSKG.

cybersecurity-ontology-scoring-system's People

Contributors

ashs21 avatar github-classroom[bot] avatar

Stargazers

 avatar

Watchers

Lucian avatar

cybersecurity-ontology-scoring-system's Issues

Develop the dashboard

Implement the dashboard using streamlit, and show the retrieval of the data using the SPARQL and RDF and the Cypher for the KG.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.