ThreatInsight: Innovating Early Threat Detection Through Threat-Intelligence-Driven Analysis and Attribution

被引:0
|
作者
Wang, Ziyu [1 ]
Zhou, Yinghai [1 ]
Liu, Hao [1 ]
Qiu, Jing [1 ]
Fang, Binxing [1 ]
Tian, Zhihong [1 ]
机构
[1] Guangzhou Univ, Cyberspace Inst Adv Technol, Guangzhou 510006, Peoples R China
基金
中国国家自然科学基金;
关键词
Semantics; Threat assessment; Databases; Data mining; Computer security; Data models; Real-time systems; IP networks; Complexity theory; Accuracy; Advanced persistent threats; attacker attribution; HoneyPoint; knowledge graph; threat intelligence; threat knowledge; LOAD; MANAGEMENT;
D O I
10.1109/TKDE.2024.3474792
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The complexity and ongoing evolution of Advanced Persistent Threats (APTs) compromise the efficacy of conventional cybersecurity measures. Firewalls, intrusion detection systems, and antivirus software, which are dependent on static rules and predefined signatures, are increasingly ineffective against these sophisticated threats. Moreover, the use of system audit logs for threat hunting involves a retrospective review of cybersecurity incidents to reconstruct attack paths for attribution, which affects the timeliness and effectiveness of threat detection and response. Even when the attacker is identified, this method does not prevent cyber attacks. To address these challenges, we introduce ThreatInsight, a novel early-stage threat detection solution that minimizes reliance on system audit logs. ThreatInsight detects potential threats by analyzing IPs captured from HoneyPoints. These IPs are processed through threat data mining and threat feature modeling. By employing fact-based and semantic reasoning techniques based on the APT Threat Intelligence Knowledge Graph (APT-TI-KG), ThreatInsight identifies and attributes attackers. The system generates analysis reports detailing the threat knowledge concerning IPs and attributed attackers, equipping analysts with actionable insights and defense strategies. The system architecture includes modules for HoneyPoint IP extraction, Threat Intelligence (TI) data analysis, attacker attribution, and analysis report generation. ThreatInsight facilitates real-time analysis and the identification of potential threats at early stages, thereby enhancing the early detection capabilities of cybersecurity defense systems and improving overall threat detection and proactive defense effectiveness.
引用
收藏
页码:9388 / 9402
页数:15
相关论文
共 50 条
  • [1] Cyber threat attribution using unstructured reports in cyber threat intelligence
    Irshad, Ehtsham
    Siddiqui, Abdul Basit
    EGYPTIAN INFORMATICS JOURNAL, 2023, 24 (01) : 43 - 59
  • [2] Association Analysis Of Cyber-Attack Attribution Based On Threat Intelligence
    Li, Qiang
    Yang, Zeming
    Jiang, Zhengwei
    Liu, Baoxu
    Fu, Yuxia
    PROCEEDINGS OF THE 2017 2ND JOINT INTERNATIONAL INFORMATION TECHNOLOGY, MECHANICAL AND ELECTRONIC ENGINEERING CONFERENCE (JIMEC 2017), 2017, 62 : 222 - 230
  • [3] A heterogeneous graph-based approach for cyber threat attribution using threat intelligence
    Duan, Junting
    Luo, Yujie
    Zhang, Zhicheng
    Peng, Jianjian
    2024 16TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND COMPUTING, ICMLC 2024, 2024, : 87 - 93
  • [4] Framework of Cyber Attack Attribution Based on Threat Intelligence
    Li Qiang
    Yang Zeming
    Liu Baoxu
    Jiang Zhengwei
    Yan Jian
    INTEROPERABILITY, SAFETY AND SECURITY IN IOT, 2017, 190 : 92 - 103
  • [5] Trustworthiness Attribution: Inquiry Into Insider Threat Detection
    Ho, Shuyuan Mary
    Kaarst-Brown, Michelle
    Benbasat, Izak
    JOURNAL OF THE ASSOCIATION FOR INFORMATION SCIENCE AND TECHNOLOGY, 2018, 69 (02) : 271 - 280
  • [6] A Machine Learning Driven Threat Intelligence System for Malicious URL Detection
    Chiramdasu, Rupa
    Srivastava, Gautam
    Bhattacharya, Sweta
    Reddy, Praveen Kumar
    Gadekallu, Thippa Reddy
    ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,
  • [7] Threat intelligence attribution method based on graph attention mechanism
    Wang, Ting
    Yan, Hanbing
    Lang, Bo
    Beijing Hangkong Hangtian Daxue Xuebao/Journal of Beijing University of Aeronautics and Astronautics, 2024, 50 (07): : 2293 - 2303
  • [8] NO-DOUBT: Attack Attribution Based On Threat Intelligence Reports
    Perry, Lior
    Shapira, Bracha
    Puzis, Rami
    2019 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2019, : 80 - 85
  • [9] Strengthening Intelligence Threat Analysis
    Spielmann, Karl
    INTERNATIONAL JOURNAL OF INTELLIGENCE AND COUNTERINTELLIGENCE, 2012, 25 (01) : 19 - 43
  • [10] Anomaly Detection for Physical Threat Intelligence
    Mignone, Paolo
    Malerba, Donato
    Ceci, Michelangelo
    MACHINE LEARNING AND PRINCIPLES AND PRACTICE OF KNOWLEDGE DISCOVERY IN DATABASES, ECML PKDD 2022, PT I, 2023, 1752 : 281 - 292