ThreatInsight: Innovating Early Threat Detection Through Threat-Intelligence-Driven Analysis and Attribution

被引:0
|
作者
Wang, Ziyu [1 ]
Zhou, Yinghai [1 ]
Liu, Hao [1 ]
Qiu, Jing [1 ]
Fang, Binxing [1 ]
Tian, Zhihong [1 ]
机构
[1] Guangzhou Univ, Cyberspace Inst Adv Technol, Guangzhou 510006, Peoples R China
基金
中国国家自然科学基金;
关键词
Semantics; Threat assessment; Databases; Data mining; Computer security; Data models; Real-time systems; IP networks; Complexity theory; Accuracy; Advanced persistent threats; attacker attribution; HoneyPoint; knowledge graph; threat intelligence; threat knowledge; LOAD; MANAGEMENT;
D O I
10.1109/TKDE.2024.3474792
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The complexity and ongoing evolution of Advanced Persistent Threats (APTs) compromise the efficacy of conventional cybersecurity measures. Firewalls, intrusion detection systems, and antivirus software, which are dependent on static rules and predefined signatures, are increasingly ineffective against these sophisticated threats. Moreover, the use of system audit logs for threat hunting involves a retrospective review of cybersecurity incidents to reconstruct attack paths for attribution, which affects the timeliness and effectiveness of threat detection and response. Even when the attacker is identified, this method does not prevent cyber attacks. To address these challenges, we introduce ThreatInsight, a novel early-stage threat detection solution that minimizes reliance on system audit logs. ThreatInsight detects potential threats by analyzing IPs captured from HoneyPoints. These IPs are processed through threat data mining and threat feature modeling. By employing fact-based and semantic reasoning techniques based on the APT Threat Intelligence Knowledge Graph (APT-TI-KG), ThreatInsight identifies and attributes attackers. The system generates analysis reports detailing the threat knowledge concerning IPs and attributed attackers, equipping analysts with actionable insights and defense strategies. The system architecture includes modules for HoneyPoint IP extraction, Threat Intelligence (TI) data analysis, attacker attribution, and analysis report generation. ThreatInsight facilitates real-time analysis and the identification of potential threats at early stages, thereby enhancing the early detection capabilities of cybersecurity defense systems and improving overall threat detection and proactive defense effectiveness.
引用
收藏
页码:9388 / 9402
页数:15
相关论文
共 50 条
  • [21] A New Social Media-Driven Cyber Threat Intelligence
    Sufi, Fahim
    ELECTRONICS, 2023, 12 (05)
  • [22] Gathering Threat Intelligence through Computer Network Deception
    Urias, Vincent E.
    Stout, William M. S.
    Lin, Han W.
    2016 IEEE SYMPOSIUM ON TECHNOLOGIES FOR HOMELAND SECURITY (HST), 2016,
  • [23] A Framework for Dark Web Threat Intelligence Analysis
    Zhang, Xuan
    Chow, K. P.
    INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2018, 10 (04) : 108 - 117
  • [24] Cyber Threat Analysis and Trustworthy Artificial Intelligence
    Wang, Shuangbao Paul
    Arafin, Md Tanvir
    Osuagwu, Onyema
    Wandji, Ketchiozo
    2022 6TH INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY, CSP 2022, 2022, : 86 - 90
  • [25] Trustworthy Artificial Intelligence for Cyber Threat Analysis
    Wang, Shuangbao Paul
    Mullin, Paul A.
    INTELLIGENT SYSTEMS AND APPLICATIONS, VOL 1, 2023, 542 : 493 - 504
  • [26] Emerging explosive threat analysis for using threat anomaly detection (ThreAD)
    Languirand, Eric R.
    Polk, Amee L.
    Kauzlarich, Michael F.
    Buchman, Jacob A.
    Collins, Matthew D.
    CHEMICAL, BIOLOGICAL, RADIOLOGICAL, NUCLEAR, AND EXPLOSIVES, CBRNE SENSING XXV, 2024, 13056
  • [27] Interpreting the social scene: threat detection and cost attribution in social anxiety
    Button, K. S.
    Munafo, M. R.
    Lewis, G.
    EUROPEAN NEUROPSYCHOPHARMACOLOGY, 2010, 20 : S533 - S533
  • [28] Data-driven approach for automatic telephony threat analysis and campaign detection
    Bordjiba, Houssem Eddine
    Karbab, ElMouatez Billah
    Debbabi, Mourad
    DIGITAL INVESTIGATION, 2018, 24 : S131 - S141
  • [29] Cyber Threat Detection and Application Analysis
    Yang, Shuangmao
    Wang, Ji
    Zhang, Jing
    Li, Hao
    2016 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY PROCEEDINGS - CYBERC 2016, 2016, : 46 - 49
  • [30] ATLAS: A Practical Attack Detection and Live Malware Analysis System for IoT Threat Intelligence
    Aung, Yan Lin
    Ochoa, Martin
    Zhou, Jianying
    INFORMATION SECURITY, ISC 2022, 2022, 13640 : 319 - 338