ThreatInsight: Innovating Early Threat Detection Through Threat-Intelligence-Driven Analysis and Attribution

被引:0
|
作者
Wang, Ziyu [1 ]
Zhou, Yinghai [1 ]
Liu, Hao [1 ]
Qiu, Jing [1 ]
Fang, Binxing [1 ]
Tian, Zhihong [1 ]
机构
[1] Guangzhou Univ, Cyberspace Inst Adv Technol, Guangzhou 510006, Peoples R China
基金
中国国家自然科学基金;
关键词
Semantics; Threat assessment; Databases; Data mining; Computer security; Data models; Real-time systems; IP networks; Complexity theory; Accuracy; Advanced persistent threats; attacker attribution; HoneyPoint; knowledge graph; threat intelligence; threat knowledge; LOAD; MANAGEMENT;
D O I
10.1109/TKDE.2024.3474792
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The complexity and ongoing evolution of Advanced Persistent Threats (APTs) compromise the efficacy of conventional cybersecurity measures. Firewalls, intrusion detection systems, and antivirus software, which are dependent on static rules and predefined signatures, are increasingly ineffective against these sophisticated threats. Moreover, the use of system audit logs for threat hunting involves a retrospective review of cybersecurity incidents to reconstruct attack paths for attribution, which affects the timeliness and effectiveness of threat detection and response. Even when the attacker is identified, this method does not prevent cyber attacks. To address these challenges, we introduce ThreatInsight, a novel early-stage threat detection solution that minimizes reliance on system audit logs. ThreatInsight detects potential threats by analyzing IPs captured from HoneyPoints. These IPs are processed through threat data mining and threat feature modeling. By employing fact-based and semantic reasoning techniques based on the APT Threat Intelligence Knowledge Graph (APT-TI-KG), ThreatInsight identifies and attributes attackers. The system generates analysis reports detailing the threat knowledge concerning IPs and attributed attackers, equipping analysts with actionable insights and defense strategies. The system architecture includes modules for HoneyPoint IP extraction, Threat Intelligence (TI) data analysis, attacker attribution, and analysis report generation. ThreatInsight facilitates real-time analysis and the identification of potential threats at early stages, thereby enhancing the early detection capabilities of cybersecurity defense systems and improving overall threat detection and proactive defense effectiveness.
引用
收藏
页码:9388 / 9402
页数:15
相关论文
共 50 条
  • [31] Improving Forensic Triage Efficiency through Cyber Threat Intelligence
    Serketzis, Nikolaos
    Katos, Vasilios
    Ilioudis, Christos
    Baltatzis, Dimitrios
    Pangalos, Georgios
    FUTURE INTERNET, 2019, 11 (07)
  • [32] Acquiring Cyber Threat Intelligence through Security Information Correlation
    Settanni, Giuseppe
    Shovgenya, Yegor
    Skopik, Florian
    Graf, Roman
    Wurzenberger, Markus
    Fiedler, Roman
    2017 3RD IEEE INTERNATIONAL CONFERENCE ON CYBERNETICS (CYBCONF), 2017, : 415 - 421
  • [33] Open source threat intelligence discovery based on topic detection
    Li, Dong
    Zhou, Xiao
    Xue, Ao
    2020 29TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN 2020), 2020,
  • [34] A Novel Threat Intelligence Detection Model Using Neural Networks
    Salem, Maher
    Al-Tamimi, Abdel-Karim
    IEEE ACCESS, 2022, 10 : 131229 - 131245
  • [35] Unveiling Shadows: Harnessing Artificial Intelligence for Insider Threat Detection
    Yilmaz, Erhan
    Can, Ozgu
    ENGINEERING TECHNOLOGY & APPLIED SCIENCE RESEARCH, 2024, 14 (02) : 13341 - 13346
  • [36] TIPCE: A Longitudinal Threat Intelligence Platform Comprehensiveness Analysis
    Satvat, Kiavash
    Gjomemo, Rigel
    Venkatakrishnan, V. N.
    PROCEEDINGS OF THE FOURTEENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, CODASPY 2024, 2024, : 349 - 360
  • [37] CTI View: APT Threat Intelligence Analysis System
    Zhou, Yinghai
    Tang, Yi
    Yi, Ming
    Xi, Chuanyu
    Lu, Hai
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [38] Reading the Tea Leaves: A Comparative Analysis of Threat Intelligence
    Li, Vector Guo
    Dunn, Matthew
    Pearce, Paul
    McCoy, Damon
    Voelker, Geoffrey M.
    Savage, Stefan
    Levchenko, Kirill
    PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, 2019, : 851 - 867
  • [39] Algorithm For Early Threat Detection By Suspicious Behavior Representation
    Martinez, D.
    Loaiza, H.
    Caicedo, E.
    IEEE LATIN AMERICA TRANSACTIONS, 2020, 18 (05) : 825 - 832
  • [40] Insider Threat Detection Through Attributed Graph Clustering
    Gamachchi, Anagi
    Boztas, Serdar
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 112 - 119