ThreatInsight: Innovating Early Threat Detection Through Threat-Intelligence-Driven Analysis and Attribution

被引:0
|
作者
Wang, Ziyu [1 ]
Zhou, Yinghai [1 ]
Liu, Hao [1 ]
Qiu, Jing [1 ]
Fang, Binxing [1 ]
Tian, Zhihong [1 ]
机构
[1] Guangzhou Univ, Cyberspace Inst Adv Technol, Guangzhou 510006, Peoples R China
基金
中国国家自然科学基金;
关键词
Semantics; Threat assessment; Databases; Data mining; Computer security; Data models; Real-time systems; IP networks; Complexity theory; Accuracy; Advanced persistent threats; attacker attribution; HoneyPoint; knowledge graph; threat intelligence; threat knowledge; LOAD; MANAGEMENT;
D O I
10.1109/TKDE.2024.3474792
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The complexity and ongoing evolution of Advanced Persistent Threats (APTs) compromise the efficacy of conventional cybersecurity measures. Firewalls, intrusion detection systems, and antivirus software, which are dependent on static rules and predefined signatures, are increasingly ineffective against these sophisticated threats. Moreover, the use of system audit logs for threat hunting involves a retrospective review of cybersecurity incidents to reconstruct attack paths for attribution, which affects the timeliness and effectiveness of threat detection and response. Even when the attacker is identified, this method does not prevent cyber attacks. To address these challenges, we introduce ThreatInsight, a novel early-stage threat detection solution that minimizes reliance on system audit logs. ThreatInsight detects potential threats by analyzing IPs captured from HoneyPoints. These IPs are processed through threat data mining and threat feature modeling. By employing fact-based and semantic reasoning techniques based on the APT Threat Intelligence Knowledge Graph (APT-TI-KG), ThreatInsight identifies and attributes attackers. The system generates analysis reports detailing the threat knowledge concerning IPs and attributed attackers, equipping analysts with actionable insights and defense strategies. The system architecture includes modules for HoneyPoint IP extraction, Threat Intelligence (TI) data analysis, attacker attribution, and analysis report generation. ThreatInsight facilitates real-time analysis and the identification of potential threats at early stages, thereby enhancing the early detection capabilities of cybersecurity defense systems and improving overall threat detection and proactive defense effectiveness.
引用
收藏
页码:9388 / 9402
页数:15
相关论文
共 50 条
  • [41] On Security Countermeasures Ranking through Threat Analysis
    Nostro, Nicola
    Matteucci, Ilaria
    Ceccarelli, Andrea
    Di Giandomenico, Felicita
    Martinelli, Fabio
    Bondavalli, Andrea
    COMPUTER SAFETY, RELIABILITY, AND SECURITY, 2014, 8696 : 243 - 254
  • [42] An Enhanced Threat Intelligence Driven Hybrid Model for Information Security Risk Management
    Amin, Habib E. L.
    Samhat, Abed Ellatif
    Chamoun, Maroun
    Oueidat, Lina
    Feghali, Antoine
    PROCEEDINGS 2024 IEEE 25TH INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS, WOWMOM 2024, 2024, : 5 - 12
  • [43] A benchmark for visual analysis of insider threat detection
    Ying Zhao
    Kui Yang
    Siming Chen
    Zhuo Zhang
    Xin Huang
    Qiusheng Li
    Qi Ma
    Xinyue Luan
    Xiaoping Fan
    Science China Information Sciences, 2022, 65
  • [44] A benchmark for visual analysis of insider threat detection
    Zhao, Ying
    Yang, Kui
    Chen, Siming
    Zhang, Zhuo
    Huang, Xin
    Li, Qiusheng
    Ma, Qi
    Luan, Xinyue
    Fan, Xiaoping
    SCIENCE CHINA-INFORMATION SCIENCES, 2022, 65 (09)
  • [45] Special issue on threat detection, analysis and defense
    Li, Shujun
    Rieck, Konrad
    Woodward, Alan
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2014, 19 (03) : 163 - +
  • [46] Data-driven analytics for cyber-threat intelligence and information sharing
    Qamar, Sara
    Anwar, Zahid
    Rahman, Mohammad Ashiqur
    Al-Shaer, Ehab
    Chu, Bei-Tseng
    COMPUTERS & SECURITY, 2017, 67 : 35 - 58
  • [47] A Hybrid Analysis for Mobile Security Threat Detection
    Shi, Yong
    You, Wanqing
    Qian, Kai
    Bhattacharya, Prabir
    Qian, Ying
    2016 IEEE 7TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS MOBILE COMMUNICATION CONFERENCE (UEMCON), 2016,
  • [48] A benchmark for visual analysis of insider threat detection
    Ying ZHAO
    Kui YANG
    Siming CHEN
    Zhuo ZHANG
    Xin HUANG
    Qiusheng LI
    Qi MA
    Xinyue LUAN
    Xiaoping FAN
    Science China(Information Sciences), 2022, 65 (09) : 294 - 296
  • [49] Boosting Cyber-Threat Intelligence via Collaborative Intrusion Detection
    Guarascio, Massimo
    Cassavia, Nunziato
    Pisani, Francesco Sergio
    Manco, Giuseppe
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 135 : 30 - 43
  • [50] Artificial Intelligence Based Threat Detection in Industrial Internet of Things Environment
    Alruwaili, Fahad F.
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 73 (03): : 5809 - 5824