Cyber Threat Intelligence meets the Analytic Tradecraft

被引:0
|
作者
Bjurling, Bjoern [1 ]
Raza, Shahid [1 ,2 ]
机构
[1] RISE Res Inst Sweden AB, Kista, Sweden
[2] Univ Glasgow, Sch Comp Sci, Glasgow, Scotland
基金
欧盟地平线“2020”;
关键词
Cyber threat intelligence; intelligence analysis; APT attribution; aggre gation; ambiguity; INFORMATION; FRAMEWORK;
D O I
10.1145/3701299
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The volumes and sophistication of cyber threats in today's cyber threat landscape have risen to levels where automated quantitative tools for Cyber Threat Intelligence (CTI) have become an indispensable part in the cyber defense arsenals. The AI and cyber security research communities are producing novel automated tools for CTI that quickly find their ways into commercial products. However, the quality of such automated intelligence products is being questioned by the intelligence community. Cyber security operators are forced to complement the automated tools with costly and time-consuming human intelligence analysis in order to improve the quality of the end product. For improving the quality, it has been suggested that researchers should incorporate methods from traditional intelligence analysis into the quantitative algorithms. This article presents a novel approach to cyber intelligence analysis called AMBARGO, which takes the inherent ambiguity of evidence into account in the analysis, using the Choquet integral, in formalizing the re-evaluation of evidence and hypotheses made by human analysts. The development of AMBARGO revolves around a cyber attribution use case, one of the hardest problems in CTI. The results of our evaluating experiments show that the robustness of AMBARGO outperforms state-of-the-art quantitative approaches to CTI in the presence of ambiguous evidence and potentially deceptive threat actor tactics. AMBARGO has thus the potential to fill a gap in the CTI state-of-the-art, which currently handles ambiguity poorly. The findings are also confirmed in a large-scale realistic experimental setting based on data from an APT campaign obtained from the MITRE ATT&CK Framework.
引用
收藏
页数:37
相关论文
共 50 条
  • [21] Quality Evaluation of Cyber Threat Intelligence Feeds
    Griffioen, Harm
    Booij, Tim
    Doerr, Christian
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2020), PT II, 2020, 12147 : 277 - 296
  • [22] Cyber Threat Analysis and Trustworthy Artificial Intelligence
    Wang, Shuangbao Paul
    Arafin, Md Tanvir
    Osuagwu, Onyema
    Wandji, Ketchiozo
    2022 6TH INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY, CSP 2022, 2022, : 86 - 90
  • [23] Cyber threat intelligence for critical infrastructure security
    Osliak, Oleksii
    Saracino, Andrea
    Martinelli, Fabio
    Mori, Paolo
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (23):
  • [24] SmartSentry: Cyber Threat Intelligence in Industrial IoT
    Sadhwani, Sapna
    Modi, Urvi Kavan
    Muthalagu, Raja
    Pawar, Pranav M.
    IEEE ACCESS, 2024, 12 : 34720 - 34740
  • [25] Using Cyber Threat Intelligence in SDN Security
    Yurekten, Ozgur
    Demirci, Mehmet
    2017 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2017, : 377 - 382
  • [26] The Role of Cyber Threat Intelligence Sharing in the Metaverse
    Dunnett K.
    Pal S.
    Jadidi Z.
    Jurdak R.
    IEEE Inter. Things Magazine, 2023, 1 (154-160): : 154 - 160
  • [27] Cyber Security Threat Intelligence Monitoring and Classification
    Wang, Bo-Xiang
    Chen, Jiann-Liang
    Yu, Chiao-Lin
    2021 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2021, : 70 - 72
  • [28] Trustworthy Artificial Intelligence for Cyber Threat Analysis
    Wang, Shuangbao Paul
    Mullin, Paul A.
    INTELLIGENT SYSTEMS AND APPLICATIONS, VOL 1, 2023, 542 : 493 - 504
  • [29] A Shared Cyber Threat Intelligence Solution for SMEs
    van Haastrecht, Max
    Golpur, Guy
    Tzismadia, Gilad
    Kab, Rolan
    Priboi, Cristian
    David, Dumitru
    Racataian, Adrian
    Brinkhuis, Matthieu
    Spruit, Marco
    ELECTRONICS, 2021, 10 (23)
  • [30] Risk Assessment of Sharing Cyber Threat Intelligence
    Albakri, Adham
    Boiten, Eerke
    Smith, Richard
    COMPUTER SECURITY, ESORICS 2020 INTERNATIONAL WORKSHOPS, 2020, 12580 : 92 - 113