Inferring Recovery Steps from Cyber Threat Intelligence Reports

被引:3
|
作者
Kucsvan, Zsolt Levente [1 ]
Caselli, Marco [3 ]
Peter, Andreas [1 ,2 ]
Continella, Andrea [1 ]
机构
[1] Univ Twente, Enschede, Netherlands
[2] Carl von Ossietzky Univ Oldenburg, Oldenburg, Germany
[3] Siemens AG, Munich, Germany
关键词
CTI reports; Recovery steps; LLM; Semantic model;
D O I
10.1007/978-3-031-64171-8_17
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Within the constantly changing threat landscape, Security Operation Centers are overwhelmed by suspicious alerts, which require manual investigation. Nonetheless, given the impact and severity of modern threats, it is crucial to quickly mitigate and respond to potential incidents. Currently, security operators use predefined sets of actions from so-called playbooks to respond to incidents. However, these playbooks need to be manually created and updated for each threat, again increasing the workload of the operators. In this work, we research approaches to automate the inference of recovery steps by automatically identifying steps taken by threat actors within Cyber Threat Intelligence reports and translating these steps into recovery steps that can be defined in playbooks. Our insight is that by analyzing the text describing threats, we can effectively infer their corresponding recovery actions. To this end, we first design and implement a semantic approach based on traditional Natural Language Processing techniques, and we then study a generative approach based on recent Large Language Models (LLMs). Our experiments show that even if the LLMs were not designed to solve domainspecific problems, they outperform the precision of semantic approaches by up to 45%. We also evaluate factuality showing that LLMs tend to produce up to 90 factual errors over the entire dataset.
引用
收藏
页码:330 / 349
页数:20
相关论文
共 50 条
  • [1] Cyber threat attribution using unstructured reports in cyber threat intelligence
    Irshad, Ehtsham
    Siddiqui, Abdul Basit
    EGYPTIAN INFORMATICS JOURNAL, 2023, 24 (01) : 43 - 59
  • [2] TTPXHunter: Actionable Threat Intelligence Extraction as TTPs from Finished Cyber Threat Reports
    Rani, Nanda
    Saha, Bikash
    Maurya, Vikas
    Shukla, Sandeep kumar
    DIGITAL THREATS: RESEARCH AND PRACTICE, 2024, 5 (04):
  • [3] AttacKG: Constructing Technique Knowledge Graph from Cyber Threat Intelligence Reports
    Li, Zhenyuan
    Zeng, Jun
    Chen, Yan
    Liang, Zhenkai
    COMPUTER SECURITY - ESORICS 2022, PT I, 2022, 13554 : 589 - 609
  • [4] Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence
    Gao, Peng
    Shao, Fei
    Liu, Xiaoyuan
    Xiao, Xusheng
    Qin, Zheng
    Xu, Fengyuan
    Mittal, Prateek
    Kulkarni, Sanjeev R.
    Song, Dawn
    2021 IEEE 37TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2021), 2021, : 193 - 204
  • [5] Modeling Cyber Threat Intelligence
    Bromander, Siri
    Swimmer, Morton
    Eian, Martin
    Skjotskift, Geir
    Borg, Fredrik
    ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 273 - 280
  • [6] Cyber Threat Intelligence for "Things"
    Wagner, Thomas D.
    2019 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBER SA), 2019,
  • [7] Unifying Cyber Threat Intelligence
    Menges, Florian
    Sperl, Christine
    Pernul, Guenther
    TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, TRUSTBUS 2019, 2019, 11711 : 161 - 175
  • [8] Cyber Threat Intelligence 101
    Dror-John Röcher
    Datenschutz und Datensicherheit - DuD, 2018, 42 (10) : 623 - 628
  • [9] Automatically Labeling Cyber Threat Intelligence reports using Natural Language Processing
    Abdi, Hamza
    Bagley, Steven R.
    Furnell, Steven
    Twycross, Jamie
    PROCEEDINGS OF THE 2023 ACM SYMPOSIUM ON DOCUMENT ENGINEERING, DOCENG 2023, 2023,
  • [10] Automated Cyber Threat Intelligence Reports Classification for Early Warning of Cyber Attacks in Next Generation SOC
    Yang, Wenzhuo
    Lam, Kwok-Yan
    INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019), 2020, 11999 : 145 - 164