Attack Hypotheses Generation Based on Threat Intelligence Knowledge Graph

被引:18
|
作者
Kaiser, Florian Klaus [1 ,2 ]
Dardik, Uriel [3 ]
Elitzur, Aviad [3 ]
Zilberman, Polina [3 ]
Daniel, Nir [3 ,4 ]
Wiens, Marcus [2 ,5 ,6 ]
Schultmann, Frank [7 ,8 ]
Elovici, Yuval [3 ,4 ]
Puzis, Rami [3 ,4 ]
机构
[1] Karlsruhe Inst Technol KIT, Inst Ind Prod IIP, Competence Ctr Appl Secur Technol, I-76131 Karlsruhe, Germany
[2] Karlsruhe Inst Technol KIT, Inst Informat Secur & Dependabil KASTEL, D-76131 Karlsruhe, Germany
[3] Cyber BGU, IL-84651 Beer Sheva, Israel
[4] Ben Gurion Univ Negev, Dept Software & Informat Syst Engn, IL-8410501 Beer Sheva, Israel
[5] TU Bergakad Freiberg, D-09599 Freiberg, Germany
[6] Karlsruhe Inst Technol KIT, Competence Ctr Appl Secur Technol, D-76131 Karlsruhe, Germany
[7] Karlsruhe Inst Technol KIT, Inst Ind Prod IIP, D-76131 Karlsruhe, Germany
[8] Univ Adelaide, Adelaide, SA 5005, Australia
基金
新加坡国家研究基金会;
关键词
Attack hypotheses; cyber threat intelligence; data fusion; link prediction;
D O I
10.1109/TDSC.2022.3233703
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber threat intelligence on past attacks may help with attack reconstruction and the prediction of the course of an ongoing attack by providing deeper understanding of the tools and attack patterns used by attackers. Therefore, cyber security analysts employ threat intelligence, alert correlations, machine learning, and advanced visualizations in order to produce sound attack hypotheses. In this article, we present AttackDB, a multi-level threat knowledge base that combines data from multiple threat intelligence sources to associate high-level ATT&CK techniques with low-level telemetry found in behavioral malware reports. We also present the Attack Hypothesis Generator which relies on knowledge graph traversal algorithms and a variety of link prediction methods to automatically infer ATT&CK techniques from a set of observable artifacts. Results of experiments performed with 53K VirusTotal reports indicate that the proposed algorithms employed by the Attack Hypothesis Generator are able to produce accurate adversarial technique hypotheses with a mean average precision greater than 0.5 and area under the receiver operating characteristic curve of over 0.8 when it is implemented on the basis of AttackDB. The presented toolkit will help analysts to improve the accuracy of attack hypotheses and to automate the attack hypothesis generation process.
引用
收藏
页码:4793 / 4809
页数:17
相关论文
共 50 条
  • [1] AUTOMA: Automated Generation of Attack Hypotheses and Their Variants for Threat Hunting Using Knowledge Discovery
    Nour, Boubakr
    Pourzandi, Makan
    Qureshi, Rushaan Kamran
    Debbabi, Mourad
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2024, 21 (05): : 5178 - 5196
  • [2] Hyper attack graph: Constructing a hypergraph for cyber threat intelligence analysis
    Jia, Junbo
    Yang, Li
    Wang, Yuchen
    Sang, Anyuan
    COMPUTERS & SECURITY, 2025, 149
  • [3] K-CTIAA: Automatic Analysis of Cyber Threat Intelligence Based on a Knowledge Graph
    Li, Zong-Xun
    Li, Yu-Jun
    Liu, Yi-Wei
    Liu, Cheng
    Zhou, Nan-Xin
    SYMMETRY-BASEL, 2023, 15 (02):
  • [4] Generating Network Security Defense Strategy Based on Cyber Threat Intelligence Knowledge Graph
    Zhang, Shuqin
    Li, Shuhan
    Chen, Peng
    Wang, Shijie
    Zhao, Chunxia
    EMERGING NETWORKING ARCHITECTURE AND TECHNOLOGIES, ICENAT 2022, 2023, 1696 : 507 - 519
  • [5] Research on threat intelligence extraction and knowledge graph construction technology
    Shi H.
    Wei J.
    Cai X.
    Wang H.
    Gao S.
    Zhang Y.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2023, 50 (04): : 65 - 75
  • [6] Automatic Generation of Attack Strategy for Multiple Vulnerabilities Based on Domain Knowledge Graph
    Chen, Xiaosheng
    Shen, Wendi
    Yang, Genke
    IECON 2021 - 47TH ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, 2021,
  • [7] Framework of Cyber Attack Attribution Based on Threat Intelligence
    Li Qiang
    Yang Zeming
    Liu Baoxu
    Jiang Zhengwei
    Yan Jian
    INTEROPERABILITY, SAFETY AND SECURITY IN IOT, 2017, 190 : 92 - 103
  • [8] Network Attack Prediction Method Based on Threat Intelligence
    Wang, Junshe
    Yi, Yuzi
    Zhang, Hongbin
    Cao, Ning
    CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 151 - 160
  • [9] Quality assessment of cyber threat intelligence knowledge graph based on adaptive joining of embedding model
    Chen, Bin
    Li, Hongyi
    Zhao, Di
    Yang, Yitang
    Pan, Chengwei
    COMPLEX & INTELLIGENT SYSTEMS, 2025, 11 (01)
  • [10] Advancing Cybersecurity: Graph Neural Networks in Threat Intelligence Knowledge Graphs
    Li, Langsha
    Qiang, Feng
    Ma, Li
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON ALGORITHMS, SOFTWARE ENGINEERING, AND NETWORK SECURITY, ASENS 2024, 2024, : 737 - 741