On the Automated Assessment of Open-Source Cyber Threat Intelligence Sources

被引:14
|
作者
Tundis, Andrea [1 ]
Ruppert, Samuel [2 ]
Muehlhaeuser, Max [1 ]
机构
[1] Tech Univ Darmstadt TUDA, Dept Comp Sci, Hsch Str 10, D-64289 Darmstadt, Germany
[2] Deutsch Bahn AG, Frankfurt, Germany
来源
关键词
Open source cyber threat intelligence; Cybersecurity; Machine learning; Feature engineering; Twitter;
D O I
10.1007/978-3-030-50417-5_34
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Global malware campaigns and large-scale data breaches show how everyday life can be impacted when the defensive measures fail to protect computer systems from cyber threats. Understanding the threat landscape and the adversaries' attack tactics to perform it represent key factors for enabling an efficient defense against threats over the time. Of particular importance is the acquisition of timely and accurate information from threats intelligence sources available on the web which can provide additional intelligence on emerging threats even before they can be observed as actual attacks. In this paper, an approach to automate the assessment of cyber threat intelligence sources and predict a relevance score for each source is proposed. Specifically, a model based on meta-data and word embedding is defined and experimented by training regression models to predict the relevance score of sources on Twitter. The results evaluation show that the assigned score allows to reduce the waiting time for intelligence verification, on the basis of its relevance, thus improving the time advantage of early threat detection.
引用
收藏
页码:453 / 467
页数:15
相关论文
共 50 条
  • [1] EXPLORING OPEN-SOURCE INFORMATION FOR CYBER THREAT INTELLIGENCE
    Netke, Madhavi M.
    Patil, Sarita
    Mahajan, Manjushree
    [J]. INTERNATIONAL JOURNAL OF EARLY CHILDHOOD SPECIAL EDUCATION, 2022, 14 (02) : 8157 - 8163
  • [2] A System for Automated Open-Source Threat Intelligence Gathering and Management
    Gao, Peng
    Liu, Xiaoyuan
    Choi, Edward
    Soman, Bhavna
    Mishra, Chinmaya
    Farris, Kate
    Song, Dawn
    [J]. SIGMOD '21: PROCEEDINGS OF THE 2021 INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, 2021, : 2716 - 2720
  • [3] Novel Application of Open-Source Cyber Intelligence
    Sufi, Fahim
    [J]. ELECTRONICS, 2023, 12 (17)
  • [4] Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence
    Liao, Xiaojing
    Yuan, Kan
    Wang, XiaoFeng
    Li, Zhou
    Xing, Luyi
    Beyah, Raheem
    [J]. CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 755 - 766
  • [5] Exploring Open Source Information for Cyber Threat Intelligence
    Adewopo, Victor
    Gonen, Bilal
    Adewopo, Festus
    [J]. 2020 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2020, : 2232 - 2241
  • [6] Open-source intelligence for risk assessment
    Hayes, Darren R.
    Cappa, Francesco
    [J]. BUSINESS HORIZONS, 2018, 61 (05) : 689 - 697
  • [7] Automated Generation of Cyber Threat Intelligence
    Kakumaru, Takahiro
    Takahashi, Wataru
    Katsuse, Riku
    Siracusano, Giuseppe
    Sanvito, Davide
    Bifulco, Roberto
    [J]. 1600, NEC Mediaproducts (17): : 33 - 37
  • [8] Open Source Intelligence Base Cyber Threat Inspection Framework for Critical Infrastructures
    Lee, Seokcheol
    Shon, Taeshik
    [J]. PROCEEDINGS OF 2016 FUTURE TECHNOLOGIES CONFERENCE (FTC), 2016, : 1030 - 1033
  • [9] Rapid, automated nerve histomorphometry through open-source artificial intelligence
    Daeschler, Simeon Christian
    Bourget, Marie-Helene
    Derakhshan, Dorsa
    Sharma, Vasudev
    Asenov, Stoyan Ivaylov
    Gordon, Tessa
    Cohen-Adad, Julien
    Borschel, Gregory Howard
    [J]. SCIENTIFIC REPORTS, 2022, 12 (01)
  • [10] Rapid, automated nerve histomorphometry through open-source artificial intelligence
    Simeon Christian Daeschler
    Marie-Hélène Bourget
    Dorsa Derakhshan
    Vasudev Sharma
    Stoyan Ivaylov Asenov
    Tessa Gordon
    Julien Cohen-Adad
    Gregory Howard Borschel
    [J]. Scientific Reports, 12