Incremental Hacker Forum Exploit Collection and Classification for Proactive Cyber Threat Intelligence: An Exploratory Study

被引:0
|
作者
Williams, Ryan [1 ]
Samtani, Sagar [2 ]
Patton, Mark [1 ]
Chen, Hsinchun [1 ]
机构
[1] Univ Arizona, Management Informat Syst, Tucson, AZ 85724 USA
[2] Univ S Florida, Informat Syst & Decis Sci, Tampa, FL USA
基金
美国国家科学基金会;
关键词
cyber threat intelligence; hacker forum; CTI; web crawling; recurrent neural network; hacker exploits;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Cyber threats have emerged as a key societal concern. To counter the growing threat of cyber-attacks, organizations, in recent years, have begun investing heavily in developing Cyber Threat Intelligence (CTI). Fundamentally a data driven process, many organizations have traditionally collected and analyzed data from internal log files, resulting in reactive CTI. The online hacker community can offer significant proactive CTI value by alerting organizations to threats they were not previously aware of. Amongst various platforms, forums provide the richest metadata, data permanence, and tens of thousands of freely available Tools, Techniques, and Procedures (TTP). However, forums often employ anti-crawling measures such as authentication, throttling, and obfuscation. Such limitations have restricted many researchers to batch collections. This exploratory study aims to (1) design a novel web crawler augmented with numerous anti-crawling countermeasures to collect hacker exploits on an ongoing basis, (2) employ a state-of-the-art deep learning approach, Long Short-Term Memory (LSTM) Recurrent Neural Network (RNN), to automatically classify exploits into pre-defined categories on the-fly, and (3) develop interactive visualizations enabling CTI practitioners and researchers to explore collected exploits for proactive, timely CTI. The results of this study indicate, among other findings, that system and network exploits are shared significantly more than other exploit types.
引用
收藏
页码:94 / 99
页数:6
相关论文
共 30 条
  • [1] CREATING PROACTIVE CYBER THREAT INTELLIGENCE WITH HACKER EXPLOIT LABELS : A DEEP TRANSFER LEARNING APPROACH
    Ampel, Benjamin M.
    Samtani, Sagar
    Zhu, Hongyi
    Chen, Hsinchun
    MIS QUARTERLY, 2024, 48 (01) : 137 - 166
  • [2] Exploring Emerging Hacker Assets and Key Hackers for Proactive Cyber Threat Intelligence
    Samtani, Sagar
    Chinn, Ryan
    Chen, Hsinchun
    Nunamaker, Jay F., Jr.
    JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2017, 34 (04) : 1023 - 1053
  • [3] Identifying Mobile Malware and Key Threat Actors in Online Hacker Forums for Proactive Cyber Threat Intelligence
    Grisham, John
    Samtani, Sagar
    Patton, Mark
    Chen, Hsinchun
    2017 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2017, : 13 - 18
  • [4] Labeling Hacker Exploits for Proactive Cyber Threat Intelligence: A Deep Transfer Learning Approach
    Ampel, Benjamin
    Samtani, Sagar
    Zhu, Hongyi
    Ullman, Steven
    Chen, Hsinchun
    2020 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2020, : 144 - 149
  • [5] Data Collection and Exploratory Analysis for Cyber Threat Intelligence Machine Learning Processes
    Wolf, Shaya
    Foster, Rita
    Mack, Andrea
    Priest, Zachary
    Haile, Jed
    2022 9TH SWISS CONFERENCE ON DATA SCIENCE (SDS), 2022, : 7 - 12
  • [6] AZSecure Hacker Assets Portal: Cyber Threat Intelligence and Malware Analysis
    Samtani, Sagar
    Chinn, Kory
    Larson, Cathy
    Chen, Hsinchun
    IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: CYBERSECURITY AND BIG DATA, 2016, : 19 - 24
  • [7] Multimodal Classification of Onion Services for Proactive Cyber Threat Intelligence Using Explainable Deep Learning
    Moraliyage, Harsha
    Sumanasena, Vidura
    De Silva, Daswin
    Nawaratne, Rashmika
    Sun, Lina
    Alahakoon, Damminda
    IEEE ACCESS, 2022, 10 : 56044 - 56056
  • [8] Towards Safe Cyber Practices: Developing a Proactive Cyber-Threat Intelligence System for Dark Web Forum Content by Identifying Cybercrimes
    Sangher, Kanti Singh
    Singh, Archana
    Pandey, Hari Mohan
    Kumar, Vivek
    INFORMATION, 2023, 14 (06)
  • [9] Cyber Security Threat Intelligence Monitoring and Classification
    Wang, Bo-Xiang
    Chen, Jiann-Liang
    Yu, Chiao-Lin
    2021 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2021, : 70 - 72
  • [10] Tactics And Techniques Classification In Cyber Threat Intelligence
    Yu, Zhongkun
    Wang, JunFeng
    Tang, BinHui
    Lu, Li
    COMPUTER JOURNAL, 2023, 66 (08): : 1870 - 1881