Incremental Hacker Forum Exploit Collection and Classification for Proactive Cyber Threat Intelligence: An Exploratory Study

被引:0
|
作者
Williams, Ryan [1 ]
Samtani, Sagar [2 ]
Patton, Mark [1 ]
Chen, Hsinchun [1 ]
机构
[1] Univ Arizona, Management Informat Syst, Tucson, AZ 85724 USA
[2] Univ S Florida, Informat Syst & Decis Sci, Tampa, FL USA
基金
美国国家科学基金会;
关键词
cyber threat intelligence; hacker forum; CTI; web crawling; recurrent neural network; hacker exploits;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Cyber threats have emerged as a key societal concern. To counter the growing threat of cyber-attacks, organizations, in recent years, have begun investing heavily in developing Cyber Threat Intelligence (CTI). Fundamentally a data driven process, many organizations have traditionally collected and analyzed data from internal log files, resulting in reactive CTI. The online hacker community can offer significant proactive CTI value by alerting organizations to threats they were not previously aware of. Amongst various platforms, forums provide the richest metadata, data permanence, and tens of thousands of freely available Tools, Techniques, and Procedures (TTP). However, forums often employ anti-crawling measures such as authentication, throttling, and obfuscation. Such limitations have restricted many researchers to batch collections. This exploratory study aims to (1) design a novel web crawler augmented with numerous anti-crawling countermeasures to collect hacker exploits on an ongoing basis, (2) employ a state-of-the-art deep learning approach, Long Short-Term Memory (LSTM) Recurrent Neural Network (RNN), to automatically classify exploits into pre-defined categories on the-fly, and (3) develop interactive visualizations enabling CTI practitioners and researchers to explore collected exploits for proactive, timely CTI. The results of this study indicate, among other findings, that system and network exploits are shared significantly more than other exploit types.
引用
收藏
页码:94 / 99
页数:6
相关论文
共 32 条
  • [21] Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study
    Orbinato, Vittorio
    Barbaraci, Mariarosaria
    Natella, Roberto
    Cotroneo, Domenico
    2022 IEEE 33RD INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE 2022), 2022, : 181 - 192
  • [22] Counteracting Dark Web Text-Based CAPTCHA with Generative Adversarial Learning for Proactive Cyber Threat Intelligence
    Zhang, Ning
    Ebrahimi, Mohammadreza
    Li, Weifeng
    Chen, Hsinchun
    ACM TRANSACTIONS ON MANAGEMENT INFORMATION SYSTEMS, 2022, 13 (02)
  • [23] Towards Continuous Enrichment of Cyber Threat Intelligence: A Study on a Honeypot Dataset
    Spyros, Arnolnt
    Papoutsis, Angelos
    Koritsas, Ilias
    Mengidis, Notis
    Iliou, Christos
    Kavallieros, Dimitris
    Tsikrika, Theodora
    Vrochidis, Stefanos
    Kompatsiaris, Ioannis
    2022 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2022, : 261 - 266
  • [24] Strategic Cyber Threat Intelligence Sharing: A Case Study of IDS Logs
    Dog, Spike E.
    Tweed, Alex
    Rouse, Leroy
    Chu, Bill
    Qi, Duan
    Hu, Yueqi
    Yang, Jing
    Al -Shaer, Ehab
    2016 25TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2016,
  • [25] A Comparative Study on Cyber Threat Intelligence: The Security Incident Response Perspective
    Schlette, Daniel
    Caselli, Marco
    Pernul, Gunther
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2021, 23 (04): : 2525 - 2556
  • [26] Temporal Intelligence in AI-Enhanced Cyber Forensics using Time-Based Analysis for Proactive Threat Detection
    Dhabliya, Dharmesh
    Gujar, Satish N.
    Dhabliya, Ritika
    Chavan, Gurunath T.
    Kalnawat, Aarti
    Bendale, Shailesh P.
    JOURNAL OF ELECTRICAL SYSTEMS, 2023, 19 (03) : 126 - 146
  • [27] Study of Natural Language Processing for Collecting Cyber Threat Intelligence Using SyntaxNet
    Kim, Nakhyun
    Kim, Minseok
    Lee, Seulgi
    Cho, Hyeisun
    Kim, Byung-ik
    Park, Jun-hyung
    Jun, MoonSeog
    PROCEEDINGS OF THE 3RD INTERNATIONAL SYMPOSIUM OF INFORMATION AND INTERNET TECHNOLOGY (SYMINTECH 2018), 2019, 565 : 10 - 18
  • [28] An Exploratory Study on the Use of Threat Intelligence Sharing Platforms in Germany, Austria and Switzerland
    Fischer, Daniel
    Sauerwein, Clemens
    Werchan, Martin
    Stelzer, Dirk
    18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,
  • [29] Collecting Cyber Threat Intelligence from Hacker Forums via a Two-Stage, Hybrid Process using Support Vector Machines and Latent Dirichlet Allocation
    Deliu, Isuf
    Leichter, Carl
    Franke, Katrin
    2018 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2018, : 5008 - 5013
  • [30] LINKING EXPLOITS FROM THE DARK WEB TO KNOWN VULNERABILITIES FOR PROACTIVE CYBER THREAT INTELLIGENCE: AN ATTENTION-BASED DEEP STRUCTURED SEMANTIC MODEL
    Samtani, Sagar
    Chai, Yidong
    Chen, Hsinchun
    MIS QUARTERLY, 2022, 46 (02) : 911 - 946