Association Analysis Of Cyber-Attack Attribution Based On Threat Intelligence

被引:0
|
作者
Li, Qiang [1 ,2 ]
Yang, Zeming [2 ]
Jiang, Zhengwei [2 ]
Liu, Baoxu [2 ]
Fu, Yuxia [2 ]
机构
[1] Univ Chinese Acad Sci, Beijing, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
关键词
Association Analysis; Threat Intelligence; Cyber-attack Attribution; Constraint Analysis;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
This paper presented an association analysis method in cyber-attack attribution based on threat intelligence. The method used the local advantage model to analyse the data related to threat intelligence in cyber-attack attribution by combining the intrusion kill chains model and F2T2EA model. Then, this paper introduced and explained association analysis as well as association analysis flow. This flow was composed of four parts: input, association analysis, constraint analysis and output. Then, four types of association analysis were introduced: based on statistic, based on extension, based on behavior pattern and based on probability similarity. Considering about that association analysis is a cyclic iteration process, hierarchical constraint, object constraint, feedback constraint and merged constraint are recommended in detail. Finally, the proposed association analysis method was used in a real emergency response case of targeted attack. The result of case study showed that we can find out much useful information for cyber-attack attribution association analysis based on threat intelligence.
引用
收藏
页码:222 / 230
页数:9
相关论文
共 50 条
  • [1] Framework of Cyber Attack Attribution Based on Threat Intelligence
    Li Qiang
    Yang Zeming
    Liu Baoxu
    Jiang Zhengwei
    Yan Jian
    [J]. INTEROPERABILITY, SAFETY AND SECURITY IN IOT, 2017, 190 : 92 - 103
  • [2] Cyber-attack group analysis method based on association of cyber-attack information
    Son, Kyung-ho
    Kim, Byung-ik
    Lee, Tae-jin
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (01): : 260 - 280
  • [3] Formulation of Association Rule Mining (ARM) for an Effective Cyber Attack Attribution in Cyber Threat Intelligence (CTI)
    Abu, Md Sahrom
    Ariffin, Aswami
    Selamat, Siti Rahayu
    Yusof, Robiah
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (04) : 134 - 143
  • [4] Cyber threat attribution using unstructured reports in cyber threat intelligence
    Irshad, Ehtsham
    Siddiqui, Abdul Basit
    [J]. EGYPTIAN INFORMATICS JOURNAL, 2023, 24 (01) : 43 - 59
  • [5] NO-DOUBT: Attack Attribution Based On Threat Intelligence Reports
    Perry, Lior
    Shapira, Bracha
    Puzis, Rami
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2019, : 80 - 85
  • [6] Cyber-Attack Risks Analysis Based on Attack-Defense Trees
    Sun, Wenjun
    Lv, Liqun
    Su, Yang
    Wang, Xu An
    [J]. ADVANCES IN INTERNETWORKING, DATA & WEB TECHNOLOGIES, EIDWT-2017, 2018, 6 : 667 - 678
  • [7] Cyber-Attack Features for Detecting Cyber Threat Incidents from Online News
    Abdullah, Mohamad Syahir
    Zainal, Anazida
    Maarof, Mohd Aizaini
    Kassim, Mohamad Nizam
    [J]. PROCEEDINGS OF THE 2018 CYBER RESILIENCE CONFERENCE (CRC), 2018,
  • [8] A heterogeneous graph-based approach for cyber threat attribution using threat intelligence
    Duan, Junting
    Luo, Yujie
    Zhang, Zhicheng
    Peng, Jianjian
    [J]. 2024 16TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND COMPUTING, ICMLC 2024, 2024, : 87 - 93
  • [9] Cyber-Attack Attributes
    Kadivar, Mehdi
    [J]. TECHNOLOGY INNOVATION MANAGEMENT REVIEW, 2014, : 22 - 27
  • [10] The Law of Cyber-Attack
    Hathaway, Oona A.
    Crootof, Rebecca
    Levitz, Philip
    Nix, Haley
    Nowlan, Aileen
    Perdue, William
    Spiegel, Julia
    [J]. CALIFORNIA LAW REVIEW, 2012, 100 (04) : 817 - 885