Mining Attributed Graphs for Threat Intelligence

被引:16
|
作者
Gascon, Hugo [1 ]
Grobauer, Bernd [2 ]
Schreck, Thomas [2 ]
Rist, Lukas [3 ]
Arp, Daniel [1 ]
Rieck, Konrad [1 ]
机构
[1] Tech Univ Carolo Wilhelmina Braunschweig, Braunschweig, Germany
[2] Siemens AG, Munich, Germany
[3] Symantec Corp, Tempe, AZ USA
来源
PROCEEDINGS OF THE SEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'17) | 2017年
关键词
Threat Intelligence; Advanced Persistent Threat; Graph Mining; Information Retrieval;
D O I
10.1145/3029806.3029811
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Understanding and fending off attack campaigns against organizations, companies and individuals, has become a global struggle. As today's threat actors become more determined and organized, isolated efforts to detect and reveal threats are no longer effective. Although challenging, this situation can be significantly changed if information about security incidents is collected, shared and analyzed across organizations. To this end, different exchange data formats such as STIX, CyBOX, or IODEF have been recently proposed and numerous CERTs are adopting these threat intelligence standards to share tactical and technical threat insights. However, managing, analyzing and correlating the vast amount of data available from different sources to identify relevant attack patterns still remains an open problem. In this paper we present MANTIS, a platform for threat intelligence that enables the unified analysis of different standards and the correlation of threat data trough a novel type-agnostic similarity algorithm based on attributed graphs. Its unified representation allows the security analyst to discover similar and related threats by linking patterns shared between seemingly unrelated attack campaigns through queries of different complexity. We evaluate the performance of MANTIS as an information retrieval system for threat intelligence in different experiments. In an evaluation with over 14,000 CyBOX objects, the platform enables retrieving relevant threat reports with a mean average precision of 80%, given only a single object from an incident, such as a file or an HTTP request. We further illustrate the performance of this analysis in two case studies with the attack campaigns Stuxnet and Regin.
引用
收藏
页码:15 / 22
页数:8
相关论文
共 50 条
  • [11] MISAGA: An Algorithm for Mining Interesting Subgraphs in Attributed Graphs
    He, Tiantian
    Chan, Keith C. C.
    IEEE TRANSACTIONS ON CYBERNETICS, 2018, 48 (05) : 1369 - 1382
  • [12] Joint Weighted Nonnegative Matrix Factorization for Mining Attributed Graphs
    Huang, Zhichao
    Ye, Yunming
    Li, Xutao
    Liu, Feng
    Chen, Huajie
    ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PAKDD 2017, PT I, 2017, 10234 : 368 - 380
  • [13] Mining Frequent Sequential Subgraph Evolutions in Dynamic Attributed Graphs
    Cheng, Zhi
    Andriamampianina, Landy
    Ravat, Franck
    Song, Jiefu
    Valles-Parlangeau, Nathalie
    Fournier-Viger, Philippe
    Selmaoui-Folcher, Nazha
    ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PAKDD 2023, PT II, 2023, 13936 : 66 - 78
  • [14] GraphRPM: Risk Pattern Mining on Industrial Large Attributed Graphs
    Tian, Sheng
    Zeng, Xintan
    Hu, Yifei
    Wang, Baokun
    Liu, Yongchao
    Jin, Yue
    Meng, Changhua
    Hong, Chuntao
    Zhang, Tianyi
    Wang, Weiqiang
    MACHINE LEARNING AND KNOWLEDGE DISCOVERY IN DATABASES-APPLIED DATA SCIENCE TRACK, PT X, ECML PKDD 2024, 2024, 14950 : 133 - 149
  • [15] Entity and relation extractions for threat intelligence knowledge graphs
    Mouiche, Inoussa
    Saad, Sherif
    COMPUTERS & SECURITY, 2025, 148
  • [16] Mapping Cyber Threat Intelligence to Probabilistic Attack Graphs
    Gylling, Andreas
    Ekstedt, Mathias
    Afzal, Zeeshan
    Eliasson, Per
    PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2021, : 304 - 311
  • [17] Mining Attribute-structure Correlated Patterns in Large Attributed Graphs
    Silva, Arlei
    Meira, Wagner, Jr.
    Zaki, Mohammed J.
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2012, 5 (05): : 466 - 477
  • [18] Darknet and Deepnet Mining for Proactive Cybersecurity Threat Intelligence
    Nunes, Eric
    Diab, Ahmad
    Gunn, Andrew
    Marin, Ericsson
    Mishra, Vineet
    Paliath, Vivin
    Robertson, John
    Shakarian, Jana
    Thart, Amanda
    Shakarian, Paulo
    IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: CYBERSECURITY AND BIG DATA, 2016, : 7 - 12
  • [19] Efficiently mining rich subgraphs from vertex-attributed graphs
    Hakim, Riyad
    Salem, Saeed
    ACM-BCB 2020 - 11TH ACM CONFERENCE ON BIOINFORMATICS, COMPUTATIONAL BIOLOGY, AND HEALTH INFORMATICS, 2020,
  • [20] TIM: threat context-enhanced TTP intelligence mining on unstructured threat data
    You, Yizhe
    Jiang, Jun
    Jiang, Zhengwei
    Yang, Peian
    Liu, Baoxu
    Feng, Huamin
    Wang, Xuren
    Li, Ning
    CYBERSECURITY, 2022, 5 (01)