Mining Attributed Graphs for Threat Intelligence

被引:16
|
作者
Gascon, Hugo [1 ]
Grobauer, Bernd [2 ]
Schreck, Thomas [2 ]
Rist, Lukas [3 ]
Arp, Daniel [1 ]
Rieck, Konrad [1 ]
机构
[1] Tech Univ Carolo Wilhelmina Braunschweig, Braunschweig, Germany
[2] Siemens AG, Munich, Germany
[3] Symantec Corp, Tempe, AZ USA
关键词
Threat Intelligence; Advanced Persistent Threat; Graph Mining; Information Retrieval;
D O I
10.1145/3029806.3029811
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Understanding and fending off attack campaigns against organizations, companies and individuals, has become a global struggle. As today's threat actors become more determined and organized, isolated efforts to detect and reveal threats are no longer effective. Although challenging, this situation can be significantly changed if information about security incidents is collected, shared and analyzed across organizations. To this end, different exchange data formats such as STIX, CyBOX, or IODEF have been recently proposed and numerous CERTs are adopting these threat intelligence standards to share tactical and technical threat insights. However, managing, analyzing and correlating the vast amount of data available from different sources to identify relevant attack patterns still remains an open problem. In this paper we present MANTIS, a platform for threat intelligence that enables the unified analysis of different standards and the correlation of threat data trough a novel type-agnostic similarity algorithm based on attributed graphs. Its unified representation allows the security analyst to discover similar and related threats by linking patterns shared between seemingly unrelated attack campaigns through queries of different complexity. We evaluate the performance of MANTIS as an information retrieval system for threat intelligence in different experiments. In an evaluation with over 14,000 CyBOX objects, the platform enables retrieving relevant threat reports with a mean average precision of 80%, given only a single object from an incident, such as a file or an HTTP request. We further illustrate the performance of this analysis in two case studies with the attack campaigns Stuxnet and Regin.
引用
收藏
页码:15 / 22
页数:8
相关论文
共 50 条
  • [21] TIM: threat context-enhanced TTP intelligence mining on unstructured threat data
    Yizhe You
    Jun Jiang
    Zhengwei Jiang
    Peian Yang
    Baoxu Liu
    Huamin Feng
    Xuren Wang
    Ning Li
    Cybersecurity, 5
  • [22] Peer recommendation by using pattern mining to generate candidate keywords in attributed graphs
    Raj, Shristi
    Sharma, Prashant
    Kumar, Chintoo
    Chowdary, C. Ravindranath
    SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2023, 48 (02):
  • [23] Peer recommendation by using pattern mining to generate candidate keywords in attributed graphs
    Shristi Raj
    Prashant Sharma
    Chintoo Kumar
    C Ravindranath Chowdary
    Sādhanā, 48
  • [24] Unstructured Big Data Threat Intelligence Parallel Mining Algorithm
    Li, Zhihua
    Yu, Xinye
    Wei, Tao
    Qian, Junhao
    BIG DATA MINING AND ANALYTICS, 2024, 7 (02): : 531 - 546
  • [25] Advancing Cybersecurity: Graph Neural Networks in Threat Intelligence Knowledge Graphs
    Li, Langsha
    Qiang, Feng
    Ma, Li
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON ALGORITHMS, SOFTWARE ENGINEERING, AND NETWORK SECURITY, ASENS 2024, 2024, : 737 - 741
  • [26] A Data Mining Based System for Automating Creation of Cyber Threat Intelligence
    Arikan, Suleyman Muhammed
    Acar, Sami
    9TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSICS AND SECURITY (ISDFS'21), 2021,
  • [27] Actionable Cyber Threat Intelligence using Knowledge Graphs and Large Language Models
    Fieblinger, Romy
    Alam, Md Tanvirul
    Rastogi, Nidhi
    9TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS, EUROS&PW 2024, 2024, : 100 - 111
  • [28] Activity-Attack Graphs for Intelligence-Informed Threat COA Development
    Mckee, Cole
    Edie, Kelsie
    Duby, Adam
    2023 IEEE 13TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE, CCWC, 2023, : 598 - 604
  • [29] Combating Fake Cyber Threat Intelligence using Provenance in Cybersecurity Knowledge Graphs
    Mitra, Shaswata
    Piplai, Aritran
    Mittal, Sudip
    Joshi, Anupam
    2021 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2021, : 3316 - 3323
  • [30] A truss-based approach for densest homogeneous subgraph mining in node-attributed graphs
    Sun, Heli
    Zhang, Yawei
    Jia, Xiaolin
    Wang, Pei
    Huang, Ruodan
    Huang, Jianbin
    He, Liang
    Sun, Zhongbin
    COMPUTATIONAL INTELLIGENCE, 2021, 37 (02) : 1035 - 1050