Mining Attributed Graphs for Threat Intelligence

被引:16
|
作者
Gascon, Hugo [1 ]
Grobauer, Bernd [2 ]
Schreck, Thomas [2 ]
Rist, Lukas [3 ]
Arp, Daniel [1 ]
Rieck, Konrad [1 ]
机构
[1] Tech Univ Carolo Wilhelmina Braunschweig, Braunschweig, Germany
[2] Siemens AG, Munich, Germany
[3] Symantec Corp, Tempe, AZ USA
关键词
Threat Intelligence; Advanced Persistent Threat; Graph Mining; Information Retrieval;
D O I
10.1145/3029806.3029811
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Understanding and fending off attack campaigns against organizations, companies and individuals, has become a global struggle. As today's threat actors become more determined and organized, isolated efforts to detect and reveal threats are no longer effective. Although challenging, this situation can be significantly changed if information about security incidents is collected, shared and analyzed across organizations. To this end, different exchange data formats such as STIX, CyBOX, or IODEF have been recently proposed and numerous CERTs are adopting these threat intelligence standards to share tactical and technical threat insights. However, managing, analyzing and correlating the vast amount of data available from different sources to identify relevant attack patterns still remains an open problem. In this paper we present MANTIS, a platform for threat intelligence that enables the unified analysis of different standards and the correlation of threat data trough a novel type-agnostic similarity algorithm based on attributed graphs. Its unified representation allows the security analyst to discover similar and related threats by linking patterns shared between seemingly unrelated attack campaigns through queries of different complexity. We evaluate the performance of MANTIS as an information retrieval system for threat intelligence in different experiments. In an evaluation with over 14,000 CyBOX objects, the platform enables retrieving relevant threat reports with a mean average precision of 80%, given only a single object from an incident, such as a file or an HTTP request. We further illustrate the performance of this analysis in two case studies with the attack campaigns Stuxnet and Regin.
引用
收藏
页码:15 / 22
页数:8
相关论文
共 50 条
  • [31] Towards Attributed Graphs in Groove
    Kastenberg, Harmen
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2006, 154 (02) : 47 - 54
  • [32] Structural Perceptrons for attributed graphs
    Jain, BJ
    Wysotzki, F
    STRUCTURAL, SYNTACTIC, AND STATISTICAL PATTERN RECOGNITION, PROCEEDINGS, 2004, 3138 : 85 - 94
  • [33] Graph Summarization for Attributed Graphs
    Wu, Ye
    Zhong, Zhinong
    Xiong, Wei
    Jing, Ning
    2014 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE, ELECTRONICS AND ELECTRICAL ENGINEERING (ISEEE), VOLS 1-3, 2014, : 502 - 506
  • [34] Parallel rewriting of attributed graphs
    de la Tour, Thierry Boy
    Echahed, Rachid
    THEORETICAL COMPUTER SCIENCE, 2020, 848 : 106 - 132
  • [35] INCREMENTAL CLUSTERING OF ATTRIBUTED GRAPHS
    SEONG, DS
    KIM, HS
    PARK, KH
    IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS, 1993, 23 (05): : 1399 - 1411
  • [36] Central Clustering of Attributed Graphs
    Brijnesh J. Jain
    Fritz Wysotzki
    Machine Learning, 2004, 56 : 169 - 207
  • [37] Central clustering of attributed graphs
    Jain, BJ
    Wysotzki, F
    MACHINE LEARNING, 2004, 56 (1-3) : 169 - 207
  • [38] Cyber Threat Intelligence Mining for Proactive Cybersecurity Defense: A Survey and New Perspectives
    Sun, Nan
    Ding, Ming
    Jiang, Jiaojiao
    Xu, Weikang
    Mo, Xiaoxing
    Tai, Yonghang
    Zhang, Jun
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2023, 25 (03): : 1748 - 1774
  • [39] ChainSmith: Automatically Learning the Semantics of Malicious Campaigns by Mining Threat Intelligence Reports
    Zhu, Ziyun
    Dumitras, Tudor
    2018 3RD IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2018), 2018, : 458 - 472
  • [40] From logs to Stories: Human-Centred Data Mining for Cyber Threat Intelligence
    Afzaliseresht, Neda
    Miao, Yuan
    Michalska, Sandra
    Liu, Qing
    Wang, Hua
    IEEE ACCESS, 2020, 8 : 19089 - 19099