TIM: threat context-enhanced TTP intelligence mining on unstructured threat data

被引:0
|
作者
Yizhe You
Jun Jiang
Zhengwei Jiang
Peian Yang
Baoxu Liu
Huamin Feng
Xuren Wang
Ning Li
机构
[1] Chinese Academy of Sciences,Institute of Information Engineering
[2] University of Chinese Academy of Sciences,School of Cyber Security
[3] Capital Normal University,College of Information Engineering
[4] Beijing Electronic Science and Technology Institute,undefined
来源
关键词
TTPs; Threat intelligence; Natural language processing (NLP); Advanced persistent threat (APT);
D O I
暂无
中图分类号
学科分类号
摘要
TTPs (Tactics, Techniques, and Procedures), which represent an attacker’s goals and methods, are the long period and essential feature of the attacker. Defenders can use TTP intelligence to perform the penetration test and compensate for defense deficiency. However, most TTP intelligence is described in unstructured threat data, such as APT analysis reports. Manually converting natural language TTPs descriptions to standard TTP names, such as ATT&CK TTP names and IDs, is time-consuming and requires deep expertise. In this paper, we define the TTP classification task as a sentence classification task. We annotate a new sentence-level TTP dataset with 6 categories and 6061 TTP descriptions from 10761 security analysis reports. We construct a threat context-enhanced TTP intelligence mining (TIM) framework to mine TTP intelligence from unstructured threat data. The TIM framework uses TCENet (Threat Context Enhanced Network) to find and classify TTP descriptions, which we define as three continuous sentences, from textual data. Meanwhile, we use the element features of TTP in the descriptions to enhance the TTPs classification accuracy of TCENet. The evaluation result shows that the average classification accuracy of our proposed method on the 6 TTP categories reaches 0.941. The evaluation results also show that adding TTP element features can improve our classification accuracy compared to using only text features. TCENet also achieved the best results compared to the previous document-level TTP classification works and other popular text classification methods, even in the case of few-shot training samples. Finally, the TIM framework organizes TTP descriptions and TTP elements into STIX 2.1 format as final TTP intelligence for sharing the long-period and essential attack behavior characteristics of attackers. In addition, we transform TTP intelligence into sigma detection rules for attack behavior detection. Such TTP intelligence and rules can help defenders deploy long-term effective threat detection and perform more realistic attack simulations to strengthen defense.
引用
收藏
相关论文
共 50 条
  • [1] TIM: threat context-enhanced TTP intelligence mining on unstructured threat data
    You, Yizhe
    Jiang, Jun
    Jiang, Zhengwei
    Yang, Peian
    Liu, Baoxu
    Feng, Huamin
    Wang, Xuren
    Li, Ning
    [J]. CYBERSECURITY, 2022, 5 (01)
  • [2] Unstructured Big Data Threat Intelligence Parallel Mining Algorithm
    Li, Zhihua
    Yu, Xinye
    Wei, Tao
    Qian, Junhao
    [J]. BIG DATA MINING AND ANALYTICS, 2024, 7 (02): : 531 - 546
  • [3] Cyber threat attribution using unstructured reports in cyber threat intelligence
    Irshad, Ehtsham
    Siddiqui, Abdul Basit
    [J]. EGYPTIAN INFORMATICS JOURNAL, 2023, 24 (01) : 43 - 59
  • [4] Mining Attributed Graphs for Threat Intelligence
    Gascon, Hugo
    Grobauer, Bernd
    Schreck, Thomas
    Rist, Lukas
    Arp, Daniel
    Rieck, Konrad
    [J]. PROCEEDINGS OF THE SEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'17), 2017, : 15 - 22
  • [5] Automatic Tagging of Cyber Threat Intelligence Unstructured Data using Semantics Extraction
    Wang, Tianyi
    Chow, Kam Pui
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2019, : 197 - 199
  • [6] A Data Mining Based System for Automating Creation of Cyber Threat Intelligence
    Arikan, Suleyman Muhammed
    Acar, Sami
    [J]. 9TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSICS AND SECURITY (ISDFS'21), 2021,
  • [7] Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study
    Orbinato, Vittorio
    Barbaraci, Mariarosaria
    Natella, Roberto
    Cotroneo, Domenico
    [J]. 2022 IEEE 33RD INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE 2022), 2022, : 181 - 192
  • [8] Darknet and Deepnet Mining for Proactive Cybersecurity Threat Intelligence
    Nunes, Eric
    Diab, Ahmad
    Gunn, Andrew
    Marin, Ericsson
    Mishra, Vineet
    Paliath, Vivin
    Robertson, John
    Shakarian, Jana
    Thart, Amanda
    Shakarian, Paulo
    [J]. IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: CYBERSECURITY AND BIG DATA, 2016, : 7 - 12
  • [9] Automatic Generation of Malware Threat Intelligence from Unstructured Malware Traces
    Wei, Yuheng
    Zou, Futai
    [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2021, PT I, 2021, 398 : 44 - 61
  • [10] From logs to Stories: Human-Centred Data Mining for Cyber Threat Intelligence
    Afzaliseresht, Neda
    Miao, Yuan
    Michalska, Sandra
    Liu, Qing
    Wang, Hua
    [J]. IEEE ACCESS, 2020, 8 : 19089 - 19099