TIM: threat context-enhanced TTP intelligence mining on unstructured threat data

被引:0
|
作者
Yizhe You
Jun Jiang
Zhengwei Jiang
Peian Yang
Baoxu Liu
Huamin Feng
Xuren Wang
Ning Li
机构
[1] Chinese Academy of Sciences,Institute of Information Engineering
[2] University of Chinese Academy of Sciences,School of Cyber Security
[3] Capital Normal University,College of Information Engineering
[4] Beijing Electronic Science and Technology Institute,undefined
来源
关键词
TTPs; Threat intelligence; Natural language processing (NLP); Advanced persistent threat (APT);
D O I
暂无
中图分类号
学科分类号
摘要
TTPs (Tactics, Techniques, and Procedures), which represent an attacker’s goals and methods, are the long period and essential feature of the attacker. Defenders can use TTP intelligence to perform the penetration test and compensate for defense deficiency. However, most TTP intelligence is described in unstructured threat data, such as APT analysis reports. Manually converting natural language TTPs descriptions to standard TTP names, such as ATT&CK TTP names and IDs, is time-consuming and requires deep expertise. In this paper, we define the TTP classification task as a sentence classification task. We annotate a new sentence-level TTP dataset with 6 categories and 6061 TTP descriptions from 10761 security analysis reports. We construct a threat context-enhanced TTP intelligence mining (TIM) framework to mine TTP intelligence from unstructured threat data. The TIM framework uses TCENet (Threat Context Enhanced Network) to find and classify TTP descriptions, which we define as three continuous sentences, from textual data. Meanwhile, we use the element features of TTP in the descriptions to enhance the TTPs classification accuracy of TCENet. The evaluation result shows that the average classification accuracy of our proposed method on the 6 TTP categories reaches 0.941. The evaluation results also show that adding TTP element features can improve our classification accuracy compared to using only text features. TCENet also achieved the best results compared to the previous document-level TTP classification works and other popular text classification methods, even in the case of few-shot training samples. Finally, the TIM framework organizes TTP descriptions and TTP elements into STIX 2.1 format as final TTP intelligence for sharing the long-period and essential attack behavior characteristics of attackers. In addition, we transform TTP intelligence into sigma detection rules for attack behavior detection. Such TTP intelligence and rules can help defenders deploy long-term effective threat detection and perform more realistic attack simulations to strengthen defense.
引用
收藏
相关论文
共 50 条
  • [41] Technical Guidelines for Evaluating and Selecting Data Sources for Cybersecurity Threat Intelligence
    Mtsweni, Jabu
    Mutemwa, Muyowa
    [J]. PROCEEDINGS OF THE 18TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2019), 2019, : 305 - 313
  • [42] A Framework for Cyber Threat Intelligence Extraction from Raw Log Data
    Landauer, Max
    Skopik, Florian
    Wurzenberger, Markus
    Hotwagner, Wolfgang
    Rauber, Andreas
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2019, : 3200 - 3209
  • [43] Sharing Cyber Threat Intelligence Under the General Data Protection Regulation
    Albakri, Adham
    Boiten, Eerke
    De Lemos, Rogerio
    [J]. PRIVACY TECHNOLOGIES AND POLICY, APF 2019, 2019, 11498 : 28 - 41
  • [44] A Probabilistic Model to Preprocess Darknet Data for Cyber Threat Intelligence Generation
    Bou-Harb, Elias
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016,
  • [45] A Web Semantic Mining Method for Fake Cybersecurity Threat Intelligence in Open Source Communities
    Li, Zhihua
    Yu, Xinye
    Zhao, Yukai
    [J]. INTERNATIONAL JOURNAL ON SEMANTIC WEB AND INFORMATION SYSTEMS, 2024, 20 (01)
  • [46] Know Abnormal, Find Evil: Frequent Pattern Mining for Ransomware Threat Hunting and Intelligence
    Homayoun, Sajad
    Dehghantanha, Ali
    Ahmadzadeh, Marzieh
    Hashemi, Sattar
    Khayami, Raouf
    [J]. IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2020, 8 (02) : 341 - 351
  • [47] Enhanced Insider Threat Detection Model that Increases Data Availability
    Yaseen, Qussai
    Panda, Brajendra
    [J]. DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, 2011, 6536 : 267 - 277
  • [48] An Enhanced Threat Intelligence Driven Hybrid Model for Information Security Risk Management
    Amin, Habib E. L.
    Samhat, Abed Ellatif
    Chamoun, Maroun
    Oueidat, Lina
    Feghali, Antoine
    [J]. PROCEEDINGS 2024 IEEE 25TH INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS, WOWMOM 2024, 2024, : 5 - 12
  • [49] Enhanced Crime and Threat Intelligence Hunter with Named Entity Recognition and Sentiment Analysis
    Ng, James H.
    Loh, Peter K. K.
    [J]. SOFT COMPUTING FOR SECURITY APPLICATIONS, ICSCS 2022, 2023, 1428 : 299 - 313
  • [50] Methodological Framework to Collect, Process, Analyze and Visualize Cyber Threat Intelligence Data
    Borges Amaro, Lucas Jose
    Percilio Azevedo, Bruce William
    Lopes de Mendonca, Fabio Lucio
    Giozza, William Ferreira
    Albuquerque, Robson de Oliveira
    Garcia Villalba, Luis Javier
    [J]. APPLIED SCIENCES-BASEL, 2022, 12 (03):