CREATING PROACTIVE CYBER THREAT INTELLIGENCE WITH HACKER EXPLOIT LABELS : A DEEP TRANSFER LEARNING APPROACH

被引:8
作者
Ampel, Benjamin M. [1 ]
Samtani, Sagar [2 ]
Zhu, Hongyi [3 ]
Chen, Hsinchun [1 ]
机构
[1] Univ Arizona, Dept Management Informat Syst, Tucson, AZ 85721 USA
[2] Indiana Univ, Dept Operat & Decis Technol, Bloomington, IN USA
[3] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX USA
基金
美国国家科学基金会;
关键词
Hacker forums; cyber threat intelligence; cybersecurity analytics; deep transfer learning; deep learning; exploit labeling; computational design science; DESIGN-SCIENCE; CLASSIFICATION; IDENTIFICATION; ANALYTICS; IMPACT; LSTM;
D O I
10.25300/MISQ/2023/17316
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid proliferation of complex information systems has been met by an ever-increasing quantity of exploits that can cause irreparable cyber breaches. To mitigate these cyber threats, academia and industry have placed a significant focus on proactively identifying and labeling exploits developed by the international hacker community. However, prevailing approaches for labeling exploits in hacker forums do not leverage metadata from exploit darknet markets or public exploit repositories to enhance labeling performance. In this study, we adopted the computational design science paradigm to develop a novel information technology artifact, the deep transfer learning exploit labeler (DTL-EL). DTL-EL incorporates a pre -initialization design, multi -layer deep transfer learning (DTL), and a self -attention mechanism to automatically label exploits in hacker forums. We rigorously evaluated the proposed DTLEL against state-of-the-art non-DTL benchmark methods based in classical machine learning and deep learning. Results suggest that the proposed DTL-EL significantly outperforms benchmark methods based on accuracy, precision, recall, and F1 -score. Our proposed DTL-EL framework provides important practical implications for key stakeholders such as cybersecurity managers, analysts, and educators.
引用
收藏
页码:137 / 166
页数:30
相关论文
共 72 条
[1]   Peeking Inside the Black-Box: A Survey on Explainable Artificial Intelligence (XAI) [J].
Adadi, Amina ;
Berrada, Mohammed .
IEEE ACCESS, 2018, 6 :52138-52160
[2]   Challenges and performance metrics for security operations center analysts: a systematic review [J].
Agyepong, Enoch ;
Cherdantseva, Yulia ;
Reinecke, Philipp ;
Burnap, Pete .
Agyepong, Enoch (agyeponge@cardiff.ac.uk), 1600, Taylor and Francis Ltd. (04) :125-152
[3]  
Alomar N, 2020, PROCEEDINGS OF THE SIXTEENTH SYMPOSIUM ON USABLE PRIVACY AND SECURITY (SOUPS 2020), P319
[4]   Labeling Hacker Exploits for Proactive Cyber Threat Intelligence: A Deep Transfer Learning Approach [J].
Ampel, Benjamin ;
Samtani, Sagar ;
Zhu, Hongyi ;
Ullman, Steven ;
Chen, Hsinchun .
2020 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2020, :144-149
[5]  
[Anonymous], 2015, Tech. Rep.
[6]  
Bahdanau D, 2016, Arxiv, DOI [arXiv:1409.0473, DOI 10.48550/ARXIV.1409.0473]
[7]   Real Options Models for Proactive Uncertainty-Reducing Mitigations and Applications in Cybersecurity Investment Decision Making [J].
Benaroch, Michel .
INFORMATION SYSTEMS RESEARCH, 2018, 29 (02) :315-340
[8]   DICE-E: A FRAMEWORK FOR CONDUCTING DARKNET IDENTIFICATION, COLLECTION, EVALUATION WITH ETHICS [J].
Benjamin, Victor ;
Valacich, Joseph S. ;
Chen, Hsinchun .
MIS QUARTERLY, 2019, 43 (01) :1-22
[9]  
Brown R., 2021, 2021 SANS CYBER THRE
[10]  
Chen GY, 2019, Arxiv, DOI [arXiv:1905.05928, 10.48550/arXiv.1905.05928]