A heterogeneous graph-based approach for cyber threat attribution using threat intelligence

被引:1
|
作者
Duan, Junting [1 ]
Luo, Yujie [1 ]
Zhang, Zhicheng [1 ]
Peng, Jianjian [1 ]
机构
[1] Univ Elect Sci & Technol China, Chengdu, Sichuan, Peoples R China
关键词
Cyber threat intelligence; Cyber threat attribution; Heterogeneous graph; Graph representation learning;
D O I
10.1145/3651671.3651707
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cyber Threat attribution is the process of associating a cyberattack with the threat groups. This process is essential for enhancing defense strategies and enabling rapid response to threats, making threat attribution a critical component of an effective network security defense system. Current methods often struggle to leverage the intricate relationships among threat behaviors or lack an attacker's feature extraction mechanism resulting in the need for manual analysis of vast data, thereby presenting challenges in the face of the escalating number and complexity of attacks. To tackle these challenges, we propose HG-CTA, a novel cyber threat attribution method based on heterogeneous graph. We first utilize cyber threat intelligence(CTI) to construct a heterogeneous knowledge base. Then we formalize threat attribution as a link prediction task on heterogeneous graph and propose a metapath context based heterogeneous graph embedding methods to extract feature of attackers. Finally, attribution is achieved by inferring the relationship between the attackers and threat groups. Through experiment on a data set constructed from threat intelligence provided by Alienvault, Miter ATT&CK, we demonstrate the effectiveness of our proposed attribution method compared with baseline models.
引用
收藏
页码:87 / 93
页数:7
相关论文
共 50 条
  • [1] Graph-based visual analytics for cyber threat intelligence
    Boehm, Fabian
    Menges, Florian
    Pernul, Guenther
    CYBERSECURITY, 2018, 1 (01):
  • [2] Cyber threat attribution using unstructured reports in cyber threat intelligence
    Irshad, Ehtsham
    Siddiqui, Abdul Basit
    EGYPTIAN INFORMATICS JOURNAL, 2023, 24 (01) : 43 - 59
  • [3] ObservableDB: An Inverted Index for Graph-Based Traversal of Cyber Threat Intelligence
    Tovarnak, Daniel
    Cech, Michal
    Tichy, Dusan
    Dohnal, Vojtech
    PROCEEDINGS OF THE IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM 2022, 2022,
  • [4] Framework of Cyber Attack Attribution Based on Threat Intelligence
    Li Qiang
    Yang Zeming
    Liu Baoxu
    Jiang Zhengwei
    Yan Jian
    INTEROPERABILITY, SAFETY AND SECURITY IN IOT, 2017, 190 : 92 - 103
  • [5] Insider Threat Detection Using a Graph-Based Approach
    Eberle, William
    Graves, Jeffrey
    Holder, Lawrence
    JOURNAL OF APPLIED SECURITY RESEARCH, 2010, 6 (01) : 32 - 81
  • [6] Cyber threat response using reinforcement learning in graph-based attack simulations
    Nyberg, Jakob
    Johnson, Pontus
    Mehes, Andras
    PROCEEDINGS OF THE IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM 2022, 2022,
  • [7] Threat intelligence attribution method based on graph attention mechanism
    Wang, Ting
    Yan, Hanbing
    Lang, Bo
    Beijing Hangkong Hangtian Daxue Xuebao/Journal of Beijing University of Aeronautics and Astronautics, 2024, 50 (07): : 2293 - 2303
  • [8] TDLens: Toward an Empirical Evaluation of Provenance Graph-Based Approach to Cyber Threat Detection
    Rui Mei
    Hanbing Yan
    Qinqin Wang
    Zhihui Han
    Zhuohang Lyu
    China Communications, 2022, 19 (10) : 102 - 115
  • [9] TDLens: Toward an Empirical Evaluation of Provenance Graph-Based Approach to Cyber Threat Detection
    Mei, Rui
    Yan, Hanbing
    Wang, Qinqin
    Han, Zhihui
    Lyu, Zhuohang
    CHINA COMMUNICATIONS, 2022, 19 (10) : 102 - 115
  • [10] Association Analysis Of Cyber-Attack Attribution Based On Threat Intelligence
    Li, Qiang
    Yang, Zeming
    Jiang, Zhengwei
    Liu, Baoxu
    Fu, Yuxia
    PROCEEDINGS OF THE 2017 2ND JOINT INTERNATIONAL INFORMATION TECHNOLOGY, MECHANICAL AND ELECTRONIC ENGINEERING CONFERENCE (JIMEC 2017), 2017, 62 : 222 - 230