A heterogeneous graph-based approach for cyber threat attribution using threat intelligence

被引:1
|
作者
Duan, Junting [1 ]
Luo, Yujie [1 ]
Zhang, Zhicheng [1 ]
Peng, Jianjian [1 ]
机构
[1] Univ Elect Sci & Technol China, Chengdu, Sichuan, Peoples R China
关键词
Cyber threat intelligence; Cyber threat attribution; Heterogeneous graph; Graph representation learning;
D O I
10.1145/3651671.3651707
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cyber Threat attribution is the process of associating a cyberattack with the threat groups. This process is essential for enhancing defense strategies and enabling rapid response to threats, making threat attribution a critical component of an effective network security defense system. Current methods often struggle to leverage the intricate relationships among threat behaviors or lack an attacker's feature extraction mechanism resulting in the need for manual analysis of vast data, thereby presenting challenges in the face of the escalating number and complexity of attacks. To tackle these challenges, we propose HG-CTA, a novel cyber threat attribution method based on heterogeneous graph. We first utilize cyber threat intelligence(CTI) to construct a heterogeneous knowledge base. Then we formalize threat attribution as a link prediction task on heterogeneous graph and propose a metapath context based heterogeneous graph embedding methods to extract feature of attackers. Finally, attribution is achieved by inferring the relationship between the attackers and threat groups. Through experiment on a data set constructed from threat intelligence provided by Alienvault, Miter ATT&CK, we demonstrate the effectiveness of our proposed attribution method compared with baseline models.
引用
收藏
页码:87 / 93
页数:7
相关论文
共 50 条
  • [21] Cyber Threat Intelligence for "Things"
    Wagner, Thomas D.
    2019 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBER SA), 2019,
  • [22] Modeling Cyber Threat Intelligence
    Bromander, Siri
    Swimmer, Morton
    Eian, Martin
    Skjotskift, Geir
    Borg, Fredrik
    ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 273 - 280
  • [23] Cyber Threat Intelligence 101
    Dror-John Röcher
    Datenschutz und Datensicherheit - DuD, 2018, 42 (10) : 623 - 628
  • [24] IPAttributor: Cyber Attacker Attribution with Threat Intelligence-Enriched Intrusion Data
    Xiang, Xiayu
    Liu, Hao
    Zeng, Liyi
    Zhang, Huan
    Gu, Zhaoquan
    MATHEMATICS, 2024, 12 (09)
  • [25] Generating Network Security Defense Strategy Based on Cyber Threat Intelligence Knowledge Graph
    Zhang, Shuqin
    Li, Shuhan
    Chen, Peng
    Wang, Shijie
    Zhao, Chunxia
    EMERGING NETWORKING ARCHITECTURE AND TECHNOLOGIES, ICENAT 2022, 2023, 1696 : 507 - 519
  • [26] K-CTIAA: Automatic Analysis of Cyber Threat Intelligence Based on a Knowledge Graph
    Li, Zong-Xun
    Li, Yu-Jun
    Liu, Yi-Wei
    Liu, Cheng
    Zhou, Nan-Xin
    SYMMETRY-BASEL, 2023, 15 (02):
  • [27] Managing cyber threat intelligence in a graph database : Methods of analyzing intrusion sets, threat actors, and campaigns
    Lee, Seulgi
    Cho, Hyeisun
    Kim, Nakhyun
    Kim, Byungik
    Park, Junhyung
    2018 INTERNATIONAL CONFERENCE ON PLATFORM TECHNOLOGY AND SERVICE (PLATCON18), 2018, : 220 - 223
  • [28] HinCTI: A Cyber Threat Intelligence Modeling and Identification System Based on Heterogeneous Information Network
    Gao, Yali
    Li, Xiaoyong
    Peng, Hao
    Fang, Binxing
    Yu, Philip S.
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2022, 34 (02) : 708 - 722
  • [29] Hyper attack graph: Constructing a hypergraph for cyber threat intelligence analysis
    Jia, Junbo
    Yang, Li
    Wang, Yuchen
    Sang, Anyuan
    COMPUTERS & SECURITY, 2025, 149
  • [30] Open-CyKG: An Open Cyber Threat Intelligence Knowledge Graph
    Sarhan, Injy
    Spruit, Marco
    KNOWLEDGE-BASED SYSTEMS, 2021, 233