A heterogeneous graph-based approach for cyber threat attribution using threat intelligence

被引:1
|
作者
Duan, Junting [1 ]
Luo, Yujie [1 ]
Zhang, Zhicheng [1 ]
Peng, Jianjian [1 ]
机构
[1] Univ Elect Sci & Technol China, Chengdu, Sichuan, Peoples R China
关键词
Cyber threat intelligence; Cyber threat attribution; Heterogeneous graph; Graph representation learning;
D O I
10.1145/3651671.3651707
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cyber Threat attribution is the process of associating a cyberattack with the threat groups. This process is essential for enhancing defense strategies and enabling rapid response to threats, making threat attribution a critical component of an effective network security defense system. Current methods often struggle to leverage the intricate relationships among threat behaviors or lack an attacker's feature extraction mechanism resulting in the need for manual analysis of vast data, thereby presenting challenges in the face of the escalating number and complexity of attacks. To tackle these challenges, we propose HG-CTA, a novel cyber threat attribution method based on heterogeneous graph. We first utilize cyber threat intelligence(CTI) to construct a heterogeneous knowledge base. Then we formalize threat attribution as a link prediction task on heterogeneous graph and propose a metapath context based heterogeneous graph embedding methods to extract feature of attackers. Finally, attribution is achieved by inferring the relationship between the attackers and threat groups. Through experiment on a data set constructed from threat intelligence provided by Alienvault, Miter ATT&CK, we demonstrate the effectiveness of our proposed attribution method compared with baseline models.
引用
收藏
页码:87 / 93
页数:7
相关论文
共 50 条
  • [31] DeepHunter: A Graph Neural Network Based Approach for Robust Cyber Threat Hunting
    Wei, Renzheng
    Cai, Lijun
    Zhao, Lixin
    Yu, Aimin
    Meng, Dan
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2021, PT I, 2021, 398 : 3 - 24
  • [32] Cyber Threat Intelligence for IoT Using Machine Learning
    Mishra, Shailendra
    Albarakati, Aiman
    Sharma, Sunil Kumar
    PROCESSES, 2022, 10 (12)
  • [33] Using Entropy and Mutual Information to Extract Threat Actions from Cyber Threat Intelligence
    Husari, Ghaith
    Niu, Xi
    Chu, Bill
    Al-Shaer, Ehab
    2018 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2018, : 1 - 6
  • [34] Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligence
    Mavroeidis, Vasileios
    Bromander, Siri
    2017 EUROPEAN INTELLIGENCE AND SECURITY INFORMATICS CONFERENCE (EISIC), 2017, : 91 - 98
  • [35] A survey on cyber threat intelligence sharing based on Blockchain
    Ahmed El-Kosairy
    Nashwa Abdelbaki
    Heba Aslan
    Advances in Computational Intelligence, 2023, 3 (3):
  • [36] Formulation of Association Rule Mining (ARM) for an Effective Cyber Attack Attribution in Cyber Threat Intelligence (CTI)
    Abu, Md Sahrom
    Ariffin, Aswami
    Selamat, Siti Rahayu
    Yusof, Robiah
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (04) : 134 - 143
  • [37] A Smart Contract Approach to Cyber Threat Intelligence Sharing in Kenya
    Maina, Wilson
    Nderu, Lawrence
    Mwalili, Tobias
    2022 IST-AFRICA CONFERENCE, 2022,
  • [38] An Effective Approach of Named Entity Recognition for Cyber Threat Intelligence
    Wu, Han
    Li, Xiaoyong
    Gao, Yali
    PROCEEDINGS OF 2020 IEEE 4TH INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2020), 2020, : 1370 - 1374
  • [39] Quality assessment of cyber threat intelligence knowledge graph based on adaptive joining of embedding model
    Chen, Bin
    Li, Hongyi
    Zhao, Di
    Yang, Yitang
    Pan, Chengwei
    COMPLEX & INTELLIGENT SYSTEMS, 2025, 11 (01)
  • [40] Cyber Threat Intelligence and Machine Learning
    Haass, Jon C.
    Proceedings - 2022 4th International Conference on Transdisciplinary AI, TransAI 2022, 2022, : 156 - 159