A heterogeneous graph-based approach for cyber threat attribution using threat intelligence

被引:1
|
作者
Duan, Junting [1 ]
Luo, Yujie [1 ]
Zhang, Zhicheng [1 ]
Peng, Jianjian [1 ]
机构
[1] Univ Elect Sci & Technol China, Chengdu, Sichuan, Peoples R China
关键词
Cyber threat intelligence; Cyber threat attribution; Heterogeneous graph; Graph representation learning;
D O I
10.1145/3651671.3651707
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cyber Threat attribution is the process of associating a cyberattack with the threat groups. This process is essential for enhancing defense strategies and enabling rapid response to threats, making threat attribution a critical component of an effective network security defense system. Current methods often struggle to leverage the intricate relationships among threat behaviors or lack an attacker's feature extraction mechanism resulting in the need for manual analysis of vast data, thereby presenting challenges in the face of the escalating number and complexity of attacks. To tackle these challenges, we propose HG-CTA, a novel cyber threat attribution method based on heterogeneous graph. We first utilize cyber threat intelligence(CTI) to construct a heterogeneous knowledge base. Then we formalize threat attribution as a link prediction task on heterogeneous graph and propose a metapath context based heterogeneous graph embedding methods to extract feature of attackers. Finally, attribution is achieved by inferring the relationship between the attackers and threat groups. Through experiment on a data set constructed from threat intelligence provided by Alienvault, Miter ATT&CK, we demonstrate the effectiveness of our proposed attribution method compared with baseline models.
引用
收藏
页码:87 / 93
页数:7
相关论文
共 50 条
  • [41] Automated Generation of Cyber Threat Intelligence
    Kakumaru, Takahiro
    Takahashi, Wataru
    Katsuse, Riku
    Siracusano, Giuseppe
    Sanvito, Davide
    Bifulco, Roberto
    1600, NEC Mediaproducts (17): : 33 - 37
  • [42] Cyber threat challenges intelligence capability
    Covault, C
    AVIATION WEEK & SPACE TECHNOLOGY, 1997, 146 (06): : 20 - 21
  • [43] Cyber threat challenges intelligence capability
    Aviation Week and Space Technology (New York), 1997, 146 (06):
  • [44] NO-DOUBT: Attack Attribution Based On Threat Intelligence Reports
    Perry, Lior
    Shapira, Bracha
    Puzis, Rami
    2019 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2019, : 80 - 85
  • [45] Generating Fake Cyber Threat Intelligence Using Transformer-Based Models
    Ranade, Priyanka
    Piplai, Aritran
    Mittal, Sudip
    Joshi, Anupam
    Finin, Tim
    2021 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2021,
  • [46] AttacKG: Constructing Technique Knowledge Graph from Cyber Threat Intelligence Reports
    Li, Zhenyuan
    Zeng, Jun
    Chen, Yan
    Liang, Zhenkai
    COMPUTER SECURITY - ESORICS 2022, PT I, 2022, 13554 : 589 - 609
  • [47] Insider threat detection approach for tobacco industry based on heterogeneous graph embedding
    Ji, Qi
    Li, Wei
    Pan, Bailin
    Xue, Hongkai
    Qiu, Xiang
    High Technology Letters, 2024, 30 (02) : 199 - 210
  • [48] Insider threat detection approach for tobacco industry based on heterogeneous graph embedding
    季琦
    LI Wei
    PAN Bailin
    XUE Hongkai
    QIU Xiang
    High Technology Letters, 2024, 30 (02) : 199 - 210
  • [49] Approach of goal-oriented attack graph-based threat evaluation for network security
    Liu, Wei-Xin
    Zheng, Kang-Feng
    Hu, Ying
    Wu, Bin
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2015, 38 (01): : 82 - 86
  • [50] Using Smart Glasses for Monitoring Cyber Threat Intelligence Feeds
    Korkiakoski, Mikko
    Sadiq, Fatima
    Setianto, Febrian
    Latif, Ummi Khaira
    Alavesa, Paula
    Kostakos, Panos
    PROCEEDINGS OF THE 2021 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING, ASONAM 2021, 2021, : 630 - 634