Modelling Indicators of Behaviour for Cyber Threat Hunting via Sysmon

被引:0
作者
Chetwyn, Robert [1 ]
Eian, Martin [2 ]
Josang, Audun [1 ]
机构
[1] Univ Oslo, Oslo, Norway
[2] Mnemonic AS, Oslo, Norway
来源
PROCEEDINGS OF THE 2024 EUROPEAN INTERDISCIPLINARY CYBERSECURITY CONFERENCE, EICC 2024 | 2024年
关键词
Threat Actor Behaviour; Threat Hunting; TTP; MITRE ATT&CK; Caldera;
D O I
10.1145/3655693.3655722
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Hunting for threats is of capital importance for security teams. Establishing multifaceted contexts around the evolving behaviours of threat actors is paramount for enabling threat hunting teams to tell the malicious from the benign. The MITRE ATT&CK framework is the state-of-art knowledge base for referencing how threat actors conduct their tactics, techniques and procedures. Despite the abstract concepts of techniques being well defined, it is challenging to hunt from an abstract technique concept to security event data. In this work, we develop a data driven knowledge base of threat actor behaviours called Indicators of Behaviour, that use semantic reasoning to infer threat actor behaviours. Unlike generalised techniques in MITRE ATT&CK, these behaviours can be queried from a low level indicator and the behaviour itself. We use MITRE's Caldera platform to emulate threat actor behaviours and Sysmon for capturing security events and defining the knowledge base's semantics. By utilising this approach, the semantic reasoner aids threat hunting teams by inferring threat actor behaviour chains from individual interconnected events.
引用
收藏
页码:95 / 104
页数:10
相关论文
共 28 条
[1]  
Ackerman Geoff, 2018, Overruled: Containing a potentially destructive adversary
[2]   MAINTAINING KNOWLEDGE ABOUT TEMPORAL INTERVALS [J].
ALLEN, JF .
COMMUNICATIONS OF THE ACM, 1983, 26 (11) :832-843
[3]  
Aviad A, 2015, PROCEEDINGS OF THE 14TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2015), P328
[4]   Modeling Cyber Threat Intelligence [J].
Bromander, Siri ;
Swimmer, Morton ;
Eian, Martin ;
Skjotskift, Geir ;
Borg, Fredrik .
ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, :273-280
[5]  
Can Ozgu, 2018, International Journal of Metadata, Semantics and Ontologies, V13, P68, DOI 10.1504/ijmso.2018.096455
[6]  
David J Bianco, 2014, About us
[7]  
Fransiscus Dan, 2022, How to tune windows system monitor (sysmon)
[8]   Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence [J].
Gao, Peng ;
Shao, Fei ;
Liu, Xiaoyuan ;
Xiao, Xusheng ;
Qin, Zheng ;
Xu, Fengyuan ;
Mittal, Prateek ;
Kulkarni, Sanjeev R. ;
Song, Dawn .
2021 IEEE 37TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2021), 2021, :193-204
[9]  
HackTricks, 2023, Integrity levels
[10]  
Hartong Olaf, Olafhartong/sysmon-modular: A repository of sysmon configuration modules