MITREtrieval: Retrieving MITRE Techniques From Unstructured Threat Reports by Fusion of Deep Learning and Ontology

被引:0
作者
Huang, Yi-Ting [1 ]
Vaitheeshwari, R. [2 ]
Chen, Meng-Chang [3 ]
Lin, Ying-Dar [4 ]
Hwang, Ren-Hung [5 ]
Lin, Po-Ching [6 ]
Lai, Yuan-Cheng [7 ]
Wu, Eric Hsiao-Kuang [2 ]
Chen, Chung-Hsuan [2 ]
Liao, Zi-Jie [2 ]
Chen, Chung-Kuan [8 ]
机构
[1] Natl Taiwan Univ Sci & Technol, Dept Elect Engn, Taipei 106, Taiwan
[2] Natl Cent Univ, Dept Comp Sci & Informat Engn, Taoyuan 320, Taiwan
[3] Acad Sinica, Inst Informat Sci, Taipei 115, Taiwan
[4] Natl Yang Ming Chiao Tung Univ, Dept Comp Sci, Hsinchu 30010, Taiwan
[5] Natl Yang Ming Chiao Tung Univ, Coll Artificial Intelligence, Hsinchu 30010, Taiwan
[6] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, Chiayi 62102, Taiwan
[7] Natl Taiwan Univ Sci & Technol, Dept Informat Management, Taipei 106, Taiwan
[8] CyCraft Technol, Res Div, New Taipei City 220, Taiwan
来源
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT | 2024年 / 21卷 / 04期
关键词
Computer security; Cyber threat intelligence; Ontologies; Malware; Natural language processing; Deep learning; Electronic mail; Cybersecurity; deep learning; MITRE ATT&CK; natural language processing; ontology; threat intelligence; INTELLIGENCE;
D O I
10.1109/TNSM.2024.3401200
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber Threat Intelligence (CTI) plays a crucial role in understanding and preemptively defending against emerging threats. Typically disseminated through unstructured reports, CTI encompasses detailed insights into threat actors, their actions, and attack patterns. The MITRE ATT&CK framework offers a comprehensive catalog of adversary tactics, techniques, and procedures (TTPs), serving as a valuable resource for deciphering attacker behavior and enhancing defensive measures. Addressing the challenge of time-consuming manual analysis of MITRE TTPs in unstructured CTI reports, this paper presents MITREtrieval, a novel system that leverages deep learning and ontology to efficiently extract MITRE techniques. This approach mitigates issues related to the implicit nature of TTPs, textual semantic dependencies, and the scarcity of adequately labeled datasets, enabling more effective analysis even with limited sample sizes. Our approach combines a sophisticated sentence-level BERT deep learning model with ontology knowledge to address sparse data challenges, using a voting algorithm to merge outcomes. This results in a more accurate classification of MITRE techniques, capturing contextual nuances effectively. Our evaluation confirms MITREtrieval's effectiveness in identifying techniques, regardless of their representation in training samples. MITREtrieval has surpassed benchmarks, achieving F2 scores of 58%, 62%, and 69% in multi-label technique identification across 113, 46, and 23 CTI reports, respectively, thereby streamlining CTI analysis and improving threat intelligence.
引用
收藏
页码:4871 / 4887
页数:17
相关论文
共 53 条
[1]  
Amati G., 2009, Encyclopedia of database systems, P257, DOI [DOI 10.1007/978-0-387-39940-9_921, 10.1007/978-0-387-39940-9921, DOI 10.1007/978-0-387-39940-9921]
[2]  
[Anonymous], 2022, CyberMonitor
[3]  
[Anonymous], 2022, Threat Report ATT & CK Mapping
[4]  
[Anonymous], 2022, Yara
[5]  
[Anonymous], ADVERSARIAL TACTICS
[6]   Automated Threat Report Classification Over Multi-Source Data [J].
Ayoade, Gbadebo ;
Chandra, Swarup ;
Khan, Latifur ;
Hamlen, Kevin ;
Thuraisingham, Bhavani .
2018 4TH IEEE INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC 2018), 2018, :236-245
[7]  
Barnum S., 2012, Standardizing Cyber Threat Intelligence Information With the Structured Threat Information Expression (STIX), VII, P1
[8]  
Bastos A, 2021, Arxiv, DOI arXiv:2009.08694
[9]  
Belfadel Abdelhadi, 2023, Web Information Systems Engineering - WISE 2023: 24th International Conference, Proceedings. Lecture Notes in Computer Science (14306), P865, DOI 10.1007/978-981-99-7254-8_67
[10]  
Bhutani B., 2019, P 12 INT C CONT COMP, P1