An automated dynamic quality assessment method for cyber threat intelligence

被引:0
作者
Yang, Libin [1 ]
Wang, Menghan [1 ]
Lou, Wei [2 ]
机构
[1] Northwestern Polytech Univ, Sch Cybersecur, Xian 710129, Shaanxi, Peoples R China
[2] Hong Kong Polytech Univ, Dept Comp, Kowloon, Hong Kong 999077, Peoples R China
关键词
Cyber threat intelligence; Feed trustworthiness; Content availability; Data quality assessment; ADVANCED PERSISTENT THREATS; DECISION;
D O I
10.1016/j.cose.2024.104079
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The emergence of cyber threat intelligence (CTI) is a promising approach for alleviating malicious activities. However, the effectiveness of CTIs is heavily dependent on their quality. Current literature develops the CTI quality assessment ontology mainly from the perspective of CTI source or content separately, regardless of their availability in practice. In this paper, we propose an automated CTI quality assessment method that synthesizes the trustworthiness of CTI sources and the availability of CTI contents. Specifically, we model the interactions of CTI feeds as a correlation graph and propose an iterative algorithm to well discriminate the feeds' trustworthiness. We elaborate a CTI content assessment together with a machine learning algorithm to automatically classify CTIs' availability from a set of content metrics. A comprehensive CTI quality assessment is proposed by jointly considering the feed trustworthiness and content availability. Extensive experimental results on real datasets demonstrate that our proposed method can quantitatively as well as effectively assess CTI quality.
引用
收藏
页数:12
相关论文
共 50 条
[21]   Using Cyber Threat Intelligence in SDN Security [J].
Yurekten, Ozgur ;
Demirci, Mehmet .
2017 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2017, :377-382
[22]   Cyber threat intelligence for critical infrastructure security [J].
Osliak, Oleksii ;
Saracino, Andrea ;
Martinelli, Fabio ;
Mori, Paolo .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (23)
[23]   A Shared Cyber Threat Intelligence Solution for SMEs [J].
van Haastrecht, Max ;
Golpur, Guy ;
Tzismadia, Gilad ;
Kab, Rolan ;
Priboi, Cristian ;
David, Dumitru ;
Racataian, Adrian ;
Brinkhuis, Matthieu ;
Spruit, Marco .
ELECTRONICS, 2021, 10 (23)
[24]   Tactics And Techniques Classification In Cyber Threat Intelligence [J].
Yu, Zhongkun ;
Wang, JunFeng ;
Tang, BinHui ;
Lu, Li .
COMPUTER JOURNAL, 2023, 66 (08) :1870-1881
[25]   Relation Extraction Techniques in Cyber Threat Intelligence [J].
Arikkat, Dincy R. ;
Vinod, P. ;
Rehiman, Rafidha K. A. ;
Nicolazzo, Serena ;
Nocera, Antonino ;
Conti, Mauro .
NATURAL LANGUAGE PROCESSING AND INFORMATION SYSTEMS, PT I, NLDB 2024, 2024, 14762 :348-363
[26]   EVACTI: evaluating the actionability of cyber threat intelligence [J].
Athanasios Dimitriadis ;
Angelos Papoutsis ;
Dimitrios Kavalieros ;
Theodora Tsikrika ;
Stefanos Vrochidis ;
Ioannis Kompatsiaris .
International Journal of Information Security, 2025, 24 (3)
[27]   On the dissemination of Cyber Threat Intelligence through Hyperledger [J].
Moubarak, Joanna ;
Bassil, Carole ;
Antoun, Joe .
2021 17TH INTERNATIONAL CONFERENCE ON THE DESIGN OF RELIABLE COMMUNICATION NETWORKS (DRCN), 2021,
[28]   CTIoT: A Cyber Threat Intelligence Tool for IoT [J].
El Jaouhari, Saad ;
Ahmed, Shaikh .
20TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC 2024, 2024, :1483-1489
[29]   Cyber Security Decision Making Informed by Cyber Threat Intelligence (CYDETI) [J].
Aliyu, Aliyu ;
He, Ying ;
Yevseyeva, Iryna ;
Luo, Cunjin .
2020 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2020,
[30]   Cyber threat intelligence challenges: Leveraging blockchain intelligence with possible solution [J].
Saxena, Rashi ;
Gayathri, E. .
MATERIALS TODAY-PROCEEDINGS, 2022, 51 :682-689