An automated dynamic quality assessment method for cyber threat intelligence

被引:4
作者
Yang, Libin [1 ]
Wang, Menghan [1 ]
Lou, Wei [2 ]
机构
[1] Northwestern Polytech Univ, Sch Cybersecur, Xian 710129, Shaanxi, Peoples R China
[2] Hong Kong Polytech Univ, Dept Comp, Kowloon, Hong Kong 999077, Peoples R China
关键词
Cyber threat intelligence; Feed trustworthiness; Content availability; Data quality assessment; ADVANCED PERSISTENT THREATS; DECISION;
D O I
10.1016/j.cose.2024.104079
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The emergence of cyber threat intelligence (CTI) is a promising approach for alleviating malicious activities. However, the effectiveness of CTIs is heavily dependent on their quality. Current literature develops the CTI quality assessment ontology mainly from the perspective of CTI source or content separately, regardless of their availability in practice. In this paper, we propose an automated CTI quality assessment method that synthesizes the trustworthiness of CTI sources and the availability of CTI contents. Specifically, we model the interactions of CTI feeds as a correlation graph and propose an iterative algorithm to well discriminate the feeds' trustworthiness. We elaborate a CTI content assessment together with a machine learning algorithm to automatically classify CTIs' availability from a set of content metrics. A comprehensive CTI quality assessment is proposed by jointly considering the feed trustworthiness and content availability. Extensive experimental results on real datasets demonstrate that our proposed method can quantitatively as well as effectively assess CTI quality.
引用
收藏
页数:12
相关论文
共 50 条
[31]   Threat Actor Type Inference and Characterization within Cyber Threat Intelligence [J].
Mavroeidis, Vasileios ;
Hohimer, Ryan ;
Casey, Tim ;
Josang, Audun .
2021 13TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT, CYCON, 2021, :327-352
[32]   Evolving ML-Based Intrusion Detection: Cyber Threat Intelligence for Dynamic Model Updates [J].
Lin, Ying-Dar ;
Lu, Yi-Hsin ;
Hwang, Ren-Hung ;
Lai, Yuan-Cheng ;
Sudyana, Didik ;
Lee, Wei-Bin .
IEEE TRANSACTIONS ON MACHINE LEARNING IN COMMUNICATIONS AND NETWORKING, 2025, 3 :605-622
[33]   Cyber threat intelligence challenges: Leveraging blockchain intelligence with possible solution [J].
Saxena, Rashi ;
Gayathri, E. .
MATERIALS TODAY-PROCEEDINGS, 2022, 51 :682-689
[34]   Cyber Threat Intelligence on Blockchain: A Systematic Literature Review [J].
Chatziamanetoglou, Dimitrios ;
Rantos, Konstantinos .
COMPUTERS, 2024, 13 (03)
[35]   A success model for cyber threat intelligence management platforms [J].
Zibak, Adam ;
Sauerwein, Clemens ;
Simpson, Andrew .
COMPUTERS & SECURITY, 2021, 111
[36]   Towards Selecting Informative Content for Cyber Threat Intelligence [J].
Panagiotou, Panos ;
Iliou, Christos ;
Apostolou, Konstantinos ;
Tsikrika, Theodora ;
Vrochidis, Stefanos ;
Chatzimisios, Periklis ;
Kompatsiaris, Ioannis .
PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2021, :354-359
[37]   A survey on cyber threat intelligence sharing based on Blockchain [J].
Ahmed El-Kosairy ;
Nashwa Abdelbaki ;
Heba Aslan .
Advances in Computational Intelligence, 2023, 3 (3)
[38]   Towards Collaborative Cyber Threat Intelligence for Security Management [J].
Osliak, Oleksii ;
Saracino, Andrea ;
Martinelli, Fabio ;
Dimitrakos, Theo .
ICISSP: PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2021, :339-346
[39]   Multi Platform Honeypot for Generation of Cyber Threat Intelligence [J].
Kumar, Sanjeev ;
Janet, B. ;
Eswari, R. .
PROCEEDINGS OF THE 2019 IEEE 9TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (IACC 2019), 2019, :25-29
[40]   Cyber threat intelligence sharing: Survey and research directions [J].
Wagner, Thomas D. ;
Mahbub, Khaled ;
Palomar, Esther ;
Abdallah, Ali E. .
COMPUTERS & SECURITY, 2019, 87