An automated dynamic quality assessment method for cyber threat intelligence

被引:0
作者
Yang, Libin [1 ]
Wang, Menghan [1 ]
Lou, Wei [2 ]
机构
[1] Northwestern Polytech Univ, Sch Cybersecur, Xian 710129, Shaanxi, Peoples R China
[2] Hong Kong Polytech Univ, Dept Comp, Kowloon, Hong Kong 999077, Peoples R China
关键词
Cyber threat intelligence; Feed trustworthiness; Content availability; Data quality assessment; ADVANCED PERSISTENT THREATS; DECISION;
D O I
10.1016/j.cose.2024.104079
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The emergence of cyber threat intelligence (CTI) is a promising approach for alleviating malicious activities. However, the effectiveness of CTIs is heavily dependent on their quality. Current literature develops the CTI quality assessment ontology mainly from the perspective of CTI source or content separately, regardless of their availability in practice. In this paper, we propose an automated CTI quality assessment method that synthesizes the trustworthiness of CTI sources and the availability of CTI contents. Specifically, we model the interactions of CTI feeds as a correlation graph and propose an iterative algorithm to well discriminate the feeds' trustworthiness. We elaborate a CTI content assessment together with a machine learning algorithm to automatically classify CTIs' availability from a set of content metrics. A comprehensive CTI quality assessment is proposed by jointly considering the feed trustworthiness and content availability. Extensive experimental results on real datasets demonstrate that our proposed method can quantitatively as well as effectively assess CTI quality.
引用
收藏
页数:12
相关论文
共 50 条
[31]   A survey on cyber threat intelligence sharing based on Blockchain [J].
Ahmed El-Kosairy ;
Nashwa Abdelbaki ;
Heba Aslan .
Advances in Computational Intelligence, 2023, 3 (3)
[32]   A success model for cyber threat intelligence management platforms [J].
Zibak, Adam ;
Sauerwein, Clemens ;
Simpson, Andrew .
COMPUTERS & SECURITY, 2021, 111
[33]   Towards Selecting Informative Content for Cyber Threat Intelligence [J].
Panagiotou, Panos ;
Iliou, Christos ;
Apostolou, Konstantinos ;
Tsikrika, Theodora ;
Vrochidis, Stefanos ;
Chatzimisios, Periklis ;
Kompatsiaris, Ioannis .
PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2021, :354-359
[34]   Cyber Threat Intelligence on Blockchain: A Systematic Literature Review [J].
Chatziamanetoglou, Dimitrios ;
Rantos, Konstantinos .
COMPUTERS, 2024, 13 (03)
[35]   A Reference Model for Cyber Threat Intelligence (CTI) Systems [J].
Sakellariou, Georgios ;
Fouliras, Panagiotis ;
Mavridis, Ioannis ;
Sarigiannidis, Panagiotis .
ELECTRONICS, 2022, 11 (09)
[36]   Multi Platform Honeypot for Generation of Cyber Threat Intelligence [J].
Kumar, Sanjeev ;
Janet, B. ;
Eswari, R. .
PROCEEDINGS OF THE 2019 IEEE 9TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (IACC 2019), 2019, :25-29
[37]   Towards Collaborative Cyber Threat Intelligence for Security Management [J].
Osliak, Oleksii ;
Saracino, Andrea ;
Martinelli, Fabio ;
Dimitrakos, Theo .
ICISSP: PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2021, :339-346
[38]   Cyber threat intelligence sharing: Survey and research directions [J].
Wagner, Thomas D. ;
Mahbub, Khaled ;
Palomar, Esther ;
Abdallah, Ali E. .
COMPUTERS & SECURITY, 2019, 87
[39]   Practical Cyber Threat Intelligence in the UK Energy Sector [J].
Paice, Alan ;
McKeown, Sean .
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CYBERSECURITY, SITUATIONAL AWARENESS AND SOCIAL MEDIA, CYBER SCIENCE 2022, 2023, :3-23
[40]   Study of cyber threat intelligence, risk management and methods [J].
Singh, Pardeep ;
Kumar, Mahesh ;
Sharma, Neetu ;
Kumar, Pramod ;
Shweta .
JOURNAL OF INFORMATION & OPTIMIZATION SCIENCES, 2025, 46 (01) :65-74