An automated dynamic quality assessment method for cyber threat intelligence

被引:4
作者
Yang, Libin [1 ]
Wang, Menghan [1 ]
Lou, Wei [2 ]
机构
[1] Northwestern Polytech Univ, Sch Cybersecur, Xian 710129, Shaanxi, Peoples R China
[2] Hong Kong Polytech Univ, Dept Comp, Kowloon, Hong Kong 999077, Peoples R China
关键词
Cyber threat intelligence; Feed trustworthiness; Content availability; Data quality assessment; ADVANCED PERSISTENT THREATS; DECISION;
D O I
10.1016/j.cose.2024.104079
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The emergence of cyber threat intelligence (CTI) is a promising approach for alleviating malicious activities. However, the effectiveness of CTIs is heavily dependent on their quality. Current literature develops the CTI quality assessment ontology mainly from the perspective of CTI source or content separately, regardless of their availability in practice. In this paper, we propose an automated CTI quality assessment method that synthesizes the trustworthiness of CTI sources and the availability of CTI contents. Specifically, we model the interactions of CTI feeds as a correlation graph and propose an iterative algorithm to well discriminate the feeds' trustworthiness. We elaborate a CTI content assessment together with a machine learning algorithm to automatically classify CTIs' availability from a set of content metrics. A comprehensive CTI quality assessment is proposed by jointly considering the feed trustworthiness and content availability. Extensive experimental results on real datasets demonstrate that our proposed method can quantitatively as well as effectively assess CTI quality.
引用
收藏
页数:12
相关论文
共 50 条
[41]   NLP-based techniques for Cyber Threat Intelligence [J].
Arazzi, Marco ;
Arikkat, Dincy R. ;
Nicolazzo, Serena ;
Nocera, Antonino ;
Rehiman, K. A. Rafidha ;
Vinod, P. ;
Conti, Mauro .
COMPUTER SCIENCE REVIEW, 2025, 58
[42]   A Reference Model for Cyber Threat Intelligence (CTI) Systems [J].
Sakellariou, Georgios ;
Fouliras, Panagiotis ;
Mavridis, Ioannis ;
Sarigiannidis, Panagiotis .
ELECTRONICS, 2022, 11 (09)
[43]   Practical Cyber Threat Intelligence in the UK Energy Sector [J].
Paice, Alan ;
McKeown, Sean .
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CYBERSECURITY, SITUATIONAL AWARENESS AND SOCIAL MEDIA, CYBER SCIENCE 2022, 2023, :3-23
[44]   Study of cyber threat intelligence, risk management and methods [J].
Singh, Pardeep ;
Kumar, Mahesh ;
Sharma, Neetu ;
Kumar, Pramod ;
Shweta .
JOURNAL OF INFORMATION & OPTIMIZATION SCIENCES, 2025, 46 (01) :65-74
[45]   Leveraging Gamification for Cyber Threat Intelligence for Resilience in Satellite Cyber Supply Chains [J].
Kriesten, Mona ;
Thinyane, Mamello ;
Ormrod, David .
PROCEEDINGS OF THE 23RD EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY, ECCWS 2024, 2024, 23 :712-719
[46]   Ontology-based Cyber Risk Monitoring Using Cyber Threat Intelligence [J].
Merah, Yazid ;
Kenaza, Tayeb .
ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,
[47]   A Novel Approach for Cyber Threat Analysis Systems Using BERT Model from Cyber Threat Intelligence Data [J].
Demirol, Doygun ;
Das, Resul ;
Hanbay, Davut .
SYMMETRY-BASEL, 2025, 17 (04)
[48]   Partition-then-Overlap Method for Labeling Cyber Threat Intelligence Reports by Topics over Time [J].
Nagasawa, Ryusei ;
Furumoto, Keisuke ;
Takita, Makoto ;
Shiraishi, Yoshiaki ;
Takahashi, Takeshi ;
Mohri, Masami ;
Takano, Yasuhiro ;
Morii, Masakatu .
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2021, E104D (05) :556-561
[49]   Utilization and Sharing of Cyber Threat Intelligence Produced by Open-Source Intelligence [J].
Rajamaki, Jyri ;
McMenamin, Stephen .
PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY, ICCWS 2024, 2024, 19 :607-611
[50]   An Overview of Cyber Threat Intelligence Platform and Role of Artificial Intelligence and Machine Learning [J].
Dutta, Abir ;
Kant, Shri .
INFORMATION SYSTEMS SECURITY, ICISS 2020, 2020, 12553 :81-86