Cyber Threat Intelligence meets the Analytic Tradecraft

被引:0
作者
Bjurling, Bjoern [1 ]
Raza, Shahid [1 ,2 ]
机构
[1] RISE Res Inst Sweden AB, Kista, Sweden
[2] Univ Glasgow, Sch Comp Sci, Glasgow, Scotland
基金
欧盟地平线“2020”;
关键词
Cyber threat intelligence; intelligence analysis; APT attribution; aggre gation; ambiguity; INFORMATION; FRAMEWORK;
D O I
10.1145/3701299
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The volumes and sophistication of cyber threats in today's cyber threat landscape have risen to levels where automated quantitative tools for Cyber Threat Intelligence (CTI) have become an indispensable part in the cyber defense arsenals. The AI and cyber security research communities are producing novel automated tools for CTI that quickly find their ways into commercial products. However, the quality of such automated intelligence products is being questioned by the intelligence community. Cyber security operators are forced to complement the automated tools with costly and time-consuming human intelligence analysis in order to improve the quality of the end product. For improving the quality, it has been suggested that researchers should incorporate methods from traditional intelligence analysis into the quantitative algorithms. This article presents a novel approach to cyber intelligence analysis called AMBARGO, which takes the inherent ambiguity of evidence into account in the analysis, using the Choquet integral, in formalizing the re-evaluation of evidence and hypotheses made by human analysts. The development of AMBARGO revolves around a cyber attribution use case, one of the hardest problems in CTI. The results of our evaluating experiments show that the robustness of AMBARGO outperforms state-of-the-art quantitative approaches to CTI in the presence of ambiguous evidence and potentially deceptive threat actor tactics. AMBARGO has thus the potential to fill a gap in the CTI state-of-the-art, which currently handles ambiguity poorly. The findings are also confirmed in a large-scale realistic experimental setting based on data from an APT campaign obtained from the MITRE ATT&CK Framework.
引用
收藏
页数:37
相关论文
共 76 条
[1]   A Multilabel Fuzzy Relevance Clustering System for Malware Attack Attribution in the Edge Layer of Cyber-Physical Networks [J].
Alaeiyan, Mohammadhadi ;
Dehghantanha, Ali ;
Dargahi, Tooska ;
Conti, Mauro ;
Parsa, Saeed .
ACM TRANSACTIONS ON CYBER-PHYSICAL SYSTEMS, 2020, 4 (03)
[2]  
Ali Rahman, 2020, Big Data and Security: First International Conference, ICBDS 2019. Communications in Computer and Information Science (1210), P584, DOI 10.1007/978-981-15-7530-3_44
[3]   Exploring the psychology of LLMs' moral and legal reasoning [J].
Almeida, Guilherme F. C. F. ;
Nunes, Jose Luiz ;
Engelmann, Neele ;
Wiegmann, Alex ;
de Araujo, Marcelo .
ARTIFICIAL INTELLIGENCE, 2024, 333
[4]  
Alsaheel A, 2021, PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, P3005
[5]  
Anand P., 2023, P 2023 2 INT C VIS E, P1
[6]  
[Anonymous], 2014, Non-Additive Measures: Theory and Applications
[7]  
[Anonymous], 2009, P ACM SIGKDD WORKSH
[8]  
Applebaum A, 2015, IEEE MILIT COMMUN C, P623, DOI 10.1109/MILCOM.2015.7357513
[9]   Pitfalls in Military Quantitative Intelligence Analysis: Incident Reporting in a Low Intensity Conflict [J].
Bang, Martin .
INTELLIGENCE AND NATIONAL SECURITY, 2016, 31 (01) :49-73
[10]   On representation of fuzzy measures for learning Choquet and Sugeno integrals [J].
Beliakov, Gleb ;
Divakov, Dmitriy .
KNOWLEDGE-BASED SYSTEMS, 2020, 189