Tactics And Techniques Classification In Cyber Threat Intelligence

被引:9
作者
Yu, Zhongkun [1 ]
Wang, JunFeng [1 ]
Tang, BinHui [2 ]
Lu, Li [1 ]
机构
[1] Sichuan Univ, Coll Comp Sci, Chengdu 610065, Peoples R China
[2] Sichuan Univ, Sch Cyber Sci & Engn, Chengdu 610065, Peoples R China
基金
中国国家自然科学基金;
关键词
Cyber Threat Intelligence; Tactics and Techniques Classification; Hierarchical Knowledge Migration; Attention Mechanism; Convolutional Neural Networks; ATTACKS; TRENDS;
D O I
10.1093/comjnl/bxac048
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Completing the classification of tactics and techniques in cyber threat intelligence (CTI) is an important way to obtain tactics, techniques and procedures (TTPs) and portray the behavior of cyber attacks. However, the high level of abstraction of tactics and techniques information and their presence in CTI, usually in the form of natural language text, make it difficult for traditional manual analysis methods and feature engineering-based machine learning methods to complete the classification of tactics and techniques effectively. Meanwhile, flat deep learning methods do not perform well in classifying more fine-grained techniques due to their inability to exploit the hierarchical relationship between tactics and techniques. Therefore, this paper regards the tactics and techniques of TTPs defined in Adversarial Tactics, Techniques and Common Knowledge knowledge base as labels and proposes a Convolutional Neural Network (CNN) model based on hierarchical knowledge migration and attention mechanism for classifying tactics and techniques in CTI, named HM-ACNN (CNN based on hierarchical knowledge migration and attention mechanism). HM-ACNN classifies tactics and techniques into two phases, and the underlying network model for both phases is the Attention-based CNN network. The first step in HM-ACNN is converting the CTI text into a two-dimensional image based on the word embedding model, and then start training the classification of tactics through the CNN structure based on the attention mechanism before the classification of techniques. Secondly, after the tactics classification training is completed, the tactic-to-technique knowledge migration is then completed by transforming the parameters of the CNN layer and the attention layer in the tactics classification process based on the special hierarchical relationship between tactics and techniques. Then, the classification of techniques is finished by fine-tuning. The experimental results show that HM-ACNN performs well in the tactics and techniques classification tasks, and the metric F1 values reach 93.66% and 86.29%, which are better than other models such as CNN, Recurrent Neural Network and CRNN (Recurrent Convolutional Neural Networks).
引用
收藏
页码:1870 / 1881
页数:12
相关论文
共 37 条
[1]  
[Anonymous], 2015, SCI TECH INFORM DEV
[2]   Ontology-Driven Data Semantics Discovery for Cyber-Security [J].
Balduccini, Marcello ;
Kushner, Sarah ;
Speck, Jacquelin .
PRACTICAL ASPECTS OF DECLARATIVE LANGUAGES, PADL 2015, 2015, 9131 :1-16
[3]  
Barnum Sean., 2012, Mitre Corporation, V11, P1
[4]   Cyber-Attacks - Trends, Patterns and Security Countermeasures [J].
Bendovschi, Andreea .
7TH INTERNATIONAL CONFERENCE ON FINANCIAL CRIMINOLOGY 2015, 7TH ICFC 2015, 2015, 28 :24-31
[5]   Representation Learning: A Review and New Perspectives [J].
Bengio, Yoshua ;
Courville, Aaron ;
Vincent, Pascal .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2013, 35 (08) :1798-1828
[6]  
Bianco David., THE PYRAMID OF PAIN
[7]   Graph-based visual analytics for cyber threat intelligence [J].
Boehm, Fabian ;
Menges, Florian ;
Pernul, Guenther .
CYBERSECURITY, 2018, 1 (01)
[8]   Improving SIEM alert metadata aggregation with a novel kill-chain based classification model [J].
Bryant, Blake D. ;
Saiedian, Hossein .
COMPUTERS & SECURITY, 2020, 94
[9]   Recent Cyber Security Attacks and Their Mitigation Approaches - An Overview [J].
Chowdhury, Abdullahi .
APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY, 2016, 651 :54-65
[10]   Cyber Situation Awareness: Modeling Detection of Cyber Attacks With Instance-Based Learning Theory [J].
Dutt, Varun ;
Ahn, Young-Suk ;
Gonzalez, Cleotilde .
HUMAN FACTORS, 2013, 55 (03) :605-618