Architecting threat hunting system based on the DODAF framework

被引:7
作者
Aghamohammadpour, Ali [1 ]
Mahdipour, Ebrahim [1 ]
Attarzadeh, Iman [2 ]
机构
[1] Islamic Azad Univ, Dept Comp Engn, Sci & Res Branch, Tehran, Iran
[2] Islamic Azad Univ, Fac Engn, Dept Comp Engn, Cent Tehran Branch, Tehran, Iran
关键词
Threat hunting; Threat intelligence; Enterprise architecture; System architecting; Threat modeling;
D O I
10.1007/s11227-022-04808-6
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The importance of large data analytic systems for cyber security is expanding. Thus, collecting systematically, thoroughly assessing, and synthesizing the literature on architectural techniques for developing such systems is critical. There is a general lack of an overview of architectural techniques for developing threat intelligence systems. Threat hunting is an analyst-centric process that helps organizations discover hidden advanced threats that miss by automatic preventative and investigative systems. The Department of Defense Architecture Framework (DODAF) establishes a modeling framework for capturing high-level system design and operational requirements. This paper presents different threat hunting system viewpoints using the DODAF attribute-based method. The proposed architecture enriches by state-of-the-art MITRE's ATT&CK and D3FEND frameworks. Also, we proposed a unique approach to infer malicious threats category associations by comparing suspicious and malicious events' similarities. Using ATT&CK's rich techniques made the similarity between malicious and suspicious files more accurate. Finally, we used a survey questionnaire approach to collect relational data to assess the impact of qualitative attributes on the development of threat hunting processes. We evaluated the proposed hunting architecture using twelve essential quality attributes indirectly. We believe that the proposed method can reduce the architectural shortcomings in threat hunting systems development.
引用
收藏
页码:4215 / 4242
页数:28
相关论文
共 50 条
  • [1] Architecting threat hunting system based on the DODAF framework
    Ali Aghamohammadpour
    Ebrahim Mahdipour
    Iman Attarzadeh
    The Journal of Supercomputing, 2023, 79 : 4215 - 4242
  • [2] A Threat Hunting Framework for Industrial Control Systems
    Jadidi, Zahra
    Lu, Yi
    IEEE ACCESS, 2021, 9 : 164118 - 164130
  • [3] Use of threat modeling when architecting a healthcare system
    DeZulueta, M
    Adjouadi, M
    8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL I, PROCEEDINGS: INFORMATION SYSTEMS, TECHNOLOGIES AND APPLICATIONS, 2004, : 6 - 12
  • [4] Building Machine Learning-based Threat Hunting System from Scratch
    Chen, Chung-Kuan
    Lin, Si-Chen
    Huang, Szu-Chun
    Chu, Yung-Tien
    Lei, Chin-Laung
    Huang, Chun-Ying
    DIGITAL THREATS: RESEARCH AND PRACTICE, 2022, 3 (03):
  • [5] BTH: Behavior-Based Structured Threat Hunting Framework to Analyze and Detect Advanced Adversaries
    Bhardwaj, Akashdeep
    Kaushik, Keshav
    Alomari, Abdullah
    Alsirhani, Amjad
    Alshahrani, Mohammed Mujib
    Bharany, Salil
    ELECTRONICS, 2022, 11 (19)
  • [6] Skade - A Challenge Management System for Cyber Threat Hunting
    Sommestad, Teodor
    Karlzen, Henrik
    Kvist, Hanna
    Gustafsson, Hanna
    COMPUTER SECURITY. ESORICS 2023 INTERNATIONAL WORKSHOPS, PT I, 2024, 14398 : 84 - 103
  • [7] A Survey on Threat Hunting in Enterprise Networks
    Nour, Boubakr
    Pourzandi, Makan
    Debbabi, Mourad
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2023, 25 (04): : 2299 - 2324
  • [8] Threat Hunting using GRR Rapid Response
    Rasheed, Hussein
    Hadi, Ali
    Khader, Mariam
    2017 INTERNATIONAL CONFERENCE ON NEW TRENDS IN COMPUTING SCIENCES (ICTCS), 2017, : 155 - 160
  • [9] Detecting Advanced Persistent Threat Malware Using Machine Learning-Based Threat Hunting
    Lin, Tien-Chih
    Guo, Cheng-Chung
    Yang, Chu -Sing
    PROCEEDINGS OF THE 18TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2019), 2019, : 760 - 768
  • [10] FedChain-Hunter: A reliable and privacy-preserving aggregation for federated threat hunting framework in SDN-based IIoT
    Duy, Phan The
    Quyen, Nguyen Huu
    Khoa, Nghi Hoang
    Tran, Tuan-Dung
    Pham, Van-Hau
    INTERNET OF THINGS, 2023, 24