Architecting threat hunting system based on the DODAF framework

被引:7
作者
Aghamohammadpour, Ali [1 ]
Mahdipour, Ebrahim [1 ]
Attarzadeh, Iman [2 ]
机构
[1] Islamic Azad Univ, Dept Comp Engn, Sci & Res Branch, Tehran, Iran
[2] Islamic Azad Univ, Fac Engn, Dept Comp Engn, Cent Tehran Branch, Tehran, Iran
关键词
Threat hunting; Threat intelligence; Enterprise architecture; System architecting; Threat modeling;
D O I
10.1007/s11227-022-04808-6
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The importance of large data analytic systems for cyber security is expanding. Thus, collecting systematically, thoroughly assessing, and synthesizing the literature on architectural techniques for developing such systems is critical. There is a general lack of an overview of architectural techniques for developing threat intelligence systems. Threat hunting is an analyst-centric process that helps organizations discover hidden advanced threats that miss by automatic preventative and investigative systems. The Department of Defense Architecture Framework (DODAF) establishes a modeling framework for capturing high-level system design and operational requirements. This paper presents different threat hunting system viewpoints using the DODAF attribute-based method. The proposed architecture enriches by state-of-the-art MITRE's ATT&CK and D3FEND frameworks. Also, we proposed a unique approach to infer malicious threats category associations by comparing suspicious and malicious events' similarities. Using ATT&CK's rich techniques made the similarity between malicious and suspicious files more accurate. Finally, we used a survey questionnaire approach to collect relational data to assess the impact of qualitative attributes on the development of threat hunting processes. We evaluated the proposed hunting architecture using twelve essential quality attributes indirectly. We believe that the proposed method can reduce the architectural shortcomings in threat hunting systems development.
引用
收藏
页码:4215 / 4242
页数:28
相关论文
共 50 条
  • [21] Developing a holistic modeling approach for search-based system architecting
    Wang, Renzhong
    Dagli, Cihan H.
    2013 CONFERENCE ON SYSTEMS ENGINEERING RESEARCH, 2013, 16 : 206 - 215
  • [22] Privacy Preserving Threat Hunting in Smart Home Environments
    Elmisery, Ahmed M.
    Sertovic, Mirela
    ADVANCES IN CYBER SECURITY (ACES 2019), 2020, 1132 : 104 - 120
  • [23] Evolving techniques in cyber threat hunting: A systematic review
    Mahboubi, Arash
    Luong, Khanh
    Aboutorab, Hamed
    Bui, Hang Thanh
    Jarrad, Geoff
    Bahutair, Mohammed
    Camtepe, Seyit
    Pogrebna, Ganna
    Ahmed, Ejaz
    Barry, Bazara
    Gately, Hannah
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2024, 232
  • [24] Intelligent Threat Hunting in Software-Defined Networking
    Schmitt, Steven
    Kandah, Farah I.
    Brownell, Dylan
    2019 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2019,
  • [25] Data-Driven Threat Hunting Using Sysmon
    Mavroeidis, Vasileios
    Josang, Audun
    ICCSP 2018: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY, 2018, : 82 - 88
  • [26] A Deep Learning Model for Threat Hunting in Ethereum Blockchain
    Rabieinejad, Elnaz
    Yazdinejad, Abbas
    Parizi, Reza M.
    2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 1185 - 1190
  • [27] System architecting and design space characterization
    Raz, Ali K.
    Kenley, C. Robert
    DeLaurentis, Daniel A.
    SYSTEMS ENGINEERING, 2018, 21 (03) : 227 - 242
  • [28] Cyber Threat Hunting Through Automated Hypothesis and Multi-Criteria Decision Making
    Horta Neto, Antonio Jose
    Pereira dos Santos, Anderson Fernandes
    2020 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2020, : 1823 - 1830
  • [29] A Machine Learning based Threat Intelligence Framework for Industrial Control System Network Traffic Indicators of Compromise
    Atluri, Venkata
    Horne, Jeff
    SOUTHEASTCON 2021, 2021, : 778 - 782
  • [30] Block Hunter: Federated Learning for Cyber Threat Hunting in Blockchain-Based IIoT Networks
    Yazdinejad, Abbas
    Dehghantanha, Ali
    Parizi, Reza M.
    Hammoudeh, Mohammad
    Karimipour, Hadis
    Srivastava, Gautam
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (11) : 8356 - 8366