Architecting threat hunting system based on the DODAF framework

被引:7
作者
Aghamohammadpour, Ali [1 ]
Mahdipour, Ebrahim [1 ]
Attarzadeh, Iman [2 ]
机构
[1] Islamic Azad Univ, Dept Comp Engn, Sci & Res Branch, Tehran, Iran
[2] Islamic Azad Univ, Fac Engn, Dept Comp Engn, Cent Tehran Branch, Tehran, Iran
关键词
Threat hunting; Threat intelligence; Enterprise architecture; System architecting; Threat modeling;
D O I
10.1007/s11227-022-04808-6
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The importance of large data analytic systems for cyber security is expanding. Thus, collecting systematically, thoroughly assessing, and synthesizing the literature on architectural techniques for developing such systems is critical. There is a general lack of an overview of architectural techniques for developing threat intelligence systems. Threat hunting is an analyst-centric process that helps organizations discover hidden advanced threats that miss by automatic preventative and investigative systems. The Department of Defense Architecture Framework (DODAF) establishes a modeling framework for capturing high-level system design and operational requirements. This paper presents different threat hunting system viewpoints using the DODAF attribute-based method. The proposed architecture enriches by state-of-the-art MITRE's ATT&CK and D3FEND frameworks. Also, we proposed a unique approach to infer malicious threats category associations by comparing suspicious and malicious events' similarities. Using ATT&CK's rich techniques made the similarity between malicious and suspicious files more accurate. Finally, we used a survey questionnaire approach to collect relational data to assess the impact of qualitative attributes on the development of threat hunting processes. We evaluated the proposed hunting architecture using twelve essential quality attributes indirectly. We believe that the proposed method can reduce the architectural shortcomings in threat hunting systems development.
引用
收藏
页码:4215 / 4242
页数:28
相关论文
共 50 条
  • [31] Threat Modeling and Threat Intelligence System for Cloud using Splunk
    Ananthapadmanabhan, A.
    Achuthan, Krishnashree
    2022 10TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSICS AND SECURITY (ISDFS), 2022,
  • [32] Cyber threat detection: Unsupervised hunting of anomalous commands (UHAC)
    Kayhan, Varol O.
    Agrawal, Manish
    Shivendu, Shivendu
    DECISION SUPPORT SYSTEMS, 2023, 168
  • [33] Accurate threat hunting in industrial internet of things edge devices
    Yazdinejad, Abbas
    Zolfaghari, Behrouz
    Dehghantanha, Ali
    Karimipour, Hadis
    Srivastava, Gautam
    Parizi, Reza M.
    DIGITAL COMMUNICATIONS AND NETWORKS, 2023, 9 (05) : 1123 - 1130
  • [34] From TTP to IoC: Advanced Persistent Graphs for Threat Hunting
    Berady, Aimad
    Jaume, Mathieu
    Tong, Valerie Viet Triem
    Guette, Gilles
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2021, 18 (02): : 1321 - 1333
  • [35] A Machine Learning Approach to Threat Hunting in Malicious PDF Files
    Teymourlouei, Haydar
    Harris, Vareva E.
    2023 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE, CSCI 2023, 2023, : 782 - 787
  • [36] Design and Development of Automated Threat Hunting in Industrial Control Systems
    Arafune, Masumi
    Rajalakshmi, Sidharth
    Jaldon, Luigi
    Jadidi, Zahra
    Pal, Shantanu
    Foo, Ernest
    Venkatachalam, Nagarajan
    2022 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS AND OTHER AFFILIATED EVENTS (PERCOM WORKSHOPS), 2022,
  • [37] Modelling Indicators of Behaviour for Cyber Threat Hunting via Sysmon
    Chetwyn, Robert
    Eian, Martin
    Josang, Audun
    PROCEEDINGS OF THE 2024 EUROPEAN INTERDISCIPLINARY CYBERSECURITY CONFERENCE, EICC 2024, 2024, : 95 - 104
  • [38] Processes for System Family Architecting, Design, and Integration
    Sage, Andrew P.
    Biemer, Steven M.
    IEEE SYSTEMS JOURNAL, 2007, 1 (01): : 5 - 16
  • [39] A system architecting tool for mechatronic systems design
    Komoto, H.
    Tomiyama, T.
    CIRP ANNALS-MANUFACTURING TECHNOLOGY, 2010, 59 (01) : 171 - 174
  • [40] BASNEA: Threat Hunting for Ethereum Smart Contract Based on Backtrackless Aligned-Spatial Network Entity Alignment
    Du, Xiangyu
    Jiang, Zhengwei
    Jiang, Jun
    Zhang, Kai
    Fan, Zijing
    Dong, Fangming
    Li, Ning
    Liu, Baoxu
    SCIENCE OF CYBER SECURITY, SCISEC 2022, 2022, 13580 : 421 - 436