Architecting threat hunting system based on the DODAF framework

被引:7
作者
Aghamohammadpour, Ali [1 ]
Mahdipour, Ebrahim [1 ]
Attarzadeh, Iman [2 ]
机构
[1] Islamic Azad Univ, Dept Comp Engn, Sci & Res Branch, Tehran, Iran
[2] Islamic Azad Univ, Fac Engn, Dept Comp Engn, Cent Tehran Branch, Tehran, Iran
关键词
Threat hunting; Threat intelligence; Enterprise architecture; System architecting; Threat modeling;
D O I
10.1007/s11227-022-04808-6
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The importance of large data analytic systems for cyber security is expanding. Thus, collecting systematically, thoroughly assessing, and synthesizing the literature on architectural techniques for developing such systems is critical. There is a general lack of an overview of architectural techniques for developing threat intelligence systems. Threat hunting is an analyst-centric process that helps organizations discover hidden advanced threats that miss by automatic preventative and investigative systems. The Department of Defense Architecture Framework (DODAF) establishes a modeling framework for capturing high-level system design and operational requirements. This paper presents different threat hunting system viewpoints using the DODAF attribute-based method. The proposed architecture enriches by state-of-the-art MITRE's ATT&CK and D3FEND frameworks. Also, we proposed a unique approach to infer malicious threats category associations by comparing suspicious and malicious events' similarities. Using ATT&CK's rich techniques made the similarity between malicious and suspicious files more accurate. Finally, we used a survey questionnaire approach to collect relational data to assess the impact of qualitative attributes on the development of threat hunting processes. We evaluated the proposed hunting architecture using twelve essential quality attributes indirectly. We believe that the proposed method can reduce the architectural shortcomings in threat hunting systems development.
引用
收藏
页码:4215 / 4242
页数:28
相关论文
共 50 条
  • [41] Enhancements to Threat, Vulnerability, and Mitigation Knowledge for Cyber Analytics, Hunting, and Simulations
    Hemberg, Erik
    Turner, Matthew J.
    Rutar, Nick
    O'Reilly, Una-May
    DIGITAL THREATS: RESEARCH AND PRACTICE, 2024, 5 (01):
  • [42] Cyber threat hunting using unsupervised federated learning and adversary emulation
    Sheikhi, Saeid
    Kostakos, Panos
    2023 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR, 2023, : 315 - 320
  • [43] ACCURIFY: Automated New Testflows Generation for Attack Variants in Threat Hunting
    Nour, Boubakr
    Pourzandi, Makan
    Qureshi, Rushaan Kamran
    Debbabi, Mourad
    FOUNDATIONS AND PRACTICE OF SECURITY, PT II, FPS 2023, 2024, 14552 : 52 - 69
  • [44] Offensive Security: Towards Proactive Threat Hunting via Adversary Emulation
    Ajmal, Abdul Basit
    Shah, Munam Ali
    Maple, Carsten
    Asghar, Muhammad Nabeel
    Ul Islam, Saif
    IEEE ACCESS, 2021, 9 : 126023 - 126033
  • [45] Efficient Threat Hunting Methodology for Analyzing Malicious Binaries in Windows Platform
    Elmisery, Ahmed M.
    Sertovic, Mirela
    Qasem, Mamoun
    SERVICE-ORIENTED COMPUTING, ICSOC 2020, 2021, 12632 : 627 - 641
  • [46] System Architecting Approach for Designing Deep Learning Models
    Gottapu, Ram Deepak
    Dagli, Cihan H.
    17TH ANNUAL CONFERENCE ON SYSTEMS ENGINEERING RESEARCH (CSER), 2019, 153 : 37 - 44
  • [47] STRIDE threat model-based framework for assessing the vulnerabilities of modern vehicles
    Abuabed, Zaina
    Alsadeh, Ahmad
    Taweel, Adel
    COMPUTERS & SECURITY, 2023, 133
  • [48] Threat Model-based Security Test Case Generation Framework and Tool
    Fu, Chang-Lan
    Zhang, He
    Li, Feng-Long
    Kuang, Hong-Yu
    Ruan Jian Xue Bao/Journal of Software, 2024, 35 (10): : 4573 - 4603
  • [49] Threat driven modeling framework using petri nets for e-learning system
    Khamparia, Aditya
    Pandey, Babita
    SPRINGERPLUS, 2016, 5
  • [50] A framework for threat intelligence extraction and fusion
    Guo, Yongyan
    Liu, Zhengyu
    Huang, Cheng
    Wang, Nannan
    Min, Hai
    Guo, Wenbo
    Liu, Jiayong
    COMPUTERS & SECURITY, 2023, 132