STIXGEN - A novel framework for Automatic Generation of Structured Cyber Threat Information

被引:7
|
作者
Iqbal, Zafar [1 ]
Anwar, Zahid [1 ,2 ]
Mumtaz, Rafia [1 ]
机构
[1] NUST, Islamabad, Pakistan
[2] Fontbonne Univ, St Louis, MO USA
来源
2018 INTERNATIONAL CONFERENCE ON FRONTIERS OF INFORMATION TECHNOLOGY (FIT 2018) | 2018年
关键词
Advanced Persistent Threat; STIX; TAXII; OpenIOC; Point of Sale; Tactics Techniques; Training and Procedures; Domain Names (DN);
D O I
10.1109/FIT.2018.00049
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A large number of Advanced Persistent Threats (APTs) are being launched by nation-states, organizations and individuals within and across borders. It has been observed that APTs launched against an organization subsequently succeeded with high probability against other similar organizations. Therefore, it has become a need of the time that organizations accumulate and share Cyber Threat Information (CTI) with peers in a structured form for timely prevention and recovery of an attack. Although a large volume of cyber threat data is available on different security blogs, however this data is mostly distributed and unstructured. Presently, there is a lack of easy to use frameworks, which produce and share CTI in a structured form. Furthermore, publicly available structured data is sparse and is mostly redundant, irrelevant and erroneous. Ironically, no method has yet been devised to generate the distinct, meaningful and error-free structured data from text. In this regard, we used the standard "Structured Threat Information eXpression (STIX)". Although, STIX is a comprehensive effort, it is slow in adoption. This is due to a largely manual STIX generation process, which is naturally difficult and produces errors. We take all these deficits as a barrier in STIX utilization and these shortcomings have become a motivation for our research work. We not only proposed the STIXGEN framework, but also developed its prototype for a proof of concept. We perform evaluation of our proposed solution in terms of accuracy and effectiveness. At first, we collected different text reports, generated their STIXs via online tools and by using STIXGEN, then we compared and shared their results with domain experts. It was found that our proposed solution's results are better than other tools and are distinct, threat relevant, and error-free. Subsequently, we presented a comparative analysis of the features provided by different STIX generator tools. At the end, we provide a comprehensive STIX dataset of APTs launched against renowned industries on github, so that researchers and analysts can use it for their research.
引用
收藏
页码:241 / 246
页数:6
相关论文
共 9 条
  • [1] APT-scope: A novel framework to predict advanced persistent threat groups from enriched heterogeneous information network of cyber threat intelligence
    Gulbay, Burak
    Demirci, Mehmet
    ENGINEERING SCIENCE AND TECHNOLOGY-AN INTERNATIONAL JOURNAL-JESTECH, 2024, 57
  • [2] Automated Structured Threat Information Expression (STIX) Document Generation with Privacy Preservation
    Sadique, Farhan
    Cheung, Sui
    Vakilinia, Iman
    Badsha, Shahriar
    Sengupta, Shamik
    2018 9TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2018, : 847 - 853
  • [3] Data-driven analytics for cyber-threat intelligence and information sharing
    Qamar, Sara
    Anwar, Zahid
    Rahman, Mohammad Ashiqur
    Al-Shaer, Ehab
    Chu, Bei-Tseng
    COMPUTERS & SECURITY, 2017, 67 : 35 - 58
  • [4] Evaluation and Enhancement of the Actionability of Publicly Available Cyber Threat Information in Digital Forensics
    Dimitriadis, Athanasios
    Lontzetidis, Efstratios
    Mavridis, Ioannis
    PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2021, : 318 - 323
  • [5] Automatic Generation of MAEC and STIX Standards for Android Malware Threat Intelligence
    Park, Jungsoo
    Vu, Long Nguyen
    Bencivengo, George
    Jung, Souhwan
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (08): : 3420 - 3436
  • [6] Efficient Incident Response System on Shared Cyber Threat Information Using SDN and STIX
    Okada, Satoshi
    Fujiwara, Yoshiki
    Fujimoto, Mariko
    Matsuda, Wataru
    Mitsunaga, Takuho
    2021 IEEE INTERNATIONAL CONFERENCE ON COMPUTING (ICOCO), 2021, : 109 - 114
  • [7] Fighting Botnets with Cyber-Security Analytics Dealing with heterogeneous cyber-security information in new generation SIEMs
    Gallego-Nicasio Crespo, Beatriz
    Garwood, Alan
    2014 NINTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2015, : 192 - 198
  • [8] An Association Rule Mining-Based Framework for Profiling Regularities in Tactics Techniques and Procedures of Cyber Threat Actors
    Noor, Umara
    Anwar, Zahid
    Noor, Umara
    Anwar, Zahid
    Rashid, Zahid
    2018 INTERNATIONAL CONFERENCE ON SMART COMPUTING AND ELECTRONIC ENTERPRISE (ICSCEE), 2018,
  • [9] A Novel Network Forensic Framework for Advanced Persistent Threat Attack Attribution Through Deep Learning
    Mei, Yangyang
    Han, Weihong
    Li, Shudong
    Lin, Kaihan
    Tian, Zhihong
    Li, Shumei
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2024, 25 (09) : 12131 - 12140