Efficient Incident Response System on Shared Cyber Threat Information Using SDN and STIX

被引:0
|
作者
Okada, Satoshi [1 ,2 ]
Fujiwara, Yoshiki [1 ]
Fujimoto, Mariko [2 ,3 ]
Matsuda, Wataru [4 ]
Mitsunaga, Takuho [2 ]
机构
[1] Univ Tokyo, Tokyo, Japan
[2] Toyo Univ, Tokyo, Japan
[3] Nagoya Inst Technol, Nagoya, Aichi, Japan
[4] NTT Social Informat Labs, Tokyo, Japan
来源
2021 IEEE INTERNATIONAL CONFERENCE ON COMPUTING (ICOCO) | 2021年
关键词
SDN; STIX; Cyber Security; Automation; Information Sharing;
D O I
10.1109/ICOCO53166.2021.9673536
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cyber threat information sharing is an effective action to detect cyber attacks, especially against sophisticated attackers. For this reason, some organizations related to cyber security, such as ISACs, set up information-sharing schemes. These schemes provide cyber threat information (IP addresses or domains about malicious hosts) to critical infrastructure companies. When a company receives the shared information called indicators, it checks whether its employees' computers are communicating to the mentioned malicious hosts or not. If the communication to malicious hosts is found, it should be blocked to prevent further damage. Usually, this security workflow (receiving indicators, checking communication, and blocking malicious communication) is often done manually. Thus, the workload of the procedure becomes heavier as the number of indicators increases. In this paper, we propose an automated system for efficient indicator handling by combining Software Defined Networking (SDN) and STIX. When the system receives indicators in STIX format, it parses them and changes network configuration dynamically to block communication to malicious hosts. We also compare the required time for handling indicators manually and by using the proposed automated system to show the system's efficiency.
引用
收藏
页码:109 / 114
页数:6
相关论文
共 50 条
  • [1] Contextualized Filtering for Shared Cyber Threat Information
    Dimitriadis, Athanasios
    Prassas, Christos
    Flores, Jose Luis
    Kulvatunyou, Boonserm
    Ivezic, Nenad
    Gritzalis, Dimitris A.
    Mavridis, Ioannis K.
    SENSORS, 2021, 21 (14)
  • [2] Using Cyber Threat Intelligence in SDN Security
    Yurekten, Ozgur
    Demirci, Mehmet
    2017 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2017, : 377 - 382
  • [3] Actionable Cyber Threat Intelligence for Automated Incident Response
    Leite, Cristoffer
    den Hartog, Jerry
    dos Santos, Daniel Ricardo
    Costante, Elisa
    SECURE IT SYSTEMS, NORDSEC 2022, 2022, 13700 : 368 - 385
  • [4] Malware incident response(IR) informed by cyber threat intelligence(CTI)
    Ying HE
    Ellis INGLUT
    Cunjin LUO
    Science China(Information Sciences), 2022, 65 (07) : 256 - 258
  • [5] Malware incident response (IR) informed by cyber threat intelligence (CTI)
    Ying He
    Ellis Inglut
    Cunjin Luo
    Science China Information Sciences, 2022, 65
  • [6] A Comparative Study on Cyber Threat Intelligence: The Security Incident Response Perspective
    Schlette, Daniel
    Caselli, Marco
    Pernul, Gunther
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2021, 23 (04): : 2525 - 2556
  • [7] Malware incident response (IR) informed by cyber threat intelligence (CTI)
    He, Ying
    Inglut, Ellis
    Luo, Cunjin
    SCIENCE CHINA-INFORMATION SCIENCES, 2022, 65 (07)
  • [8] Cyber Threat Intelligence Framework for Incident Response in an Energy Cloud Platform
    Gong, Seonghyeon
    Lee, Changhoon
    ELECTRONICS, 2021, 10 (03) : 1 - 19
  • [9] Design of a Cyber Threat Information Collection System for Cyber Attack Correlation
    Kim, Nakhyun
    Lee, Seulgi
    Cho, Hyeisun
    Kim, Byun-Ik
    Jun, MoonSeog
    2018 INTERNATIONAL CONFERENCE ON PLATFORM TECHNOLOGY AND SERVICE (PLATCON18), 2018, : 216 - 219
  • [10] Cyber Security Incident Handling, Warning and Response System for the European Critical Information Infrastructures (CyberSANE)
    Papastergiou, Spyridon
    Mouratidis, Haralambos
    Kalogeraki, Eleni-Maria
    ENGINEERING APPLICATIONS OF NEURAL NETWORKSX, 2019, 1000 : 476 - 487