A Reliability Comparison Method for OSINT Validity Analysis

被引:20
作者
Gong, Seonghyeon [1 ]
Cho, Jaeik [2 ]
Lee, Changhoon [1 ]
机构
[1] Seoul Natl Univ Sci & Technol, Dept Comp Engn, Cryptog & Informat Secur Lab, Seoul 01811, South Korea
[2] IBM Secur, Secur Architect Team, Seoul 07326, South Korea
关键词
Cyber security; cyber-threat intelligence; data mining; open source intelligence; reliability comparison; validity analysis; INTELLIGENCE;
D O I
10.1109/TII.2018.2857213
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber-threat intelligence (CTI) is a knowledge-based threat management system that addresses increasing cyber threats. The CTI system creates reputation information for network resources such as IP, URL, and file hash-based on security data collected from security information and event management (SIEM) systems. This information can be applied extensively in industrial infrastructures to provide an effective response process for cyber attacks. This information can also be applied to the security systems of internal IT and OT infrastructures such as Internet objects (loT) and Surveillance Control and Data Acquisition (SCADA) networks. However, because the performance of infrastructure security using CTI depends on the accuracy of the data on which the system is based, careful consideration of the accuracy of the data is required. In this paper, we propose a new model that can analyze the reliability and validity of data by using comparative analysis between CTI data and present a criterion for evaluating the reliability of feed providing CTI data. The experiment uses approximately 40 000 datasets to provide data accuracy results for four CTI feeds. These results can serve as a basis for substantive validation to use CTI data.
引用
收藏
页码:5428 / 5435
页数:8
相关论文
共 23 条
[1]  
Amoroso EG, 2011, CYBER ATTACKS: PROTECTING NATIONAL INFRASTRUCTURE, P1
[2]  
[Anonymous], WANN IND NETW ERR CO
[3]  
[Anonymous], 2010, Cluster of European Research Projects on the Internet of Things, DOI [DOI 10.2759/26127, 10.2759/26127]
[4]  
[Anonymous], EST NUMB ENT GOV IOT
[5]  
[Anonymous], 2016, IND CONTROL SYSTEMS
[6]   Internet of Things: Applications and Challenges in Technology and Standardization [J].
Bandyopadhyay, Debasis ;
Sen, Jaydip .
WIRELESS PERSONAL COMMUNICATIONS, 2011, 58 (01) :49-69
[7]  
Barnum S., 2012, MITRE CORPORATION, V11, P1
[8]  
Burger E.W., 2014, P 2014 ACM WORKSHOP, P51, DOI DOI 10.1145/2663876.2663883
[9]  
Chen HC, 2012, MIS QUART, V36, P1165
[10]  
Columbus L., 2016, Forbes