Data-driven analytics for cyber-threat intelligence and information sharing

被引:87
作者
Qamar, Sara [1 ]
Anwar, Zahid [1 ,2 ]
Rahman, Mohammad Ashiqur [3 ]
Al-Shaer, Ehab [4 ]
Chu, Bei-Tseng [4 ]
机构
[1] Natl Univ Sci & Technol, Sch Elect Engn & Comp Sci, Islamabad, Pakistan
[2] Fontbonne Univ, Dept Math & Comp Sci, St Louis, MO USA
[3] Tennessee Technol Univ, Dept Comp Sci, Cookeville, TN USA
[4] Univ N Carolina, Dept Software & Informat Syst, Charlotte, NC USA
关键词
Ontology; STIX; Network; Risk analysis; Impact; Reachability; Cyber threat intelligence; Attribution; Reasoning; OWL; CONFIGURATION;
D O I
10.1016/j.cose.2017.02.005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Efficient analysis of shared Cyber Threat Intelligence (CTI) information is crucial for network risk assessment and security hardening. There is a growing interest in implementing a proactive line of defense through threat profiling. However, determining the resiliency of a particular network with respect to relevant threats reported in CTI shared data remains a challenge, largely due to the lack of semantics and contextual information present in textual representations of the threat knowledge. To overcome the limitations of existing CTI frameworks, we devise a threat analytics framework based on Web Ontology Language (OWL) for formal specification, semantic reasoning, and contextual analysis, allowing the derivation of network associated threats from large volumes of shared threat feeds. Our ontology represents constructs of Structured Threat Information eXpression (STIX) with the additional concepts of Cyber Observable eXpression (CybOX), network configurations, and Common Vulnerabilities and Exposure (CVE) for risk analysis and threat actor profiling. The framework provides an automated mechanism to investigate cyber threats targeting the network under question by classifying the threat relevance, determining threat likelihood, identifying the affected and exposed assets through formulated rules and inferences. We perform a comprehensive structural and conceptual evaluation of critical advanced persistent threats (APTs) collected from credible sources and determine their relevance and risk posed to realistic network case studies. Finally we show that the proposed framework is novel in the type of analytics it provides and outperforms other competing approaches in terms of efficiency and effectiveness. (C) 2017 Elsevier Ltd. All rights reserved.
引用
收藏
页码:35 / 58
页数:24
相关论文
共 62 条
[1]  
[Anonymous], 2013, OP SOURC OWL DL REAS
[2]  
[Anonymous], 2011, NS-3
[3]  
[Anonymous], 2014, Cyber Defense and Situational Awareness
[4]  
[Anonymous], 2015, STIX SCHEM REP
[5]  
[Anonymous], 2014, INT POW DEF
[6]  
[Anonymous], [No title captured]
[7]  
Bob Gourley, 2014, CYB THREAT INT FEEDS
[8]  
Burger E.W., 2014, P 2014 ACM WORKSHOP, P51, DOI DOI 10.1145/2663876.2663883
[9]   Cyber security information exchange to gain insight into the effects of cyber threats and incidents [J].
Fransen, F. ;
Smulders, A. ;
Kerkdijk, R. .
ELEKTROTECHNIK UND INFORMATIONSTECHNIK, 2015, 132 (02) :106-112
[10]  
FTR-Team, 2012, INS APT CAMP MULT TA