Automated Cyber Threat Intelligence Generation from Honeypot Data

被引:5
作者
Sanjeev, Kumar [1 ]
Janet, B. [2 ]
Eswari, R. [2 ]
机构
[1] Ctr Dev Adv Comp C DAC, Mohali, India
[2] Natl Inst Technol, Tiruchirappalli, India
来源
INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES, ICICCT 2019 | 2020年 / 89卷
关键词
Cyber threat intelligence; Cyber security; Honeypots; Malware; Deep learning;
D O I
10.1007/978-981-15-0146-3_56
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The evolving of advance cyber threats requires the cyber security specialist and system analyst to detect, analyse and timely react against such kind of cyber attacks. In real practical scenario, the timely dissemination of attack information is a challenge and that is not possible without cyber threat intelligence with inclusion of deep analysis of attack features and attack contextual information. In this paper, automated proactive approach for cyber threat intelligence generation is presented integrated with standard data sharing formats that can act as attack indicator for the security defence mechanism put in place in an organization such as SIEM. The strength of Honeypot-based approaches for cyber threat intelligence is proven with well-defined use cases. The capabilities of Honeypots to detect zero-day attacks can be benefited if and only if the attack events are timely digested by the security solutions and that is only possible by sharing the attack events in standard data sharing languages. The developed system is fully automated that include captured attack data is processed by various automated analysis engines, augmenting the contextual information and applying deep learning models for later threat prediction. Finally, we propose a system design incorporating deep learning neural network-based cyber threat intelligence generation for cyber threat prediction. To achieve all these, cluster of VM Honeypots are deployed in a public IP4 network.
引用
收藏
页码:591 / 598
页数:8
相关论文
共 9 条
[1]  
Ailianos T, 2014, THESIS
[2]  
Alsmadi I., 2019, The NICE Cyber Security Framework: Cyber Security Intelligence and Analytics
[3]  
Ernst and Young Global Limited, 2014, CYB THREAT INT HOW G
[4]  
Kaur Sahi Asst S, 2017, INT J ENG RES COMPUT, V4, P79
[5]  
Kumar S., 2012, Int. J. Comput. Theory Eng, V4, P537, DOI DOI 10.7763/IJCTE.2012.V4.527
[6]  
Planque D., 2017, THESIS LEIDEN U NETH
[7]  
Qiang L, 2017, ICST I COMPUT SCI SO, V190, P92103
[8]   The honeynet project: Trapping the hackers [J].
Spitzner, L. (lance@honeynet.org), 1600, Institute of Electrical and Electronics Engineers Inc. (01) :15-23
[9]  
Watkins K-F., 2017, M-Trends 2017: A view from the front lines, V4