Longitudinal analysis of a large corpus of cyber threat descriptions

被引:3
|
作者
Mezzour, Ghita [1 ]
Carley, L. Richard [1 ]
Carley, Kathleen M. [2 ]
机构
[1] Carnegie Mellon Univ, Dept Elect & Comp Engn, 5000 Forbes Ave, Pittsburgh, PA 15213 USA
[2] Carnegie Mellon Univ, Inst Software Res, 5000 Forbes Ave, Pittsburgh, PA 15213 USA
关键词
D O I
10.1007/s11416-014-0217-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Online cyber threat descriptions are rich, but little research has attempted to systematically analyze these descriptions. In this paper, we process and analyze two of Symantec's online threat description corpora. The Anti-Virus (AV) corpus contains descriptions of more than 12,400 threats detected by Symantec's AV, and the Intrusion Prevention System (IPS) corpus contains descriptions of more than 2,700 attacks detected by Symantec's IPS. In our analysis, we quantify the over time evolution of threat severity and type in the corpora. We also assess the amount of time Symantec takes to release signatures for newly discovered threats. Our analysis indicates that a very small minority of threats in the AV corpus are high-severity, whereas the majority of attacks in the IPS corpus are high-severity. Moreover, we find that the prevalence of different threat types such as worms and viruses in the corpora varies considerably over time. Finally, we find that Symantec prioritizes releasing signatures for fast propagating threats.
引用
收藏
页码:11 / 22
页数:12
相关论文
共 50 条
  • [1] Cyber Threat Trees for Large System Threat Cataloging and Analysis
    Ongsakorn, P.
    Turney, K.
    Thornton, M.
    Nair, S.
    Szygenda, S.
    Manikas, T.
    2010 IEEE INTERNATIONAL SYSTEMS CONFERENCE, 2010, : 610 - 615
  • [2] Cyber Threat Detection and Application Analysis
    Yang, Shuangmao
    Wang, Ji
    Zhang, Jing
    Li, Hao
    2016 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY PROCEEDINGS - CYBERC 2016, 2016, : 46 - 49
  • [3] Cyber Threat Hunting Using Large Language Models
    Tanksale, Vinayak
    PROCEEDINGS OF NINTH INTERNATIONAL CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGY, VOL 5, ICICT 2024, 2024, 1000 : 629 - 641
  • [4] A survey of large language models for cyber threat detection☆
    Chen, Yiren
    Cui, Mengjiao
    Wang, Ding
    Cao, Yiyang
    Yang, Peian
    Jiang, Bo
    Lu, Zhigang
    Liu, Baoxu
    COMPUTERS & SECURITY, 2024, 145
  • [5] Large-Scale Analysis of Continuous Data in Cyber-Warfare Threat Detection
    Acosta, William
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2011, : 317 - 319
  • [6] Corpus and Deep Learning Classifier for Collection of Cyber Threat Indicators in Twitter Stream
    Behzadan, Vahid
    Aguirre, Carlos
    Bose, Avishek
    Hsu, William
    2018 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2018, : 5002 - 5007
  • [7] THREAT: A Large Annotated Corpus for Detection of Violent Threats
    Hammer, Hugo L.
    Riegler, Michael A.
    Ovrelid, Lilja
    Velldal, Erik
    2019 INTERNATIONAL CONFERENCE ON CONTENT-BASED MULTIMEDIA INDEXING (CBMI), 2019,
  • [8] Cyber threat
    Herzenberg, Caroline
    NEW SCIENTIST, 2013, 219 (2936) : 32 - 32
  • [9] Cyber Threat Analysis and Trustworthy Artificial Intelligence
    Wang, Shuangbao Paul
    Arafin, Md Tanvir
    Osuagwu, Onyema
    Wandji, Ketchiozo
    2022 6TH INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY, CSP 2022, 2022, : 86 - 90
  • [10] IWTW: A Framework for IoWT Cyber Threat Analysis
    Jeon, GyuHyun
    Jin, Hojun
    Lee, Ju Hyeon
    Jeon, Seungho
    Seo, Jung Taek
    CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2024, 141 (02): : 1575 - 1622