Longitudinal analysis of a large corpus of cyber threat descriptions

被引:3
|
作者
Mezzour, Ghita [1 ]
Carley, L. Richard [1 ]
Carley, Kathleen M. [2 ]
机构
[1] Carnegie Mellon Univ, Dept Elect & Comp Engn, 5000 Forbes Ave, Pittsburgh, PA 15213 USA
[2] Carnegie Mellon Univ, Inst Software Res, 5000 Forbes Ave, Pittsburgh, PA 15213 USA
关键词
D O I
10.1007/s11416-014-0217-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Online cyber threat descriptions are rich, but little research has attempted to systematically analyze these descriptions. In this paper, we process and analyze two of Symantec's online threat description corpora. The Anti-Virus (AV) corpus contains descriptions of more than 12,400 threats detected by Symantec's AV, and the Intrusion Prevention System (IPS) corpus contains descriptions of more than 2,700 attacks detected by Symantec's IPS. In our analysis, we quantify the over time evolution of threat severity and type in the corpora. We also assess the amount of time Symantec takes to release signatures for newly discovered threats. Our analysis indicates that a very small minority of threats in the AV corpus are high-severity, whereas the majority of attacks in the IPS corpus are high-severity. Moreover, we find that the prevalence of different threat types such as worms and viruses in the corpora varies considerably over time. Finally, we find that Symantec prioritizes releasing signatures for fast propagating threats.
引用
收藏
页码:11 / 22
页数:12
相关论文
共 50 条
  • [21] Threat Analysis of Cyber Attacks with Attack Tree+
    Wang, Ping (pingwang@mail.ksu.edu.tw), 1600, Ubiquitous International (05):
  • [22] Threat Analysis and Risk Assessment in Automotive Cyber Security
    Ward, David
    Ibarra, Ireri
    Ruddle, Alastair
    SAE INTERNATIONAL JOURNAL OF PASSENGER CARS-ELECTRONIC AND ELECTRICAL SYSTEMS, 2013, 6 (02): : 507 - 513
  • [23] A Role Modeling Based Approach for Cyber Threat Analysis
    Drouot, Bastien
    Golra, Fahad R.
    Champeau, Joel
    MODEL-DRIVEN ENGINEERING AND SOFTWARE DEVELOPMENT, MODELSWARD 2019, 2020, 1161 : 76 - 100
  • [24] Proactive defense model based on cyber threat analysis
    Osako, Takeshi
    Suzuki, Tomoyoshi
    Iwata, Yoichi
    Fujitsu Scientific and Technical Journal, 2016, 52 (03): : 72 - 77
  • [25] Proactive Defense Model Based on Cyber Threat Analysis
    Osako, Takeshi
    Suzuki, Tomoyoshi
    Iwata, Yoichi
    FUJITSU SCIENTIFIC & TECHNICAL JOURNAL, 2016, 52 (03): : 72 - 77
  • [26] The cyber threat landscape
    Sutton, Martin
    Journal of the Institute of Telecommunications Professionals, 2020, 14 : 30 - 35
  • [27] Tackling the cyber threat
    Bouhdada, Jalal
    NUCLEAR ENGINEERING INTERNATIONAL, 2017, 62 (759): : 26 - 26
  • [28] Actionable Cyber Threat Intelligence using Knowledge Graphs and Large Language Models
    Fieblinger, Romy
    Alam, Md Tanvirul
    Rastogi, Nidhi
    9TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS, EUROS&PW 2024, 2024, : 100 - 111
  • [29] Deep AI-Powered Cyber Threat Analysis in IIoT
    Bibi, Iram
    Akhunzada, Adnan
    Kumar, Neeraj
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (09) : 7749 - 7760
  • [30] XAITrafficIntell: Interpretable Cyber Threat Intelligence for Darknet Traffic Analysis
    Arikkat, Dincy R.
    Vinod, P.
    Rehiman, K. A. Rafidha
    Rasheed, Rabeeba Abdul
    Conti, Mauro
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2024, 32 (04)