Longitudinal analysis of a large corpus of cyber threat descriptions

被引:3
|
作者
Mezzour, Ghita [1 ]
Carley, L. Richard [1 ]
Carley, Kathleen M. [2 ]
机构
[1] Carnegie Mellon Univ, Dept Elect & Comp Engn, 5000 Forbes Ave, Pittsburgh, PA 15213 USA
[2] Carnegie Mellon Univ, Inst Software Res, 5000 Forbes Ave, Pittsburgh, PA 15213 USA
关键词
D O I
10.1007/s11416-014-0217-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Online cyber threat descriptions are rich, but little research has attempted to systematically analyze these descriptions. In this paper, we process and analyze two of Symantec's online threat description corpora. The Anti-Virus (AV) corpus contains descriptions of more than 12,400 threats detected by Symantec's AV, and the Intrusion Prevention System (IPS) corpus contains descriptions of more than 2,700 attacks detected by Symantec's IPS. In our analysis, we quantify the over time evolution of threat severity and type in the corpora. We also assess the amount of time Symantec takes to release signatures for newly discovered threats. Our analysis indicates that a very small minority of threats in the AV corpus are high-severity, whereas the majority of attacks in the IPS corpus are high-severity. Moreover, we find that the prevalence of different threat types such as worms and viruses in the corpora varies considerably over time. Finally, we find that Symantec prioritizes releasing signatures for fast propagating threats.
引用
收藏
页码:11 / 22
页数:12
相关论文
共 50 条
  • [41] Modeling Cyber Threat Intelligence
    Bromander, Siri
    Swimmer, Morton
    Eian, Martin
    Skjotskift, Geir
    Borg, Fredrik
    ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 273 - 280
  • [42] Is jihadism a cyber-threat?
    Torres Soriano, Manuel R.
    REVISTA DE OCCIDENTE, 2015, (406) : 20 - 34
  • [43] Cyber Threat Intelligence 101
    Dror-John Röcher
    Datenschutz und Datensicherheit - DuD, 2018, 42 (10) : 623 - 628
  • [44] Unifying Cyber Threat Intelligence
    Menges, Florian
    Sperl, Christine
    Pernul, Guenther
    TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, TRUSTBUS 2019, 2019, 11711 : 161 - 175
  • [45] Combating the insider cyber threat
    Greitzer, Frank L.
    Moore, Andrew P.
    Cappelli, Dawn M.
    Andrews, Dee H.
    Carroll, Lynn A.
    Hull, Thomas D.
    IEEE SECURITY & PRIVACY, 2008, 6 (01) : 61 - 64
  • [46] Cyber Threat Intelligence for "Things"
    Wagner, Thomas D.
    2019 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBER SA), 2019,
  • [47] Debating the Chinese Cyber Threat
    Brenner, Joel
    Lindsay, Jon R.
    INTERNATIONAL SECURITY, 2015, 40 (01) : 191 - 193
  • [48] CYBER THREAT MODELING FRAMEWORK
    Raposo de Melo, Renato Carvalho
    Albuquerque, Robson de Oliveira
    Lopes de Mendonca, Fabio Lficio
    2022 17TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI), 2022,
  • [49] Epoche, Verbal Descriptions and Corpus Size in the Conduct and Analysis of Explicitation Interviews
    Coupe, Christophe
    Ollagnier-Beldame, Magali
    CONSTRUCTIVIST FOUNDATIONS, 2019, 14 (02): : 158 - 160
  • [50] Cyber-Threat Proliferation
    Kellerman, Tom
    IEEE SECURITY & PRIVACY, 2010, 8 (03) : 70 - 73