CREATING PROACTIVE CYBER THREAT INTELLIGENCE WITH HACKER EXPLOIT LABELS : A DEEP TRANSFER LEARNING APPROACH

被引:5
|
作者
Ampel, Benjamin M. [1 ]
Samtani, Sagar [2 ]
Zhu, Hongyi [3 ]
Chen, Hsinchun [1 ]
机构
[1] Univ Arizona, Dept Management Informat Syst, Tucson, AZ 85721 USA
[2] Indiana Univ, Dept Operat & Decis Technol, Bloomington, IN USA
[3] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX USA
基金
美国国家科学基金会;
关键词
Hacker forums; cyber threat intelligence; cybersecurity analytics; deep transfer learning; deep learning; exploit labeling; computational design science; DESIGN-SCIENCE; CLASSIFICATION; IDENTIFICATION; ANALYTICS; IMPACT; LSTM;
D O I
10.25300/MISQ/2023/17316
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid proliferation of complex information systems has been met by an ever-increasing quantity of exploits that can cause irreparable cyber breaches. To mitigate these cyber threats, academia and industry have placed a significant focus on proactively identifying and labeling exploits developed by the international hacker community. However, prevailing approaches for labeling exploits in hacker forums do not leverage metadata from exploit darknet markets or public exploit repositories to enhance labeling performance. In this study, we adopted the computational design science paradigm to develop a novel information technology artifact, the deep transfer learning exploit labeler (DTL-EL). DTL-EL incorporates a pre -initialization design, multi -layer deep transfer learning (DTL), and a self -attention mechanism to automatically label exploits in hacker forums. We rigorously evaluated the proposed DTLEL against state-of-the-art non-DTL benchmark methods based in classical machine learning and deep learning. Results suggest that the proposed DTL-EL significantly outperforms benchmark methods based on accuracy, precision, recall, and F1 -score. Our proposed DTL-EL framework provides important practical implications for key stakeholders such as cybersecurity managers, analysts, and educators.
引用
收藏
页码:137 / 166
页数:30
相关论文
共 50 条
  • [1] Labeling Hacker Exploits for Proactive Cyber Threat Intelligence: A Deep Transfer Learning Approach
    Ampel, Benjamin
    Samtani, Sagar
    Zhu, Hongyi
    Ullman, Steven
    Chen, Hsinchun
    2020 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2020, : 144 - 149
  • [2] Incremental Hacker Forum Exploit Collection and Classification for Proactive Cyber Threat Intelligence: An Exploratory Study
    Williams, Ryan
    Samtani, Sagar
    Patton, Mark
    Chen, Hsinchun
    2018 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2018, : 94 - 99
  • [3] Exploring Emerging Hacker Assets and Key Hackers for Proactive Cyber Threat Intelligence
    Samtani, Sagar
    Chinn, Ryan
    Chen, Hsinchun
    Nunamaker, Jay F., Jr.
    JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2017, 34 (04) : 1023 - 1053
  • [4] Identifying Mobile Malware and Key Threat Actors in Online Hacker Forums for Proactive Cyber Threat Intelligence
    Grisham, John
    Samtani, Sagar
    Patton, Mark
    Chen, Hsinchun
    2017 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2017, : 13 - 18
  • [5] Multimodal Classification of Onion Services for Proactive Cyber Threat Intelligence Using Explainable Deep Learning
    Moraliyage, Harsha
    Sumanasena, Vidura
    De Silva, Daswin
    Nawaratne, Rashmika
    Sun, Lina
    Alahakoon, Damminda
    IEEE ACCESS, 2022, 10 : 56044 - 56056
  • [6] AZSecure Hacker Assets Portal: Cyber Threat Intelligence and Malware Analysis
    Samtani, Sagar
    Chinn, Kory
    Larson, Cathy
    Chen, Hsinchun
    IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: CYBERSECURITY AND BIG DATA, 2016, : 19 - 24
  • [7] Useful Cyber Threat Intelligence Relation Retrieval Using Transfer Learning
    Chen, Chia-Mei
    Hsu, Fang-Hsuan
    Hwang, Jenq-Neng
    PROCEEDINGS OF THE 2023 EUROPEAN INTERDISCIPLINARY CYBERSECURITY CONFERENCE, EICC 2023, 2023, : 42 - 46
  • [8] Cyber Threat Intelligence and Machine Learning
    Haass, Jon C.
    Proceedings - 2022 4th International Conference on Transdisciplinary AI, TransAI 2022, 2022, : 156 - 159
  • [9] Searching to Exploit Memorization Effect in Deep Learning With Noisy Labels
    Yang, Hansi
    Yao, Quanming
    Han, Bo
    Kwok, James T.
    IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2024, 46 (12) : 7833 - 7849
  • [10] Cyber Threat Intelligence Mining for Proactive Cybersecurity Defense: A Survey and New Perspectives
    Sun, Nan
    Ding, Ming
    Jiang, Jiaojiao
    Xu, Weikang
    Mo, Xiaoxing
    Tai, Yonghang
    Zhang, Jun
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2023, 25 (03): : 1748 - 1774