STIXGEN - A novel framework for Automatic Generation of Structured Cyber Threat Information

被引:7
|
作者
Iqbal, Zafar [1 ]
Anwar, Zahid [1 ,2 ]
Mumtaz, Rafia [1 ]
机构
[1] NUST, Islamabad, Pakistan
[2] Fontbonne Univ, St Louis, MO USA
关键词
Advanced Persistent Threat; STIX; TAXII; OpenIOC; Point of Sale; Tactics Techniques; Training and Procedures; Domain Names (DN);
D O I
10.1109/FIT.2018.00049
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A large number of Advanced Persistent Threats (APTs) are being launched by nation-states, organizations and individuals within and across borders. It has been observed that APTs launched against an organization subsequently succeeded with high probability against other similar organizations. Therefore, it has become a need of the time that organizations accumulate and share Cyber Threat Information (CTI) with peers in a structured form for timely prevention and recovery of an attack. Although a large volume of cyber threat data is available on different security blogs, however this data is mostly distributed and unstructured. Presently, there is a lack of easy to use frameworks, which produce and share CTI in a structured form. Furthermore, publicly available structured data is sparse and is mostly redundant, irrelevant and erroneous. Ironically, no method has yet been devised to generate the distinct, meaningful and error-free structured data from text. In this regard, we used the standard "Structured Threat Information eXpression (STIX)". Although, STIX is a comprehensive effort, it is slow in adoption. This is due to a largely manual STIX generation process, which is naturally difficult and produces errors. We take all these deficits as a barrier in STIX utilization and these shortcomings have become a motivation for our research work. We not only proposed the STIXGEN framework, but also developed its prototype for a proof of concept. We perform evaluation of our proposed solution in terms of accuracy and effectiveness. At first, we collected different text reports, generated their STIXs via online tools and by using STIXGEN, then we compared and shared their results with domain experts. It was found that our proposed solution's results are better than other tools and are distinct, threat relevant, and error-free. Subsequently, we presented a comparative analysis of the features provided by different STIX generator tools. At the end, we provide a comprehensive STIX dataset of APTs launched against renowned industries on github, so that researchers and analysts can use it for their research.
引用
收藏
页码:241 / 246
页数:6
相关论文
共 50 条
  • [21] A robust statistical framework for cyber-vulnerability prioritisation under partial information in threat intelligence
    Angelelli, Mario
    Arima, Serena
    Catalano, Christian
    Ciavolino, Enrico
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 255
  • [22] Design of a Cyber Threat Information Collection System for Cyber Attack Correlation
    Kim, Nakhyun
    Lee, Seulgi
    Cho, Hyeisun
    Kim, Byun-Ik
    Jun, MoonSeog
    2018 INTERNATIONAL CONFERENCE ON PLATFORM TECHNOLOGY AND SERVICE (PLATCON18), 2018, : 216 - 219
  • [23] Privacy Preserving Cyber Threat Information Sharing and Learning for Cyber Defense
    Badsha, Shahriar
    Vakilinia, Iman
    Sengupta, Shamik
    2019 IEEE 9TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2019, : 708 - 714
  • [24] Automatic Model Generation and Data Assimilation Framework for Cyber-Physical Production Systems
    Tan, Wen Jun
    Seok, Moon Gi
    Cai, Wentong
    PROCEEDINGS OF THE 2023 ACM SIGSIM INTERNATIONAL CONFERENCE ON PRINCIPLES OF ADVANCED DISCRETE SIMULATION, ACMSIGSIM-PADS 2023, 2023, : 73 - 83
  • [25] IPMatrix: An effective visualization framework for cyber threat monitoring
    Ohno, K
    Koike, H
    Koizumi, K
    NINTH INTERNATIONAL CONFERENCE ON INFORMATION VISUALISATION, PROCEEDINGS, 2005, : 678 - 685
  • [26] Leveraging cyber threat intelligence for a dynamic risk framework
    Riesco, R.
    Villagra, V. A.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2019, 18 (06) : 715 - 739
  • [27] Framework of Cyber Attack Attribution Based on Threat Intelligence
    Li Qiang
    Yang Zeming
    Liu Baoxu
    Jiang Zhengwei
    Yan Jian
    INTEROPERABILITY, SAFETY AND SECURITY IN IOT, 2017, 190 : 92 - 103
  • [28] Multi Platform Honeypot for Generation of Cyber Threat Intelligence
    Kumar, Sanjeev
    Janet, B.
    Eswari, R.
    PROCEEDINGS OF THE 2019 IEEE 9TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (IACC 2019), 2019, : 25 - 29
  • [29] Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study
    Orbinato, Vittorio
    Barbaraci, Mariarosaria
    Natella, Roberto
    Cotroneo, Domenico
    2022 IEEE 33RD INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE 2022), 2022, : 181 - 192
  • [30] CYBER TERRORISM - A MODERN SECURITY THREAT TO INFORMATION SYSTEMS
    Prislan, Kaja
    Bernik, Igor
    POLICING IN CENTRAL AND EASTERN EUROPE - SOCIAL CONTROL OF UNCONVENTIONAL DEVIANCE: CONFERENCE PROCEEDINGS, 2011, : 175 - +