STIXGEN - A novel framework for Automatic Generation of Structured Cyber Threat Information

被引:7
|
作者
Iqbal, Zafar [1 ]
Anwar, Zahid [1 ,2 ]
Mumtaz, Rafia [1 ]
机构
[1] NUST, Islamabad, Pakistan
[2] Fontbonne Univ, St Louis, MO USA
关键词
Advanced Persistent Threat; STIX; TAXII; OpenIOC; Point of Sale; Tactics Techniques; Training and Procedures; Domain Names (DN);
D O I
10.1109/FIT.2018.00049
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A large number of Advanced Persistent Threats (APTs) are being launched by nation-states, organizations and individuals within and across borders. It has been observed that APTs launched against an organization subsequently succeeded with high probability against other similar organizations. Therefore, it has become a need of the time that organizations accumulate and share Cyber Threat Information (CTI) with peers in a structured form for timely prevention and recovery of an attack. Although a large volume of cyber threat data is available on different security blogs, however this data is mostly distributed and unstructured. Presently, there is a lack of easy to use frameworks, which produce and share CTI in a structured form. Furthermore, publicly available structured data is sparse and is mostly redundant, irrelevant and erroneous. Ironically, no method has yet been devised to generate the distinct, meaningful and error-free structured data from text. In this regard, we used the standard "Structured Threat Information eXpression (STIX)". Although, STIX is a comprehensive effort, it is slow in adoption. This is due to a largely manual STIX generation process, which is naturally difficult and produces errors. We take all these deficits as a barrier in STIX utilization and these shortcomings have become a motivation for our research work. We not only proposed the STIXGEN framework, but also developed its prototype for a proof of concept. We perform evaluation of our proposed solution in terms of accuracy and effectiveness. At first, we collected different text reports, generated their STIXs via online tools and by using STIXGEN, then we compared and shared their results with domain experts. It was found that our proposed solution's results are better than other tools and are distinct, threat relevant, and error-free. Subsequently, we presented a comparative analysis of the features provided by different STIX generator tools. At the end, we provide a comprehensive STIX dataset of APTs launched against renowned industries on github, so that researchers and analysts can use it for their research.
引用
收藏
页码:241 / 246
页数:6
相关论文
共 50 条
  • [31] Secure and Robust Cyber Security Threat Information Sharing
    Bkakria, Anis
    Yaich, Reda
    Arabi, Walid
    FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2021, 2022, 13291 : 3 - 18
  • [32] Cyber Threat Information Sharing: Perceived Benefits and Barriers
    Zibak, Adam
    Simpson, Andrew
    14TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2019), 2019,
  • [33] Exploring Open Source Information for Cyber Threat Intelligence
    Adewopo, Victor
    Gonen, Bilal
    Adewopo, Festus
    2020 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2020, : 2232 - 2241
  • [34] A Search-Based Framework for Automatic Generation of Testing Environments for Cyber-Physical Systems
    Humeniuk, Dmytro
    Khomh, Foutse
    Antoniol, Giuliano
    arXiv, 2022,
  • [35] A search-based framework for automatic generation of testing environments for cyber-physical systems
    Humeniuk, Dmytro
    Khomh, Foutse
    Antoniol, Giuliano
    INFORMATION AND SOFTWARE TECHNOLOGY, 2022, 149
  • [36] An Information Fusion Framework for Threat Assessment
    Beaver, Justin M.
    Kerekes, Ryan A.
    Treadwell, Jim N.
    FUSION: 2009 12TH INTERNATIONAL CONFERENCE ON INFORMATION FUSION, VOLS 1-4, 2009, : 1903 - +
  • [37] Cyber threat intelligence framework using advanced malware forensics
    Keim Y.
    Mohapatra A.K.
    International Journal of Information Technology, 2022, 14 (1) : 521 - 530
  • [38] Risk Management Using Cyber-Threat Information Sharing and Cyber-Insurance
    Tosh, Deepak K.
    Shetty, Sachin
    Sengupta, Shamik
    Kesan, Jay P.
    Kamhoua, Charles A.
    GAME THEORY FOR NETWORKS (GAMENETS 2017), 2017, 212 : 154 - 164
  • [39] FineCTI: A Framework for Mining Fine-grained Cyber Threat Information from Twitter Using NER Model
    Ma, Chunyan
    Jiang, Jun
    Zhang, Kai
    Jiang, Zhengwei
    Yang, Peian
    Wang, Xuren
    Feng, Huamin
    2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 531 - 538
  • [40] Using Entropy and Mutual Information to Extract Threat Actions from Cyber Threat Intelligence
    Husari, Ghaith
    Niu, Xi
    Chu, Bill
    Al-Shaer, Ehab
    2018 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2018, : 1 - 6