STIXGEN - A novel framework for Automatic Generation of Structured Cyber Threat Information

被引:7
|
作者
Iqbal, Zafar [1 ]
Anwar, Zahid [1 ,2 ]
Mumtaz, Rafia [1 ]
机构
[1] NUST, Islamabad, Pakistan
[2] Fontbonne Univ, St Louis, MO USA
关键词
Advanced Persistent Threat; STIX; TAXII; OpenIOC; Point of Sale; Tactics Techniques; Training and Procedures; Domain Names (DN);
D O I
10.1109/FIT.2018.00049
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A large number of Advanced Persistent Threats (APTs) are being launched by nation-states, organizations and individuals within and across borders. It has been observed that APTs launched against an organization subsequently succeeded with high probability against other similar organizations. Therefore, it has become a need of the time that organizations accumulate and share Cyber Threat Information (CTI) with peers in a structured form for timely prevention and recovery of an attack. Although a large volume of cyber threat data is available on different security blogs, however this data is mostly distributed and unstructured. Presently, there is a lack of easy to use frameworks, which produce and share CTI in a structured form. Furthermore, publicly available structured data is sparse and is mostly redundant, irrelevant and erroneous. Ironically, no method has yet been devised to generate the distinct, meaningful and error-free structured data from text. In this regard, we used the standard "Structured Threat Information eXpression (STIX)". Although, STIX is a comprehensive effort, it is slow in adoption. This is due to a largely manual STIX generation process, which is naturally difficult and produces errors. We take all these deficits as a barrier in STIX utilization and these shortcomings have become a motivation for our research work. We not only proposed the STIXGEN framework, but also developed its prototype for a proof of concept. We perform evaluation of our proposed solution in terms of accuracy and effectiveness. At first, we collected different text reports, generated their STIXs via online tools and by using STIXGEN, then we compared and shared their results with domain experts. It was found that our proposed solution's results are better than other tools and are distinct, threat relevant, and error-free. Subsequently, we presented a comparative analysis of the features provided by different STIX generator tools. At the end, we provide a comprehensive STIX dataset of APTs launched against renowned industries on github, so that researchers and analysts can use it for their research.
引用
收藏
页码:241 / 246
页数:6
相关论文
共 50 条
  • [41] A Novel Framework for Automatic Trimap Generation Using The Gestalt Laws of Grouping
    Al-Kabbany, Ahmad
    Dubois, Eric
    VISUAL INFORMATION PROCESSING AND COMMUNICATION VI, 2015, 9410
  • [42] A Novel Trust Taxonomy for Shared Cyber Threat Intelligence
    Wagner, Thomas D.
    Palomar, Esther
    Mahbub, Khaled
    Abdallah, Ali E.
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [43] Automated Cyber Threat Intelligence Generation from Honeypot Data
    Sanjeev, Kumar
    Janet, B.
    Eswari, R.
    INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES, ICICCT 2019, 2020, 89 : 591 - 598
  • [44] Cyber-Physical Risk Assessment Framework for A Real-Life Automatic Generation Control Systems
    Lan, Qiang
    He, Li
    Jia, Shuyu
    Zhang, Yuqian
    Wang, Bin
    Yang, Peng
    2023 IEEE POWER & ENERGY SOCIETY GENERAL MEETING, PESGM, 2023,
  • [45] The existential threat from cyber-enabled information warfare
    Lin, Herbert
    BULLETIN OF THE ATOMIC SCIENTISTS, 2019, 75 (04) : 187 - 196
  • [46] Cyber Threat Information Sharing: A Category-Theoretic Approach
    Andrian, Jean
    Kamhoua, Charles
    Kiat, Kevin
    Njilla, Laurent
    PROCEEDINGS OF THE 2017 THIRD INTERNATIONAL CONFERENCE ON MOBILE AND SECURE SERVICES (MOBISECSERV), 2017,
  • [47] EXPLORING OPEN-SOURCE INFORMATION FOR CYBER THREAT INTELLIGENCE
    Netke, Madhavi M.
    Patil, Sarita
    Mahajan, Manjushree
    INTERNATIONAL JOURNAL OF EARLY CHILDHOOD SPECIAL EDUCATION, 2022, 14 (02) : 8157 - 8163
  • [48] Emergent Cybersecurity Information Discovery in Support of Cyber Threat Prevention
    Chen, Chia-Mei
    Fang, Jin-Jie
    Cai, Zheng-Xun
    Lee, Boyi
    Wen, Dan-Wei
    International Journal of Network Security, 2023, 25 (01) : 171 - 174
  • [49] Acquiring Cyber Threat Intelligence through Security Information Correlation
    Settanni, Giuseppe
    Shovgenya, Yegor
    Skopik, Florian
    Graf, Roman
    Wurzenberger, Markus
    Fiedler, Roman
    2017 3RD IEEE INTERNATIONAL CONFERENCE ON CYBERNETICS (CYBCONF), 2017, : 415 - 421
  • [50] CyExec*: Automatic Generation of Randomized Cyber Range Scenarios
    Nakata, Ryotaro
    Otsuka, Akira
    ICISSP: PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2021, : 226 - 236