摘要(英) |
MITRE ATT&CK is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. These collected data uncover the information about adversary group, software, tactic, and technique that can represent whole kill chain phases in detail, and facilitate the investigation of cyber threat intelligence (CTI) techniques. However, the existed interfaces of ATT&CK such as website and Navigator are not enough to search for complex related information. In this paper, we present an ontology based on MITRE ATT&CK to efficiently gain the knowledge. Based on the requirement of security researchers, we derive inference paths to infer techniques that are leveraged to deeply analyze the technology of CTI, and we also design forward- and backward- query based on software, group and technique that are of great significance to the security domain for generating the completed intelligence more efficiency. |
參考文獻 |
[1] Multibillion-dollar Equinix is the latest data-center firm to face ransomware incident.
URL: https://www.cyberscoop.com/equinix-ransomwaredata-
centers/.
[2] 7 worst security breaches of 2021 (so far). URL: https : / / resources .
infosecinstitute.com/topic/7-worst-security-breachesof-
2021-so-far/.
[3] Water companies are increasingly uninsurable due to ransomware, industry execs
say. URL: https://www.cyberscoop.com/water-industryransomware-
insurance/?category_news=money.
[4] Iranian steel facilities suffer apparent cyberattacks. URL: https : / / www .
cyberscoop . com / iran - cyberattack - israel - hacktivist -
steel-ics/.
[5] Zhenyuan Li et al. “AttacKG: Constructing Technique Knowledge
Graph from Cyber Threat Intelligence Reports”. In: arXiv preprint
arXiv:2111.07093 (2021).
[6] Strom, B. E., Applebaum, A., Miller, D. P., Nickels, K. C., Pennington, A. G., &
Thomas, C. B. (2018). MITRE ATT&CK: Design and Philosophy. URL: https:
//www.mitre.org/sites/default/files/publications/pr-
18-0944-11-mitre-attack-design-and-philosophy.pdf.
[7] Lockheed Martin. Gaining the Advantage: Applying Cyber Kill Chain Methodology
to Network Defense. Lockheed Martin Corporation, 2015. URL: https:
/ / www . lockheedmartin . com / en - us / capabilities / cyber /
cyber-kill-chain.html.
[8] https://cve.mitre.org/. URL: https://cve.mitre.org/.
[9] Aritran Piplai et al. “Creating cybersecurity knowledge graphs from malware
after action reports”. In: IEEE Access 8 (2020), pp. 211691–211703.
[10] Peng Gao et al. “Enabling efficient cyber threat hunting with cyber threat
intelligence”. In: 2021 IEEE 37th International Conference on Data Engineering
(ICDE). IEEE. 2021, pp. 193–204.
[11] TTP Cyber Security. (accessed 05.03.2022). URL: https : / / www .
trustnetinc.com/ttp-cyber-security/.
30
[12] MITRE. ATT&CKR Navigator. 2022. URL: https : / / github . com /
mitre-attack/attack-navigator.
[13] Nidhi Rastogi et al. “Malont: An ontology for malware threat intelligence”.
In: International Workshop on Deployable Machine Learning for Security
Defense. Springer. 2020, pp. 28–44.
[14] Ghaith Husari et al. “TTPDrill: Automatic and Accurate Extraction of
Threat Actions from Unstructured Text of CTI Sources”. In: Proceedings
of the 33rd Annual Computer Security Applications Conference. ACSAC 2017.
Orlando, FL, USA: Association for Computing Machinery, 2017, 103–115.
ISBN: 9781450353458. DOI: 10.1145/3134600.3134646. URL: https:
//doi.org/10.1145/3134600.3134646.
[15] Zareen Syed et al. “UCO: A unified cybersecurity ontology”. In:Workshops
at the thirtieth AAAI conference on artificial intelligence. 2016.
[16] Sudip Mittal et al. “Cybertwitter: Using twitter to generate alerts for cybersecurity
threats and vulnerabilities”. In: 2016 IEEE/ACM International
Conference on Advances in Social Networks Analysis and Mining (ASONAM).
IEEE. 2016, pp. 860–867.
[17] Yali Gao et al. “Hincti: A cyber threat intelligence modeling and identification
system based on heterogeneous information network”. In: IEEE
Transactions on Knowledge and Data Engineering (2020).
[18] Yishuai Zhao, Bo Lang, and Ming Liu. “Ontology-based unified model for
heterogeneous threat intelligence integration and sharing”. In: 2017 11th
IEEE International Conference on Anti-counterfeiting, Security, and Identification
(ASID). IEEE. 2017, pp. 11–15.
[19] MITretrieval: Retrieving MITRE Techniques from Unstructured CTI Reports by
Fusion of Ontology and DL method.
[20] George A Miller. “WordNet: a lexical database for English”. In: Communications
of the ACM 38.11 (1995), pp. 39–41.
[21] Soren Auer et al. “Dbpedia: A nucleus for a web of open data”. In: The
semantic web. Springer, 2007, pp. 722–735.
[22] Gene Ontology Consortium. “The Gene Ontology (GO) database and informatics
resource”. In: Nucleic acids research 32.suppl_1 (2004), pp. D258–
D261.
[23] Hamish Cunningham. “Information extraction, automatic”. In: Encyclopedia
of language and linguistics, 3.8 (2005), p. 10.
[24] Christopher D Manning et al. “The Stanford CoreNLP natural language
processing toolkit”. In: Proceedings of 52nd annual meeting of the association
for computational linguistics: system demonstrations. 2014, pp. 55–60.
31
[25] Marie-Catherine De Marneffe and Christopher D Manning. Stanford typed
dependencies manual. Tech. rep. Technical report, Stanford University, 2008.
[26] Kiavash Satvat, Rigel Gjomemo, and VN Venkatakrishnan. “EXTRACTOR:
extracting attack behavior from threat reports”. In: 2021 IEEE European
Symposium on Security and Privacy (EuroS&P). IEEE. 2021, pp. 598–
615.
[27] Alireza Mansouri, Lilly Suriani Affendey, and Ali Mamat. “Named entity
recognition approaches”. In: International Journal of Computer Science and
Network Security 8.2 (2008), pp. 339–344.
[28] Matt Gardner et al. “Allennlp: A deep semantic natural language processing
platform”. In: arXiv preprint arXiv:1803.07640 (2018).
[29] Daniel Jurafsky & James H. Martin. Speech and Language Processing. 2019.
[30] Xiaojing Liao et al. “Acing the ioc game: Toward automatic discovery and
analysis of open-source cyber threat intelligence”. In: Proceedings of the
2016 ACM SIGSAC Conference on Computer and Communications Security.
2016, pp. 755–766.
[31] MITRE. ATT&CKR STIX Data. 2022. URL: https : / / github . com /
mitre-attack/attack-stix-data.
[32] Common types of malware defined by Microsoft. URL: https : / / docs .
microsoft . com / en - us / microsoft - 365 / security /
intelligence / malware - naming ? view = o365 - worldwide #
family.
[33] Nils Reimers and Iryna Gurevych. “Sentence-bert: Sentence embeddings
using siamese bert-networks”. In: arXiv preprint arXiv:1908.10084 (2019).
[34] JimWebber. “A programmatic introduction to neo4j”. In: Proceedings of the
3rd annual conference on Systems, programming, and applications: software for
humanity. 2012, pp. 217–218. |