A supervised machine learning based approach for automatically extracting high-level threat intelligence from unstructured sources
2018 International Conference on Frontiers of Information …, 2018•ieeexplore.ieee.org
The last few years have seen a radical shift in the cyber defense paradigm from reactive to
proactive, and this change is marked by the steadily increasing trend of Cyber Threat
Intelligence (CTI) sharing. Currently, there are numerous Open Source Intelligence (OSINT)
sources providing periodically updated threat feeds that are fed into various analytical
solutions. At this point, there is an excessive amount of data being produced from such
sources, both structured (STIX, OpenIOC, etc.) as well as unstructured (blacklists, etc.) …
proactive, and this change is marked by the steadily increasing trend of Cyber Threat
Intelligence (CTI) sharing. Currently, there are numerous Open Source Intelligence (OSINT)
sources providing periodically updated threat feeds that are fed into various analytical
solutions. At this point, there is an excessive amount of data being produced from such
sources, both structured (STIX, OpenIOC, etc.) as well as unstructured (blacklists, etc.) …
The last few years have seen a radical shift in the cyber defense paradigm from reactive to proactive, and this change is marked by the steadily increasing trend of Cyber Threat Intelligence (CTI) sharing. Currently, there are numerous Open Source Intelligence (OSINT) sources providing periodically updated threat feeds that are fed into various analytical solutions. At this point, there is an excessive amount of data being produced from such sources, both structured (STIX, OpenIOC, etc.) as well as unstructured (blacklists, etc.). However, more often than not, the level of detail required for making informed security decisions is missing from threat feeds, since most indicators are atomic in nature, like IPs and hashes, which are usually rather volatile. These feeds distinctly lack strategic threat information, like attack patterns and techniques that truly represent the behavior of an attacker or an exploit. Moreover, there is a lot of duplication in threat information and no single place where one could explore the entirety of a threat, hence requiring hundreds of man hours for sifting through numerous sources - trying to discern signal from noise - to find all the credible information on a threat. We have made use of natural language processing to extract threat feeds from unstructured cyber threat information sources with approximately 70\% precision, providing comprehensive threat reports in standards like STIX, which is a widely accepted industry standard that represents CTI. The automation of an otherwise tedious manual task would ensure the timely gathering and sharing of relevant CTI that would give organizations the edge to be able to proactively defend against known as well as unknown threats.
ieeexplore.ieee.org
以上显示的是最相近的搜索结果。 查看全部搜索结果