K-CTIAA: Automatic Analysis of Cyber Threat Intelligence Based on a Knowledge Graph

Author:

Li Zong-Xun1ORCID,Li Yu-Jun1,Liu Yi-Wei1,Liu Cheng12,Zhou Nan-Xin1

Affiliation:

1. School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China

2. Science and Technology on Communication Security Laboratory, The 30th Research Institute of China Electronics Technology Group Corporation, Chengdu 610041, China

Abstract

Cyber threat intelligence (CTI) sharing has gradually become an important means of dealing with security threats. Considering the growth of cyber threat intelligence, the quick analysis of threats has become a hot topic at present. Researchers have proposed some machine learning and deep learning models to automatically analyze these immense amounts of cyber threat intelligence. However, due to a large amount of network security terminology in CTI, these models based on open-domain corpus perform poorly in the CTI automatic analysis task. To address this problem, we propose an automatic CTI analysis method named K-CTIAA, which can extract threat actions from unstructured CTI by pre-trained models and knowledge graphs. First, the related knowledge in knowledge graphs will be supplemented to the corresponding position in CTI through knowledge query and knowledge insertion, which help the pre-trained model understand the semantics of network security terms and extract threat actions. Second, K-CTIAA reduces the adverse effects of knowledge insertion, usually called the knowledge noise problem, by introducing a visibility matrix and modifying the calculation formula of the self-attention. Third, K-CTIAA maps corresponding countermeasures by using digital artifacts, which can provide some feasible suggestions to prevent attacks. In the test data set, the F1 score of K-CTIAA reaches 0.941. The experimental results show that K-CTIAA can improve the performance of automatic threat intelligence analysis and it has certain significance for dealing with security threats.

Funder

the National Key Research and Development Program of China

Publisher

MDPI AG

Subject

Physics and Astronomy (miscellaneous),General Mathematics,Chemistry (miscellaneous),Computer Science (miscellaneous)

Reference38 articles.

1. Vermesan, O., and Friess, P. (2022). Digitising the Industry Internet of Things Connecting the Physical, Digital and Virtual Worlds, CRC Press.

2. (2022, November 04). Most Recent Cyber Attacks—Past Three Months. Available online: https://www.fortinet.com/resources/cyberglossary/recent-cyber-attacks.

3. Cyber threat intelligence sharing: Survey and research directions;Wagner;Comput. Secur.,2019

4. Pre-trained models: Past, present and future;Han;AI Open,2021

5. Satvat, K., Gjomemo, R., and Venkatakrishnan, V.N. (2021, January 6–10). EXTRACTOR: Extracting attack behavior from threat reports. Proceedings of the 2021 IEEE European Symposium on Security and Privacy (EuroS&P), Vienna, Austria.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3