Affiliation:
1. School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China
2. Science and Technology on Communication Security Laboratory, The 30th Research Institute of China Electronics Technology Group Corporation, Chengdu 610041, China
Abstract
Cyber threat intelligence (CTI) sharing has gradually become an important means of dealing with security threats. Considering the growth of cyber threat intelligence, the quick analysis of threats has become a hot topic at present. Researchers have proposed some machine learning and deep learning models to automatically analyze these immense amounts of cyber threat intelligence. However, due to a large amount of network security terminology in CTI, these models based on open-domain corpus perform poorly in the CTI automatic analysis task. To address this problem, we propose an automatic CTI analysis method named K-CTIAA, which can extract threat actions from unstructured CTI by pre-trained models and knowledge graphs. First, the related knowledge in knowledge graphs will be supplemented to the corresponding position in CTI through knowledge query and knowledge insertion, which help the pre-trained model understand the semantics of network security terms and extract threat actions. Second, K-CTIAA reduces the adverse effects of knowledge insertion, usually called the knowledge noise problem, by introducing a visibility matrix and modifying the calculation formula of the self-attention. Third, K-CTIAA maps corresponding countermeasures by using digital artifacts, which can provide some feasible suggestions to prevent attacks. In the test data set, the F1 score of K-CTIAA reaches 0.941. The experimental results show that K-CTIAA can improve the performance of automatic threat intelligence analysis and it has certain significance for dealing with security threats.
Funder
the National Key Research and Development Program of China
Subject
Physics and Astronomy (miscellaneous),General Mathematics,Chemistry (miscellaneous),Computer Science (miscellaneous)
Reference38 articles.
1. Vermesan, O., and Friess, P. (2022). Digitising the Industry Internet of Things Connecting the Physical, Digital and Virtual Worlds, CRC Press.
2. (2022, November 04). Most Recent Cyber Attacks—Past Three Months. Available online: https://www.fortinet.com/resources/cyberglossary/recent-cyber-attacks.
3. Cyber threat intelligence sharing: Survey and research directions;Wagner;Comput. Secur.,2019
4. Pre-trained models: Past, present and future;Han;AI Open,2021
5. Satvat, K., Gjomemo, R., and Venkatakrishnan, V.N. (2021, January 6–10). EXTRACTOR: Extracting attack behavior from threat reports. Proceedings of the 2021 IEEE European Symposium on Security and Privacy (EuroS&P), Vienna, Austria.
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献