Affiliation:
1. Department of New Networks, Peng Cheng Laboratory, Shenzhen 518000, China
2. School of Computer Science, Harbin Institute of Technology (Shenzhen), Shenzhen 518000, China
Abstract
In the dynamic landscape of cyberspace, organizations face a myriad of coordinated advanced threats that challenge the traditional defense paradigm. Cyber Threat Intelligence (CTI) plays a crucial role, providing in-depth insights into adversary groups and enhancing the detection and neutralization of complex cyber attacks. However, attributing attacks poses significant challenges due to over-reliance on malware samples or network detection data alone, which falls short of comprehensively profiling attackers. This paper proposes an IPv4-based threat attribution model, IPAttributor, that improves attack characterization by merging a real-world network behavior dataset comprising 39,707 intrusion entries with commercial threat intelligence from three distinct sources, offering a more nuanced context. A total of 30 features were utilized from the enriched dataset for each IP to create a feature matrix to assess the similarities and linkage of associated IPs, and a dynamic weighted threat segmentation algorithm was employed to discern attacker communities. The experiments affirm the efficacy of our method in pinpointing attackers sharing a common origin, achieving the highest accuracy of 88.89%. Our study advances the relatively underexplored line of work of cyber attacker attribution, with a specific interest in IP-based attribution strategies, thereby enhancing the overall understanding of the attacker’s group regarding their capabilities and intentions.
Funder
National Natural Science Foundation of China
Major Key Project of PCL
Zhejiang Provincial Natural Science Foundation of China
Reference25 articles.
1. Milajerdi, S.M., Gjomemo, R., Eshete, B., Sekar, R., and Venkatakrishnan, V.N. (2019, January 20–22). HOLMES: Real-Time APT Detection through Correlation of Suspicious Information Flows. Proceedings of the 2019 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA.
2. CSKG4APT: A Cybersecurity Knowledge Graph for Advanced Persistent Threat Organization Attribution;Ren;IEEE Trans. Knowl. Data Eng,2023
3. Cyber Threat Intelligence Mining for Proactive Cybersecurity Defense: A Survey and New Perspectives;Sun;IEEE Commun. Surv. Tutor.,2023
4. Artificial Intelligence Enabled Cyber Security Defense for Smart Cities: A Novel Attack Detection Framework Based on the MDATA Model;Jia;Knowl.-Based Syst.,2023
5. A Few-Shot Class-Incremental Learning Method for Network Intrusion Detection;Du;IEEE Trans. Netw. Serv. Manag.,2024
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Predicting Cyber-Attacks and Identifying Perpetrators Using Machine Learning Techniques;2024 Third International Conference on Smart Technologies and Systems for Next Generation Computing (ICSTSN);2024-07-18