TU Darmstadt / ULB / TUbiblio

A Feature-driven Method for Automating the Assessment of OSINT Cyber Threat Sources

Tundis, Andrea ; Ruppert, Samuel ; Mühlhäuser, Max (2022)
A Feature-driven Method for Automating the Assessment of OSINT Cyber Threat Sources.
In: Computers & Security, 113
doi: 10.1016/j.cose.2021.102576
Artikel, Bibliographie

Kurzbeschreibung (Abstract)

Global malware campaigns and large-scale data breaches show how everyday life can be impacted when the defensive measures fail to protect computer systems from cyber threats. Understanding the threat landscape and the adversaries' attack tactics to perform it represent key factors for enabling an efficient defense against threats over the time. Of particular importance is the acquisition of timely and accurate information from threats intelligence sources available on the web which can provide additional intelligence on emerging threats even before they can be observed as actual attacks. Currently, specific indicators of compromise (e.g. IP addresses, domains, hashsums of malicious files) are shared in a semi-automated and structured way via so-called threat feeds. Unfortunately, current systems have to deal with the trade-off between the timeliness of such an alert (i.e. warning at the first mention of a threat) and the need to wait for verification by other sources (i.e. warning after multiple sources have verified the threat). In addition, due to the increasing number of open sources, it is challenging to find the right balance between feasibility and costs in order to identify a relatively small subset of valuable sources. In this paper, a method to automate the assessment of cyber threat intelligence sources and predict a relevance score for each source is proposed. Specifically, a model based on meta-data and word embedding is defined and experimented by training regression models to predict the relevance score of sources on Twitter. The results evaluation show that the assigned score allows to reduce the waiting time for intelligence verification, on the basis of its relevance, thus improving the time advantage of early threat detection.

Typ des Eintrags: Artikel
Erschienen: 2022
Autor(en): Tundis, Andrea ; Ruppert, Samuel ; Mühlhäuser, Max
Art des Eintrags: Bibliographie
Titel: A Feature-driven Method for Automating the Assessment of OSINT Cyber Threat Sources
Sprache: Englisch
Publikationsjahr: Februar 2022
Verlag: Elsevier
Titel der Zeitschrift, Zeitung oder Schriftenreihe: Computers & Security
Jahrgang/Volume einer Zeitschrift: 113
DOI: 10.1016/j.cose.2021.102576
URL / URN: https://www.sciencedirect.com/science/article/pii/S016740482...
Kurzbeschreibung (Abstract):

Global malware campaigns and large-scale data breaches show how everyday life can be impacted when the defensive measures fail to protect computer systems from cyber threats. Understanding the threat landscape and the adversaries' attack tactics to perform it represent key factors for enabling an efficient defense against threats over the time. Of particular importance is the acquisition of timely and accurate information from threats intelligence sources available on the web which can provide additional intelligence on emerging threats even before they can be observed as actual attacks. Currently, specific indicators of compromise (e.g. IP addresses, domains, hashsums of malicious files) are shared in a semi-automated and structured way via so-called threat feeds. Unfortunately, current systems have to deal with the trade-off between the timeliness of such an alert (i.e. warning at the first mention of a threat) and the need to wait for verification by other sources (i.e. warning after multiple sources have verified the threat). In addition, due to the increasing number of open sources, it is challenging to find the right balance between feasibility and costs in order to identify a relatively small subset of valuable sources. In this paper, a method to automate the assessment of cyber threat intelligence sources and predict a relevance score for each source is proposed. Specifically, a model based on meta-data and word embedding is defined and experimented by training regression models to predict the relevance score of sources on Twitter. The results evaluation show that the assigned score allows to reduce the waiting time for intelligence verification, on the basis of its relevance, thus improving the time advantage of early threat detection.

Freie Schlagworte: Open source cyber threat intelligence, Cybersecurity, Machine learning, Feature engineering, Twitter
Zusätzliche Informationen:

Art.No.: 102576

Fachbereich(e)/-gebiet(e): 20 Fachbereich Informatik
20 Fachbereich Informatik > Telekooperation
LOEWE
LOEWE > LOEWE-Zentren
LOEWE > LOEWE-Zentren > emergenCITY
Hinterlegungsdatum: 21 Dez 2021 12:17
Letzte Änderung: 21 Dez 2021 12:18
PPN:
Export:
Suche nach Titel in: TUfind oder in Google
Frage zum Eintrag Frage zum Eintrag

Optionen (nur für Redakteure)
Redaktionelle Details anzeigen Redaktionelle Details anzeigen