Learning APT chains from cyber threat intelligence

  • Ghaith Husari
  • , Ehab Al-Shaer
  • , Bill Chu
  • , Ruhani Faiheem Rahman

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

13 Scopus citations

Abstract

With the rapidly evolving cyber attacks, cybersecurity specialists are actively using cyber threat intelligence to identify and respond to cyber attacks in a timely manner. However, this information will be highly useful for attack detection and mitigation if we can construct structured cyber threat intelligence and accurately generate TTP Chains to understand the steps of cyber attacks. In this poster, we present our preliminary Natural Language Processing (NLP) analysis to characterize the temporal relationship of attack actions of an APT attack to extract and construct the reported TTP chains using the popular standard, MITRE ATT&CK [1], and the Structured Sharing Language, STIX 2 [2], a machine-readable language that will help automate the process of understanding and responding to the cyber attacks shared in unstructured text via blogs, emails, and social media.

Original languageEnglish
Title of host publicationProceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, HotSoS 2019
PublisherAssociation for Computing Machinery
ISBN (Electronic)9781450371476
DOIs
StatePublished - 1 Apr 2019
Externally publishedYes
Event6th Annual Symposium on Hot Topics in the Science of Security, HotSoS 2019 - Nashville, United States
Duration: 1 Apr 20193 Apr 2019

Publication series

NameACM International Conference Proceeding Series

Conference

Conference6th Annual Symposium on Hot Topics in the Science of Security, HotSoS 2019
Country/TerritoryUnited States
CityNashville
Period1/04/193/04/19

Bibliographical note

Publisher Copyright:
© 2019 Copyright held by the owner/author(s).

ASJC Scopus subject areas

  • Software
  • Human-Computer Interaction
  • Computer Vision and Pattern Recognition
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Learning APT chains from cyber threat intelligence'. Together they form a unique fingerprint.

Cite this