TTPDrill: Automatic and accurate extraction of threat actions from unstructured text of CTI Sources

  • Ghaith Husari
  • , Ehab Al-Shaer
  • , Mohiuddin Ahmed
  • , Bill Chu
  • , Xi Niu

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

199 Scopus citations

Abstract

With the rapid growth of the cyber attacks, sharing of cyber threat intelligence (CTI) becomes essential to identify and respond to cyber attack in timely and cost-effective manner. However, with the lack of standard languages and automated analytics of cyber threat information, analyzing complex and unstructured text of CTI reports is extremely time-and labor-consuming. Without addressing this challenge, CTI sharing will be highly impractical, and attack uncertainty and time-To-defend will continue to increase. Considering the high volume and speed of CTI sharing, our aim in this paper is to develop automated and context-Aware analytics of cyber threat intelligence to accurately learn attack pattern (TTPs) from commonly available CTI sources in order to timely implement cyber defense actions. Our paper has three key contributions. First, it presents a novel threat-Action ontology that is sufficiently rich to understand the specifications and context of malicious actions. Second, we developed a novel text mining approach that combines enhanced techniques of Natural Language Processing (NLP) and Information retrieval (IR) to extract threat actions based on semantic (rather than syntactic) relationship. Third, our CTI analysis can construct a complete attack pattern by mapping each threat action to the appropriate techniques, tactics and kill chain phases, and translating it any threat sharing standards, such as STIX 2.1. Our CTI analytic techniques were implemented in a tool, called TTPDrill, and evaluated using a randomly selected set of SymantecThreat Reports. Our evaluation tests show that TTPDrill achieves more than 82% of precision and recall in a variety of measures, very reasonable for this problem domain.

Original languageEnglish
Title of host publicationProceedings - 33rd Annual Computer Security Applications Conference, ACSAC 2017
PublisherAssociation for Computing Machinery
Pages103-115
Number of pages13
ISBN (Electronic)9781450353458
DOIs
StatePublished - 4 Dec 2017
Externally publishedYes
Event33rd Annual Computer Security Applications Conference, ACSAC 2017 - Orlando, United States
Duration: 4 Dec 20178 Dec 2017

Publication series

NameACM International Conference Proceeding Series
VolumePart F132521

Conference

Conference33rd Annual Computer Security Applications Conference, ACSAC 2017
Country/TerritoryUnited States
CityOrlando
Period4/12/178/12/17

ASJC Scopus subject areas

  • Software
  • Human-Computer Interaction
  • Computer Vision and Pattern Recognition
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'TTPDrill: Automatic and accurate extraction of threat actions from unstructured text of CTI Sources'. Together they form a unique fingerprint.

Cite this