Cyber threat intelligence is the provision of evidence-based knowledge about existing or potential threats. Benefits of threat intelligence include increased situational awareness, efficiency in security operation centers, and improved prevention, detection, and response capabilities. To process, analyze, and correlate vast amounts of threat information and derive highly contextual intelligence that can be shared and consumed in meaningful times requires utilizing machine-understandable knowledge representation formats that embed the industry-required expressivity and are unambiguous. To a large extend, this is achieved by technologies like ontologies, interoperability schemas, and taxonomies. This research evaluates existing cyber-threat-intelligence-relevant ontologies, sharing standards, and taxonomies for the purpose of measuring their high-level conceptual expressivity with regards to the who, what, why, where, when, and how elements of an adversarial attack in addition to courses of action and the ability to capture more technical indicators. The results confirm that little emphasis has been given to developing a comprehensive cyber threat intelligence ontology with existing efforts not being thoroughly designed, non-interoperable and ambiguous, and lacking semantic reasoning capability.
翻译:网络威胁情报是提供关于现有威胁或潜在威胁的循证知识; 威胁情报的好处包括提高了对形势的认识、安全行动中心的效率以及更好的预防、检测和反应能力; 处理、分析和联系大量威胁信息,并获得可以在有意义的时间分享和消费的高度背景情报,需要利用机器可理解的知识代表格式,这种格式将行业需要的表达性嵌入到行业所需的明确性之中; 在很大程度上,这是通过诸如本体学、互操作性计划和分类等技术实现的; 这项研究评估了现有的与网络威胁情报有关的有关的各种理论、共享标准和分类,目的是衡量它们对于谁、为什么、何时、如何、如何进行对抗攻击,以及除了行动方针和获取更多技术指标的能力之外,在哪些方面,如何进行高度的概念表达; 研究结果证实,对开发全面的网络威胁情报没有给予多少重视,现有的努力没有彻底设计、不相互操作和含糊不清,缺乏语义推理能力。