Threat actors can be persistent, motivated and agile, and leverage a diversified and extensive set of tactics and techniques to attain their goals. In response to that, defenders establish threat intelligence programs to stay threat-informed and lower risk. Actionable threat intelligence is integrated into security information and event management systems (SIEM) or is accessed via more dedicated tools like threat intelligence platforms. A threat intelligence platform gives access to contextual threat information by aggregating, processing, correlating, and analyzing real-time data and information from multiple sources, and in many cases, it provides centralized analysis and reporting of an organization's security events. Sysmon logs is a data source that has received considerable attention for endpoint visibility. Approaches for threat detection using Sysmon have been proposed, mainly focusing on search engine technologies like NoSQL database systems. This paper demonstrates one of the many use cases of Sysmon and cyber threat intelligence. In particular, we present a threat assessment system that relies on a cyber threat intelligence ontology to automatically classify executed software into different threat levels by analyzing Sysmon log streams. The presented system and approach augments cyber defensive capabilities through situational awareness, prediction, and automated courses of action.
翻译:针对这一点,维权者建立了威胁情报方案,以保持对威胁的了解,降低风险。可采取行动的威胁情报被纳入安全信息和事件管理系统(SIEM),或者通过威胁情报平台等更专门的工具获取。威胁情报平台通过汇集、处理、关联和分析来自多个来源的实时数据和信息,使人们有机会获取背景威胁信息。在许多情况下,它提供对一个组织的安全事件进行集中分析和报告。Sysmon日志是一个数据来源,在最终可见度方面得到了相当大的关注。提出了使用Sysmon进行威胁探测的方法,主要侧重于像NOSQL数据库系统这样的搜索引擎技术。本文展示了Sysmon和网络威胁情报的许多使用案例之一。特别是,我们展示了一个威胁评估系统,依靠网络威胁情报的理论,通过分析Sysmon日志流,将执行的软件自动分类为不同威胁级别。所展示的系统和方法通过情景意识、预测和行动自动化课程,增强了网络防御能力。