As the cyber threat landscape is constantly becoming increasingly complex and polymorphic, the more critical it becomes to understand the enemy and its modus operandi for anticipatory threat reduction. Even though the cybersecurity community has developed a certain maturity in describing and sharing technical indicators for informing defense components, we still struggle with non-uniform, unstructured, and ambiguous higher-level information such as threat actor context, thereby limiting our ability to correlate with different sources for deriving more contextual, accurate, and relevant intelligence. We see the need to overcome this limitation to increase our ability to produce and better operationalize cyber threat intelligence. Our research demonstrates how commonly agreed-upon controlled vocabularies for characterizing threat actors and their operations can be used to enrich cyber threat intelligence and infer new information at a higher contextual level that is explicable and queryable. In particular, we present an ontological approach for automatically inferring the types of threat actors based on their personas, understanding their nature, and capturing polymorphism and changes in their behavior and characteristics over time. Such an approach not only enables interoperability by providing a structured way and the means for sharing highly contextual cyber threat intelligence but also derives new information at machine speed and minimizes cognitive biases that manual classification approaches entail.
翻译:随着网络威胁景观不断变得日益复杂和多变,理解敌人及其预测性减少威胁的操作方式就变得越发重要。尽管网络安全界在描述和分享用于通报国防组成部分的技术指标方面已经发展到一定的成熟程度,但我们仍然在与威胁行为者等非统一、非结构化和模糊的更高层次的信息进行斗争,例如威胁行为者的背景,从而限制我们与不同来源建立联系的能力,从而获得更符合背景、准确和相关的情报。我们认为有必要克服这一限制,以提高我们制作和更好地操作网络威胁情报的能力。我们的研究表明,如何利用共同商定的用于描述威胁行为者特征及其操作的受控词汇来丰富网络威胁情报,并在更高层次上推导出可解释和可查询的新信息。特别是,我们提出了一种理论学方法,以便根据威胁行为者的个人特征,了解其性质,并捕捉到其行为和特点的多元形态和变化。这种方法不仅能够通过提供结构化的方式和手段来共享高度背景威胁威胁威胁分子特征及其操作,而且能够通过分享高度背景网络威胁分子的手法,而且还能够带来新的信息,从而在高度背景上产生新的信息。