Public and commercial companies extensively share cyber threat intelligence (CTI) to prepare systems to defend against emerging cyberattacks. Most used intelligence thus far has been limited to tracking known threat indicators such as IP addresses and domain names as they are easier to extract using regular expressions. Due to the limited long-term usage and difficulty of performing a long-term analysis on indicators, we propose using significantly more robust threat intelligence signals called attack patterns. However, extracting attack patterns at scale is a challenging task. In this paper, we present LADDER, a knowledge extraction framework that can extract text-based attack patterns from CTI reports at scale. The model characterizes attack patterns by capturing phases of an attack in android and enterprise networks. It then systematically maps them to the MITRE ATT\&CK pattern framework. We present several use cases to demonstrate the application of LADDER for SOC analysts in determining the presence of attack vectors belonging to emerging attacks in preparation for defenses in advance.
翻译:公共和商业公司广泛分享网络威胁情报(CTI),以准备防范新出现网络攻击的系统。迄今为止,大多数使用的情报仅限于跟踪已知的威胁指标,如IP地址和域名,因为它们较容易使用常规表达方式提取。由于长期使用有限和难以对指标进行长期分析,我们提议使用更强有力的威胁情报信号,称为攻击模式。然而,大规模抽取攻击模式是一项具有挑战性的任务。在本文件中,我们介绍了一个知识提取框架,可以从CTI报告中大规模提取基于文字的攻击模式。该模型通过捕捉攻击、机器人网络和企业网络的各个阶段来描述攻击模式,然后系统地将其绘制到MITRE ATT ⁇ CK模式框架。我们提出了几个案例,用以证明SOC分析员使用LADDER来确定属于新出现的攻击中的攻击矢量,以预先准备防御。