Security analysts prepare threat analysis upon investigating an attack, an emerging cyber threat, or a recently discovered vulnerability. Threat intelligence on malware attacks and campaigns is shared on blog posts, reports, analyses, and tweets with varying technical details. Other security analysts use this intelligence to inform them of emerging threats, indicators of compromise, attack methods, and preventative measures. Collectively known as threat intelligence, it is typically in an unstructured format and, therefore, challenging to integrate seamlessly into existing IDPS systems. In this paper, we propose a framework that aggregates and combines CTI - the openly available cyber threat intelligence information. The information is extracted and stored in a structured format using knowledge graphs such that the semantics of the threat intelligence can be preserved and shared at scale with other security analysts. We propose the first semi-supervised open-source knowledge graph (KG) framework, TINKER, to capture cyber threat information and its context. Following TINKER, we generate a Cyberthreat Intelligence Knowledge Graph (CTI-KG). We demonstrate the efficacy of CTI-KG using different use cases and its application for security analysts.
翻译:安全分析家在调查攻击、新出现的网络威胁或最近发现的脆弱程度时准备威胁分析。关于恶意攻击和运动的威胁情报在博客文章、报告、分析和带有各种技术细节的推文中分享。其他安全分析家利用这一情报向他们通报新出现的威胁、妥协指标、攻击方法和预防措施。集体称为威胁情报,通常采用非结构化格式,因此难以无缝地融入现有的国内流离失所者信息系统。在本文件中,我们提议了一个框架,将CTI——公开可得的网络威胁情报信息——CTI(CTI-KG)集成并合在一起。这些信息以结构化格式提取和储存,使用知识图表,使威胁情报的语义得以保存,并与其他安全分析家大规模分享。我们提出了第一个半监督的开放源知识图框架(KG),即TINKER,以捕捉网络威胁信息及其背景。在TINKER之后,我们制作了一个网络威胁情报知识图(CTI-KG)。我们用不同用途的案件及其安全分析师的应用展示了CTI-KG的功效。