Threat intelligence on malware attacks and campaigns is increasingly being shared with other security experts for a cost or for free. Other security analysts use this intelligence to inform them of indicators of compromise, attack techniques, and preventative actions. Security analysts prepare threat analysis reports after investigating an attack, an emerging cyber threat, or a recently discovered vulnerability. Collectively known as cyber threat intelligence (CTI), the reports are typically in an unstructured format and, therefore, challenging to integrate seamlessly into existing intrusion detection systems. This paper proposes a framework that uses the aggregated CTI for analysis and defense at scale. The information is extracted and stored in a structured format using knowledge graphs such that the semantics of the threat intelligence can be preserved and shared at scale with other security analysts. Specifically, we propose the first semi-supervised open-source knowledge graph-based framework, TINKER, to capture cyber threat information and its context. Following TINKER, we generate a Cyberthreat Intelligence Knowledge Graph (CTI-KG) and demonstrate the usage using different use cases.
翻译:有关恶意攻击和运动的威胁情报正越来越多地以成本或免费与其他安全专家分享。其他安全分析家利用这一情报向他们通报妥协、攻击技术和预防性行动的指标。安全分析家在调查攻击、新出现的网络威胁或最近发现的脆弱程度之后编写威胁分析报告。统称为网络威胁情报(CTI),这些报告通常采用非结构化格式,因此难以无缝地纳入现有的入侵探测系统。本文件提出了一个框架,利用综合的计算机威胁情报系统进行规模分析和防御。信息以结构化格式提取和储存,使用知识图表,使威胁情报的语义能够在规模上与其他安全分析家保存和分享。具体地说,我们提议第一个半监督的开放源知识图表框架(TINKER),以捕捉网络威胁信息及其背景。在TINKER之后,我们制作了一个网络威胁情报知识图(CTI-KG),并用不同的使用案例来展示使用情况。