Looking Beyond IoCs: Automatically Extracting Attack Patterns from External CTI
Alam, Md Tanvirul, Bhusal, Dipkamal, Park, Youngja, Rastogi, Nidhi
–arXiv.org Artificial Intelligence
Public and commercial organizations extensively share cyberthreat Cyber Threat Intelligence (CTI) offers crucial insights into the intelligence (CTI) to prepare systems to defend against existing rapidly evolving cyber threat landscape. This information includes and emerging cyberattacks. However, traditional CTI has primarily any evidence to identify and assess the associated threats, such as focused on tracking known threat indicators such as IP addresses indicators of compromise (IOCs), IP addresses, domain names, and and domain names, which may not provide long-term value in file hashes, and any associated tactics, techniques, and procedures defending against evolving attacks. To address this challenge, we (TTPs) used by the attacker(s). For instance, CTI can provide comprehensive, propose to use more robust threat intelligence signals called attack contextual information on emerging threats like the patterns. LADDER is a knowledge extraction framework that can advanced persistent threat (APT), ScarCruft [58]. Also known as extract text-based attack patterns from CTI reports at scale. The APT37, the cyber threat intelligence on ScarCruft reported that the framework characterizes attack patterns by capturing the phases of APT targets "individuals in South Korean organizations" with the an attack in Android and enterprise networks and systematically primary objective of "cyber espionage."
arXiv.org Artificial Intelligence
Jul-11-2023
- Country:
- Africa > Middle East (0.04)
- Asia
- Afghanistan > Kabul Province
- Kabul (0.04)
- China > Hong Kong (0.06)
- Middle East (0.04)
- North Korea (0.04)
- South Korea (0.24)
- Afghanistan > Kabul Province
- Europe
- Austria > Vienna (0.14)
- Denmark > Capital Region
- Copenhagen (0.04)
- Italy (0.04)
- Middle East (0.04)
- Spain (0.04)
- United Kingdom > England
- Greater London > London (0.04)
- North America > United States
- California > Santa Clara County
- Santa Clara (0.04)
- Minnesota > Hennepin County
- Minneapolis (0.14)
- New York
- Monroe County > Rochester (0.04)
- New York County > New York City (0.04)
- Virginia > Fairfax County
- McLean (0.04)
- California > Santa Clara County
- Oceania
- Australia (0.04)
- New Zealand > North Island
- Auckland Region > Auckland (0.04)
- Genre:
- Research Report > New Finding (0.46)
- Industry:
- Government > Military
- Cyberwarfare (0.67)
- Information Technology > Security & Privacy (1.00)
- Government > Military
- Technology:
- Information Technology
- Artificial Intelligence
- Machine Learning > Neural Networks
- Deep Learning (1.00)
- Natural Language > Text Processing (0.94)
- Representation & Reasoning (1.00)
- Machine Learning > Neural Networks
- Communications
- Networks (1.00)
- Social Media (1.00)
- Data Science > Data Mining (1.00)
- Security & Privacy (1.00)
- Artificial Intelligence
- Information Technology