Automated Dataset Generation System for Collaborative Research of Cyber Threat Intelligence Analysis

11/25/2018
by   Daegeon Kim, et al.
0

The objectives of cyber attacks are becoming sophisticated and the attackers are concealing their identity by disguising their characteristics to be others. Cyber Threat Intelligence (CTI) analysis is gaining attention to generate meaningful knowledge for understanding the intention of an attacker and, eventually, to make predictions. Developing the analysis technique requires a high volume and fine quality dataset. However, the organizations which have useful data do not release it to the research community because they do not want to disclose threats toward them and the data assets they have. Due to data inaccessibility, academic research tends to be biased towards the techniques for steps among each CTI process except for the analysis and production step. In this paper, we propose the automated dataset generation system named CTIMiner. The system collects threat data from publicly available security reports and malware repositories. The data is stored in the structured format. We release the source codes and the dataset to the public that includes about 628,000 records from 423 security reports published from 2008 to 2017. Also, we present a statistical feature of the dataset and the techniques that can be developed using it. Moreover, we demonstrate one application example of the dataset that analyzes the correlation and characteristics of incidents. We believe our dataset promotes collaborative research of the threat information analysis to generate CTI.

READ FULL TEXT

page 3

page 5

research
06/20/2020

MALOnt: An Ontology for Malware Threat Intelligence

Malware threat intelligence uncovers deep information about malware, thr...
research
04/29/2020

Automated Retrieval of ATT CK Tactics and Techniques for Cyber Threat Reports

Over the last years, threat intelligence sharing has steadily grown, lea...
research
11/13/2021

AttacKG: Constructing Technique Knowledge Graph from Cyber Threat Intelligence Reports

Cyber attacks are becoming more sophisticated and diverse, making detect...
research
03/04/2021

Analyzing the Usefulness of the DARPA OpTC Dataset in Cyber Threat Detection Research

Maintaining security and privacy in real-world enterprise networks is be...
research
07/14/2023

Time for aCTIon: Automated Analysis of Cyber Threat Intelligence in the Wild

Cyber Threat Intelligence (CTI) plays a crucial role in assessing risks ...
research
03/07/2022

The Dangerous Combo: Fileless Malware and Cryptojacking

Fileless malware and cryptojacking attacks have appeared independently a...
research
04/04/2020

Knife and Threat Detectors

Despite rapid advances in image-based machine learning, the threat ident...

Please sign up or login with your details

Forgot password? Click here to reset