CGraph: Graph Based Extensible Predictive Domain Threat Intelligence Platform

02/16/2022
by   Wathsara Daluwatta, et al.
0

Ability to effectively investigate indicators of compromise and associated network resources involved in cyber attacks is paramount not only to identify affected network resources but also to detect related malicious resources. Today, most of the cyber threat intelligence platforms are reactive in that they can identify attack resources only after the attack is carried out. Further, these systems have limited functionality to investigate associated network resources. In this work, we propose an extensible predictive cyber threat intelligence platform called cGraph that addresses the above limitations. cGraph is built as a graph-first system where investigators can explore network resources utilizing a graph based API. Further, cGraph provides real-time predictive capabilities based on state-of-the-art inference algorithms to predict malicious domains from network graphs with a few known malicious and benign seeds. To the best of our knowledge, cGraph is the only threat intelligence platform to do so. cGraph is extensible in that additional network resources can be added to the system transparently.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/16/2021

A Heterogeneous Graph Learning Model for Cyber-Attack Detection

A cyber-attack is a malicious attempt by experienced hackers to breach t...
research
12/21/2021

ANUBIS: A Provenance Graph-Based Framework for Advanced Persistent Threat Detection

We present ANUBIS, a highly effective machine learning-based APT detecti...
research
10/26/2020

Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence

Log-based cyber threat hunting has emerged as an important solution to c...
research
01/17/2021

A System for Efficiently Hunting for Cyber Threats in Computer Systems Using Threat Intelligence

Log-based cyber threat hunting has emerged as an important solution to c...
research
11/01/2022

Looking Beyond IoCs: Automatically Extracting Attack Patterns from External CTI

Public and commercial companies extensively share cyber threat intellige...
research
03/21/2019

From Cyber-Security Deception To Manipulation and Gratification Through Gamification

With the ever growing networking capabilities and services offered to us...
research
03/02/2020

Graphing Website Relationships for Risk Prediction: Identifying Derived Threats to Users Based on Known Indicators

The hypothesis for the study was that the relationship based on referrer...

Please sign up or login with your details

Forgot password? Click here to reset