Current Challenges of Cyber Threat and Vulnerability Identification Using Public Enumerations

06/29/2022
by   Lukáš Sadlek, et al.
0

Identification of cyber threats is one of the essential tasks for security teams. Currently, cyber threats can be identified using knowledge organized into various formats, enumerations, and knowledge bases. This paper studies the current challenges of identifying vulnerabilities and threats in cyberspace using enumerations and data about assets. Although enumerations are used in practice, we point out several issues that still decrease the quality of vulnerability and threat identification. Since vulnerability identification methods are based on network monitoring and agents, the issues are related to the asset discovery, the precision of vulnerability discovery, and the amount of data. On the other hand, threat identification utilizes graph-based, nature-language, machine-learning, and ontological approaches. The current trend is to propose methods that utilize tactics, techniques, and procedures instead of low-level indicators of compromise to make cyber threat identification more mature. Cooperation between standards from threat, vulnerability, and asset management is also an unresolved issue confirmed by analyzing relationships between public enumerations and knowledge bases. Last, we studied the usability of techniques from the MITRE ATT CK knowledge base for threat modeling using network monitoring to capture data. Although network traffic is not the most used data source, it allows the modeling of almost all tactics from the MITRE ATT CK.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/19/2021

A System for Automated Open-Source Threat Intelligence Gathering and Management

To remain aware of the fast-evolving cyber threat landscape, open-source...
research
06/18/2021

A Survey on Human and Personality Vulnerability Assessment in Cyber-security: Challenges, Approaches, and Open Issues

These days, cyber-criminals target humans rather than machines since the...
research
03/02/2022

Rpkiller: Threat Analysis from an RPKI Relying Party Perspective

The Resource Public Key Infrastructure (RPKI) aims to secure internet ro...
research
06/21/2022

Identification of Attack Paths Using Kill Chain and Attack Graphs

The ever-evolving capabilities of cyber attackers force security adminis...
research
12/08/2021

Towards automation of threat modeling based on a semantic model of attack patterns and weaknesses

This works considers challenges of building and usage a formal knowledge...
research
04/05/2023

Advanced Security Threat Modelling for Blockchain-Based FinTech Applications

Cybersecurity threats and vulnerabilities continue to grow in number and...
research
04/16/2019

On the Impact of Perceived Vulnerability in the Adoption of Information Systems Security Innovations

A number of determinants predict the adoption of Information Systems (IS...

Please sign up or login with your details

Forgot password? Click here to reset