HIN-CTIA CYBER THREAT INTELLIGENCE MODELING AND IDENTIFICATION SYSTEM BASED ON HETEROGENEOUS INFORMATION NETWORK

Authors

  • Anjana Author
  • Prof . Poojaranii Author

DOI:

https://doie.org/10.5281/n0cyhg55

Keywords:

Cyber threat intelligence, threat type identification, heterogeneous information network, graph convolutional network, threat infrastructure nodes.,,

Abstract

There has been an increase in the number of businesses prepared to use cyber threat 
intelligence (CTI) to better understand the cyber security landscape. Automatically identifying 
the danger type of infrastructure nodes for early warning is difficult due to the restricted labels 
of cyber threat infrastructure nodes included in CTI. To overcome these obstacles, we create 
the practical system HinCTI, which models cyber threat intelligence and classifies different 
kinds of threats. To illustrate the semantic connection between infrastructure nodes, we first 
create a threat intelligence meta-schema. We then apply the CTI model to an HIN simulation. 
Next, we define a threat Infrastructure similarity measure between threat infrastructure nodes 
based on meta-paths and meta-graph instances, and we introduce a MIIS measure-based 
heterogeneous graph convolutional network (GCN) approach for determining the types of 
infrastructure nodes that pose threats to CTI. To the best of our knowledge, this is the first 
effort to present a heterogeneous GCN-based method to threat type identification of 
infrastructure nodes and to model CTI on HIN for threat identification. Extensive tests are run 
on real-world datasets using HinCTI, and the findings show that our suggested methodology 
can greatly outperform the state-of-the-art baseline approaches in terms of threat type detection.

,

References

S. Samtani, M. Abate, V. Benjamin, and W. Li, Cybersecurity as an Industry: A Cyber

Threat Intelligence Perspective, pp. 1–20. Cham: Springer International Publishing, 2019.

McMillan,

“Definition:

threat

intelligence.”

https://www.gartner.

com/doc/2487216/definition-threat-intelligence, 2013. Retrieved January, 2019.

D. Bianco, “The Pyramid of Pain.” http://detectrespond.blogspot.com/2013/03/the

pyramid-of-pain.html, 2013.

A. Modi, Z. Sun, A. Panwar, T. Khairnar, Z. Zhao, A. Doupé, G.-J. Ahn, and P. Black,

“Towards automated threat intelligence fusion,” in IEEE 2nd International Conference on

Collaboration and Internet Computing (CIC), pp. 408–416, IEEE, 2016.

A. Boukhtouta, D. Mouheb, M. Debbabi, O. Alfandi, F. Iqbal, and M. El Barachi, “Graph

theoretic characterization of cyber-threat infrastructures,” Digital Investigation, vol. 14, pp.

S3–S15, 2015.

C. Sillaber, C. Sauerwein, A. Mussmann, and R. Breu, “Data quality challenges and future

research directions in threat intelligence sharing practice,” in Workshop on Information

Sharing and Collaborative Security, pp. 65–70, ACM, 2016.

S. Lee, H. Cho, N. Kim, B. Kim, and J. Park, “Managing cyber threat intelligence in a

graph database: Methods of analyzing intrusion sets, threat actors, and campaigns,” in

International Conference on Platform Technology and Service (PlatCon), pp. 1–6, IEEE, 2018.

X. Liao, K. Yuan, X. Wang, Z. Li, L. Xing, and R. Beyah, “Acing the IOC game: Toward

automatic discovery and analysis of open-source cyber threat intelligence,” in Proceedings of

the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 755

, ACM, 2016.

G. Husari, E. Al-Shaer, M. Ahmed, B. Chu, and X. Niu, “TTPDrill: Automatic and Accurate

Extraction of Threat Actions from Unstructured Text of CTI Sources,” in Proceedings of the

rd Annual Computer Security Applications Conference, pp. 103–115, ACM, 2017.

F. Böhm, F. Menges, and G. Pernul, “Graph-based visual analytics for cyber threat

intelligence,” Cybersecurity, vol. 1, no. 1, p. 16, 2018.

U. Noor, Z. Anwar, A. W. Malik, S. Khan, and S. Saleem, “A machine learning

framework for investigating data breaches based on semantic analysis of adversary’s attack

patterns in threat intelligence repositories,” Future Generation Computer Systems, 2019.

Downloads.

Published

2023-07-13

How to Cite

HIN-CTIA CYBER THREAT INTELLIGENCE MODELING AND IDENTIFICATION SYSTEM BASED ON HETEROGENEOUS INFORMATION NETWORK . (2023). Phoenix: International Multidisciplinary Research Journal ( Peer Reviewed High Impact Journal ), 1(3), 34-39. https://doi.org/10.5281/n0cyhg55