CTI View: APT Threat Intelligence Analysis System

نویسندگان

چکیده

With the development of advanced persistent threat (APT) and increasingly severe situation network security, strategic defense idea with concept “active defense, traceability, countermeasures” arises at historic moment, thus cyberspace intelligence (CTI) has become valuable in enhancing ability to resist cyber threats. Based on actual demand defending against APT threat, we apply natural language processing process design a new automation system CTI View, which is oriented text extraction analysis for massive unstructured released by various security vendors. The main work View as follows: (1) deal heterogeneous CTI, framework designed based automated test framework, recognition technology, denoising technology. It effectively solves problem poor adaptability when crawlers are used crawl CTI; (2) using regular expressions combined blacklist whitelist mechanism extract IOC TTP information described effectively; (3) according requirements, model bidirectional encoder representations from transformers (BERT) complete entity algorithm intelligence. In this paper, GRU layer added existing BERT-BiLSTM-CRF model, evaluate proposed marked dataset get better performance than current mainstream mode.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Intelligence analysis and threat assessment: towards a more comprehensive model of threat

A central focus of intelligence is the identification, analysis and assessment of threat. However, as acknowledged by intelligence practitioners, threat assessment lags behind the related field of risk assessment. This paper highlights how definitions of threat currently favoured by intelligence agencies are primarily based on threatening entities alone. Consequently, assessments of threat are ...

متن کامل

Adaptively Secure Broadcast: Threat Analytics & Security Intelligence

This work presents an Adaptively Secure Broadcast Mechanism (ASBM) based on threats analytics. It defines the security intelligence of a broadcast system comprehensively with a novel concept of collective intelligence. The algorithmic mechanism is analyzed from the perspectives of security intelligence, communication complexity and computational intelligence. The security intelligence of ASBM i...

متن کامل

Rethinking Information Sharing for Actionable Threat Intelligence

In the past decade, the information security and threat landscape has grown significantly making it difficult for a single defender to defend against all attacks at the same time. This called for introducing information sharing, a paradigm in which threat indicators are shared in a community of trust to facilitate defenses. Standards for representation, exchange, and consumption of indicators a...

متن کامل

cTI : Bottom - Up Termination

We present cTI, a system for bottom-up termination inference. Termination inference is a generalization of termination analy-sis/checking. Traditionally, a termination analyzer tries to prove that a given class of queries terminates. This class must be provided to the system, requiring user annotations. With termination inference such annotations are not necessary. Instead, all provably termina...

متن کامل

Scalable System-level CTI Testing through Lightweight Coarse-grained Coordination

We propose a solution to the problem of system-level testing of functionally complex communication systems based on lightweight coordination. The enabling aspect is here the adoption of a coarse-grained approach to test design, which is central to the scalability of the overall testing environment. This induces an understandable modelling paradigm of system-wide test cases which is adequate for...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Security and Communication Networks

سال: 2022

ISSN: ['1939-0122', '1939-0114']

DOI: https://doi.org/10.1155/2022/9875199