2021
DOI: 10.48550/arxiv.2101.07769
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

A System for Automated Open-Source Threat Intelligence Gathering and Management

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(9 citation statements)
references
References 10 publications
0
9
0
Order By: Relevance
“…The use of CTI is an integral component of such systems. Knowledge graphs for cybersecurity have been used before to represent various entities [31]- [33]. Open source CTI has been used to build Cybersecurity Knowledge Graphs (CKG) and other agents to aid cybersecurity analysts working in an organization [3]- [10].…”
Section: Ai-based Cyber Systems and Knowledge Graphsmentioning
confidence: 99%
See 3 more Smart Citations
“…The use of CTI is an integral component of such systems. Knowledge graphs for cybersecurity have been used before to represent various entities [31]- [33]. Open source CTI has been used to build Cybersecurity Knowledge Graphs (CKG) and other agents to aid cybersecurity analysts working in an organization [3]- [10].…”
Section: Ai-based Cyber Systems and Knowledge Graphsmentioning
confidence: 99%
“…With the fake CTI examples in Table I we can easily simulate a data poisoning attack where the fake CTI is used as training input to subvert knowledge extraction pipelines such as those described by Piplai et al [32], Mittal et al [3], [4], Gao et al [33], [50], and Arnold et al [10]. Here an attacker can skillfully position fake CTI on multiple OSINT sources like Twitter, Stack Overflow, dark web forums, and blogs.…”
Section: Data Poisoning Using Fake Ctimentioning
confidence: 99%
See 2 more Smart Citations
“…For example, significant inconsistency was detected between reports from the CVE and NVD databases [8], which may cause system administrators to retrieve outdated or incorrect security alerts, exposing systems under their watch to hazard; inconsistency was also detected between two entries created by the same vendor Samsung in [10]; Second, the extracted entries can be used in other downstream applications. For example, we can leverage different categories of entries (e.g., vendor name, vulnerability types, attacker name) to construct a knowledge ontology for modeling the interplay between security entries [16,2]. The extracted entries have also been used for automatically generating a natural language summarization of the original report by leveraging a template [38].…”
Section: Introductionmentioning
confidence: 99%