Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security 2018
DOI: 10.1145/3243734.3243829
|View full text |Cite
|
Sign up to set email alerts
|

Threat Intelligence Computing

Abstract: Cyber threat hunting is the process of proactively and iteratively formulating and validating threat hypotheses based on securityrelevant observations and domain knowledge. To facilitate threat hunting tasks, this paper introduces threat intelligence computing as a new methodology that models threat discovery as a graph computation problem. It enables efficient programming for solving threat discovery problems, equipping threat hunters with a suite of potent new tools for agile codifications of threat hypothes… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
25
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 51 publications
(32 citation statements)
references
References 75 publications
0
25
0
Order By: Relevance
“…It is one of the important research contents in CTI analysis that reconstruct CTI knowledge by using the graph mode. Shu et al [10] used a graph model to organize multisource heterogeneous threat data, which formalize cyber threat intelligence computing into a new security paradigm. Ya et al [11] proposed an attack entities recognition method to construct a CTI knowledge graph.…”
Section: Related Workmentioning
confidence: 99%
“…It is one of the important research contents in CTI analysis that reconstruct CTI knowledge by using the graph mode. Shu et al [10] used a graph model to organize multisource heterogeneous threat data, which formalize cyber threat intelligence computing into a new security paradigm. Ya et al [11] proposed an attack entities recognition method to construct a CTI knowledge graph.…”
Section: Related Workmentioning
confidence: 99%
“…Data-driven cyber security event prediction and analysis are hot topics in current cyber security research [1]. Xiaokui Shu introduces a new methodology that models threat discovery as a graph computation problem for threat intelligence [2]. As a semantic knowledge base, knowledge graph is a powerful tool for managing large-scale knowledge consists with entities and relations between them.…”
Section: Related Workmentioning
confidence: 99%
“…Gao et al [22], [23] present query languages for threat hunters, and a system for processing their queries. Shu et al [73] model threat hunting as a graph computation problem, and present a domain-specific language that simplifies the development of custom graph searches.…”
Section: Attack Detectionmentioning
confidence: 99%