2022
DOI: 10.1186/s42400-021-00106-5
|View full text |Cite
|
Sign up to set email alerts
|

TIM: threat context-enhanced TTP intelligence mining on unstructured threat data

Abstract: TTPs (Tactics, Techniques, and Procedures), which represent an attacker’s goals and methods, are the long period and essential feature of the attacker. Defenders can use TTP intelligence to perform the penetration test and compensate for defense deficiency. However, most TTP intelligence is described in unstructured threat data, such as APT analysis reports. Manually converting natural language TTPs descriptions to standard TTP names, such as ATT&CK TTP names and IDs, is time-consuming and requires deep ex… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
2
0
4

Year Published

2022
2022
2025
2025

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(6 citation statements)
references
References 10 publications
0
2
0
4
Order By: Relevance
“…You et al [5] proposed a TTP intelligence mining model that extracts and classifies TTP information from unstructured CTI reports. For this model, Sentence-BERT embeddings were used in the feature extraction step, and a twodimensional convolutional neural network and bidirectional long short-term memory network were used as classifiers, and a high F1 score of 0.97 was obtained.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…You et al [5] proposed a TTP intelligence mining model that extracts and classifies TTP information from unstructured CTI reports. For this model, Sentence-BERT embeddings were used in the feature extraction step, and a twodimensional convolutional neural network and bidirectional long short-term memory network were used as classifiers, and a high F1 score of 0.97 was obtained.…”
Section: Related Workmentioning
confidence: 99%
“…is is because extracting TTP information from CTI data, which are often in the form of a report, is cost-sensitive and time-consuming because CTI reports, such as the advanced persistent threat (APT) report, are unstructured threat data provided in sentence form. Manually converting these explanatory TTP sentences into the TTP naming or ID format of the ATT&CK structure is time-consuming and requires strong expertise [5]. To address these problems, there have been several efforts since 2018 to identify (extract) TTP information from CTI reports or to automatically classify the tactics and techniques in TTP.…”
Section: Introductionmentioning
confidence: 99%
“…Uma das maiores dificuldades no uso de NLP no domínio cibernético é a pouca disponibilidade de bases de dados consistentes e anotadas (Tikhomirov, et al, 2020). Conjuntos de dados relacionados a TTPs são ainda mais raros e essa escassez dificulta o avanço de pesquisas em classificação de TTPs (You, et al, 2022) (Riera, et al, 2022). A despeito da importância, ainda há pouca pesquisa voltada ao problema da extração de TTPs de textos não estruturados (Rahman, et al, 2020).…”
Section: Trabalhos Relacionadosunclassified
“…A pesquisa de Ayoade et al (2018), por sua vez, emprega métodos de correção de viés, de propagação de confiança e de estimativa de importância de pesos para fazer predições de táticas e técnicas presentes em relatórios de CTI. You et al (2022) propõem o framework Threat Intelligence Mining (TIM), desenvolvendo a ferramenta TCENet. A solução faz sua análise agrupando conjuntos de três sentenças de modo a buscar mais contexto.…”
Section: Trabalhos Relacionadosunclassified
See 1 more Smart Citation