Attack Behavior Extraction Based on Heterogeneous Cyberthreat Intelligence and Graph Convolutional Networks

5Citations
Citations of this article
24Readers
Mendeley users who have this article in their library.

Abstract

The continuous improvement of the cyber threat intelligence sharing mechanism provides new ideas to deal with Advanced Persistent Threats (APT). Extracting attack behaviors, i.e., Tactics, Techniques, Procedures (TTP) from Cyber Threat Intelligence (CTI) can facilitate APT actors’ profiling for an immediate response. However, it is difficult for traditional manual methods to analyze attack behaviors from cyber threat intelligence due to its heterogeneous nature. Based on the Adversarial Tactics, Techniques and Common Knowledge (ATT&CK) of threat behavior description, this paper proposes a threat behavioral knowledge extraction framework that integrates Heterogeneous Text Network (HTN) and Graph Convolutional Network (GCN) to solve this issue. It leverages the hierarchical correlation relationships of attack techniques and tactics in the ATT&CK to construct a text network of heterogeneous cyber threat intelligence. With the help of the Bidirectional Encoder Representation from Transformers (BERT) pretraining model to analyze the contextual semantics of cyber threat intelligence, the task of threat behavior identification is transformed into a text classification task, which automatically extracts attack behavior in CTI, then identifies the malware and advanced threat actors. The experimental results show that F1 achieve 94.86% and 92.15% for the multi-label classification tasks of tactics and techniques. Extend the experiment to verify the method’s effectiveness in identifying the malware and threat actors in APT attacks. The F1 for malware and advanced threat actors identification task reached 98.45% and 99.48%, which are better than the benchmark model in the experiment and achieve state of the art. The model can effectively model threat intelligence text data and acquire knowledge and experience migration by correlating implied features with a priori knowledge to compensate for insufficient sample data and improve the classification performance and recognition ability of threat behavior in text.

References Powered by Scopus

GloVe: Global vectors for word representation

27020Citations
N/AReaders
Get full text

Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks

26286Citations
N/AReaders
Get full text

Representation learning: A review and new perspectives

9926Citations
N/AReaders
Get full text

Cited by Powered by Scopus

SSGCN: a sampling sequential guided graph convolutional network

10Citations
N/AReaders
Get full text

Unknown web attack threat detection based on large language model

0Citations
N/AReaders
Get full text

A Threat Intelligence Event Extraction Conceptual Model for Cyber Threat Intelligence Feeds

0Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Tang, B., Wang, J., Qiu, H., Yu, J., Yu, Z., & Liu, S. (2023). Attack Behavior Extraction Based on Heterogeneous Cyberthreat Intelligence and Graph Convolutional Networks. Computers, Materials and Continua, 74(1), 235–252. https://doi.org/10.32604/cmc.2023.029135

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 7

70%

Professor / Associate Prof. 2

20%

Lecturer / Post doc 1

10%

Readers' Discipline

Tooltip

Computer Science 6

60%

Business, Management and Accounting 2

20%

Social Sciences 1

10%

Engineering 1

10%

Save time finding and organizing research with Mendeley

Sign up for free