作者
Xiaokui Shu, Frederico Araujo, Douglas L Schales, Marc Ph Stoecklin, Jiyong Jang, Heqing Huang, Josyula R Rao
发表日期
2018/10/15
图书
Proceedings of the 2018 ACM SIGSAC conference on computer and communications security
页码范围
1883-1898
简介
Cyber threat hunting is the process of proactively and iteratively formulating and validating threat hypotheses based on security-relevant observations and domain knowledge. To facilitate threat hunting tasks, this paper introduces threat intelligence computing as a new methodology that models threat discovery as a graph computation problem. It enables efficient programming for solving threat discovery problems, equipping threat hunters with a suite of potent new tools for agile codifications of threat hypotheses, automated evidence mining, and interactive data inspection capabilities. A concrete realization of a threat intelligence computing platform is presented through the design and implementation of a domain-specific graph language with interactive visualization support and a distributed graph database. The platform was evaluated in a two-week DARPA competition for threat detection on a test bed comprising …
引用总数
2019202020212022202320243121215263
学术搜索中的文章
X Shu, F Araujo, DL Schales, MP Stoecklin, J Jang… - Proceedings of the 2018 ACM SIGSAC conference on …, 2018