Extractor: Extracting attack behavior from threat reports

K Satvat, R Gjomemo… - 2021 IEEE European …, 2021 - ieeexplore.ieee.org
The knowledge on attacks contained in Cyber Threat Intelligence (CTI) reports is very
important to effectively identify and quickly respond to cyber threats. However, this …

Automated retrieval of att&ck tactics and techniques for cyber threat reports

V Legoy, M Caselli, C Seifert, A Peter - arXiv preprint arXiv:2004.14322, 2020 - arxiv.org
Over the last years, threat intelligence sharing has steadily grown, leading cybersecurity
professionals to access increasingly larger amounts of heterogeneous data. Among those …

Poirot: Aligning attack behavior with kernel audit records for cyber threat hunting

SM Milajerdi, B Eshete, R Gjomemo… - Proceedings of the …, 2019 - dl.acm.org
Cyber threat intelligence (CTI) is being used to search for indicators of attacks that might
have compromised an enterprise network for a long time without being discovered. To have …

{ATLAS}: A sequence-based learning approach for attack investigation

A Alsaheel, Y Nan, S Ma, L Yu, G Walkup… - 30th USENIX security …, 2021 - usenix.org
Advanced Persistent Threats (APT) involve multiple attack steps over a long period, and
their investigation requires analysis of myriad logs to identify their attack steps, which are a …

Tactical provenance analysis for endpoint detection and response systems

WU Hassan, A Bates, D Marino - 2020 IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Endpoint Detection and Response (EDR) tools provide visibility into sophisticated intrusions
by matching system events against known adversarial behaviors. However, current solutions …

AttacKG: Constructing technique knowledge graph from cyber threat intelligence reports

Z Li, J Zeng, Y Chen, Z Liang - European Symposium on Research in …, 2022 - Springer
Cyber attacks are becoming more sophisticated and diverse, making attack detection
increasingly challenging. To combat these attacks, security practitioners actively summarize …

{AIRTAG}: Towards Automated Attack Investigation by Unsupervised Learning with Log Texts

H Ding, J Zhai, Y Nan, S Ma - 32nd USENIX Security Symposium …, 2023 - usenix.org
The success of deep learning (DL) techniques has led to their adoption in many fields,
including attack investigation, which aims to recover the whole attack story from logged …

Preventing poisoning attacks on AI based threat intelligence systems

N Khurana, S Mittal, A Piplai… - 2019 IEEE 29th …, 2019 - ieeexplore.ieee.org
As AI systems become more ubiquitous, securing them becomes an emerging challenge.
Over the years, with the surge in online social media use and the data available for analysis …

Ttpdrill: Automatic and accurate extraction of threat actions from unstructured text of cti sources

G Husari, E Al-Shaer, M Ahmed, B Chu… - Proceedings of the 33rd …, 2017 - dl.acm.org
With the rapid growth of the cyber attacks, sharing of cyber threat intelligence (CTI) becomes
essential to identify and respond to cyber attack in timely and cost-effective manner …

A system for automated open-source threat intelligence gathering and management

P Gao, X Liu, E Choi, B Soman, C Mishra… - Proceedings of the …, 2021 - dl.acm.org
To remain aware of the fast-evolving cyber threat landscape, open-source Cyber Threat
Intelligence (OSCTI) has received growing attention from the community. Commonly …