Knowledge Enrichment by Fusing Representations for Malware Threat Intelligence and Behavior

2020 IEEE International Conference on Intelligence and Security Informatics (ISI)(2020)

引用 20|浏览37
暂无评分
摘要
Security engineers and researchers use their disparate knowledge and discretion to identify malware present in a system. Sometimes, they may also use previously extracted knowledge and available Cyber Threat Intelligence (CTI) about known attacks to establish a pattern. To aid in this process, they need knowledge about malware behavior mapped to the available CTI. Such mappings enrich our representations and also helps verify the information. In this paper, we describe how we retrieve malware samples and execute them in a local system. The tracked malware behavior is represented in our Cybersecurity Knowledge Graph (CKG), so that a security professional can reason with behavioral information present in the graph and draw parallels with that information. We also merge the behavioral information with knowledge extracted from the text in CTI sources like technical reports and blogs about the same malware to improve the reasoning capabilities of our CKG significantly.
更多
查看译文
关键词
discretion,cyber threat intelligence,local system,cybersecurity knowledge graph,security professional,behavioral information present,CTI sources,knowledge enrichment,malware threat intelligence,disparate knowledge,malware behavior tracking
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要