dc.contributor.author | Bo, T | |
dc.contributor.author | Chen, Y | |
dc.contributor.author | Wang, C | |
dc.contributor.author | Zhao, Y | |
dc.contributor.author | Lam, KY | |
dc.contributor.author | Chi, CH | |
dc.contributor.author | Tian, H | |
dc.date.accessioned | 2020-03-19T03:28:07Z | |
dc.date.available | 2020-03-19T03:28:07Z | |
dc.date.issued | 2019 | |
dc.identifier.isbn | 9783030352301 | |
dc.identifier.issn | 0302-9743 | |
dc.identifier.doi | 10.1007/978-3-030-35231-8_51 | |
dc.identifier.uri | http://hdl.handle.net/10072/392461 | |
dc.description.abstract | Threat profiling helps reveal the current trends of attacks, and underscores the significance of specific vulnerabilities, hence serves as the means for providing an early warning of potential attacks. However, the existing approaches on threat profiling models are mainly rule-based and depend on the domain experts’ knowledge, which limit their applicability in the automated processing of cyber threat information from heterogeneous sources, e.g. the cyber threat intelligence information from open sources. The threat profiling models based on analytic approaches, on the other hand, are potentially capable of automatically discovering the hidden patterns from a massive volume of information. This paper proposes to apply the data analytic approaches to develop the threat profiling models in order to identify the potential threats by analyzing a large number of cyber threat intelligence reports from open sources, extract information from the cyber threat intelligence reports, and represent them in a structure that facilitates the automated risk assessment, and hence achieve the early warning of likely cyber attacks. We introduce the Threat Operating Model (TOM) which captures important information of the identified cyber threats, while can be implemented as an extension of the Structured Threat Information eXpression (STIX). Both the matrix-decomposition based semi-supervised method and the term frequency based unsupervised method are proposed. The experiment results demonstrate a fairly effectiveness (accuracy around 0.8) and a robust performance w.r.t different temporal periods. | |
dc.description.peerreviewed | Yes | |
dc.publisher | Springer | |
dc.relation.ispartofconferencename | 15th International Conference on Advanced Data Mining and Applications (ADMA 2019) | |
dc.relation.ispartofconferencetitle | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | |
dc.relation.ispartofdatefrom | 2019-11-21 | |
dc.relation.ispartofdateto | 2019-11-23 | |
dc.relation.ispartoflocation | Dalian, China | |
dc.relation.ispartofpagefrom | 696 | |
dc.relation.ispartofpageto | 711 | |
dc.relation.ispartofseries | Lecture Notes in Computer Science | |
dc.relation.ispartofvolume | 11888 | |
dc.subject.fieldofresearch | Software engineering | |
dc.subject.fieldofresearch | Information and computing sciences | |
dc.subject.fieldofresearchcode | 4612 | |
dc.subject.fieldofresearchcode | 46 | |
dc.title | TOM: A Threat Operating Model for Early Warning of Cyber Security Threats | |
dc.type | Conference output | |
dc.type.description | E1 - Conferences | |
dcterms.bibliographicCitation | Bo, T; Chen, Y; Wang, C; Zhao, Y; Lam, KY; Chi, CH; Tian, H, TOM: A Threat Operating Model for Early Warning of Cyber Security Threats, Advanced Data Mining and Applications, 2019, 11888, pp. 696-711 | |
dc.date.updated | 2020-03-19T03:24:58Z | |
gro.hasfulltext | No Full Text | |
gro.griffith.author | Wang, Can | |
gro.griffith.author | Tian, Hui | |