Acquiring Cyber Threat Intelligence Through Security Information Correlation

2017 3RD IEEE INTERNATIONAL CONFERENCE ON CYBERNETICS (CYBCONF)(2017)

引用 15|浏览6
暂无评分
摘要
Cyber Physical Systems (CPS) operating in modern critical infrastructures (CIs) are increasingly being targeted by highly sophisticated cyber attacks. Threat actors have quickly learned of the value and potential impact of targeting CPS, and numerous tailored multi-stage cyber-physical attack campaigns, such as Advanced Persistent Threats (APTs), have been perpetrated in the last years. They aim at stealthily compromising systems' operations and cause severe impact on daily business operations such as shutdowns, equipment damage, reputation damage, financial loss, intellectual property theft, and health and safety risks. Protecting CIs against such threats has become as crucial as complicated. Novel distributed detection and reaction methodologies are necessary to effectively uncover these attacks, and timely mitigate their effects. Correlating large amounts of data, collected from a multitude of relevant sources, is fundamental for Security Operation Centers (SOCs) to establish cyber situational awareness, and allow to promptly adopt suitable countermeasures in case of attacks. In our previous work we introduced three methods for security information correlation. In this paper we define metrics and benchmarks to evaluate these correlation methods, we assess their accuracy, and we compare their performance. We finally demonstrate how the presented techniques, implemented within our cyber threat intelligence analysis engine called CAESAIR, can be applied to support incident handling tasks performed by SOCs.
更多
查看译文
关键词
cyber threat intelligence acquisition,security information correlation,cyber physical systems,CPS,critical infrastructures,highly sophisticated cyber attacks,threat actors,multistage cyber-physical attack campaigns,advanced persistent threats,APT,daily business operations,shutdowns,equipment damage,reputation damage,financial loss,intellectual property theft,health risk,safety risk,attack effect mitigation,security operation centers,SOC,cyber situational awareness,attack countermeasures,cyber threat intelligence analysis engine,CAESAIR,incident handling
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要