WeChat Mini Program
Old Version Features

Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyber Hunting

CoRR(2020)

Cited 9|Views30
Abstract
Many public sources of cyber threat and vulnerability information exist to help defend cyber systems. This paper links MITRE's ATT CK MATRIX of Tactics and Techniques, NIST's Common Weakness Enumerations (CWE), Common Vulnerabilities and Exposures (CVE), and Common Attack Pattern Enumeration and Classification list (CAPEC), to gain further insight from alerts, threats and vulnerabilities. We preserve all entries and relations of the sources, while enabling bi-directional, relational path tracing within an aggregate data graph called BRON. In one example, we use BRON to enhance the information derived from a list of the top 10 most frequently exploited CVEs. We identify attack patterns, tactics, and techniques that exploit these CVEs and also uncover a disparity in how much linked information exists for each of these CVEs. This prompts us to further inventory BRON's collection of sources to provide a view of the extent and range of the coverage and blind spots of public data sources.
More
Translated text
Key words
Attack Graphs,Security Analysis,Botnet Detection,Intrusion Detection
PDF
Bibtex
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Data Disclaimer
The page data are from open Internet sources, cooperative publishers and automatic analysis results through AI technology. We do not make any commitments and guarantees for the validity, accuracy, correctness, reliability, completeness and timeliness of the page data. If you have any questions, please contact us by email: report@aminer.cn
Chat Paper

要点】:本文将MITRE的ATT&CK矩阵、NIST的CWE、CVE和CAPEC相结合,构建了一个名为BRON的聚合数据图,以深入分析网络安全威胁、弱点和受影响平台配置之间的关联,发现了公开数据源在覆盖范围和盲点方面的差异。

方法】:通过整合多个公开的网络安全信息资源,并使用BRON数据图进行双向关系路径追踪,保留了所有条目和关系。

实验】:作者使用BRON对CVE列表中的前10个最常被利用的CVE进行了分析,识别了攻击模式、战术和技术,并发现了每个CVE关联信息的差异。实验结果揭示了公开数据源在信息覆盖和盲点方面的具体情况。