Acquiring Cyber Threat Intelligence through Security Information Correlation
Title | Acquiring Cyber Threat Intelligence through Security Information Correlation |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Settanni, G., Shovgenya, Y., Skopik, F., Graf, R., Wurzenberger, M., Fiedler, R. |
Conference Name | 2017 3rd IEEE International Conference on Cybernetics (CYBCONF) |
Date Published | jun |
Keywords | advanced persistent threats, APT, attack countermeasures, attack effect mitigation, CAESAIR, composability, computer security, Correlation, CPS, critical infrastructures, cyber physical systems, cyber situational awareness, cyber threat intelligence acquisition, cyber threat intelligence analysis engine, Cyber-physical systems, daily business operations, Data analysis, equipment damage, Europe, financial loss, health risk, highly sophisticated cyber attacks, incident handling, intellectual property theft, Joining processes, knowledge acquisition, Malware, Measurement, Metrics, multistage cyber-physical attack campaigns, pubcrawl, reputation damage, Resiliency, safety risk, security information correlation, security of data, security operation centers, shutdowns, situational awareness, SoC, threat actors |
Abstract | Cyber Physical Systems (CPS) operating in modern critical infrastructures (CIs) are increasingly being targeted by highly sophisticated cyber attacks. Threat actors have quickly learned of the value and potential impact of targeting CPS, and numerous tailored multi-stage cyber-physical attack campaigns, such as Advanced Persistent Threats (APTs), have been perpetrated in the last years. They aim at stealthily compromising systems' operations and cause severe impact on daily business operations such as shutdowns, equipment damage, reputation damage, financial loss, intellectual property theft, and health and safety risks. Protecting CIs against such threats has become as crucial as complicated. Novel distributed detection and reaction methodologies are necessary to effectively uncover these attacks, and timely mitigate their effects. Correlating large amounts of data, collected from a multitude of relevant sources, is fundamental for Security Operation Centers (SOCs) to establish cyber situational awareness, and allow to promptly adopt suitable countermeasures in case of attacks. In our previous work we introduced three methods for security information correlation. In this paper we define metrics and benchmarks to evaluate these correlation methods, we assess their accuracy, and we compare their performance. We finally demonstrate how the presented techniques, implemented within our cyber threat intelligence analysis engine called CAESAIR, can be applied to support incident handling tasks performed by SOCs. |
URL | http://ieeexplore.ieee.org/document/7985754/ |
DOI | 10.1109/CYBConf.2017.7985754 |
Citation Key | settanni_acquiring_2017 |
- reputation damage
- highly sophisticated cyber attacks
- incident handling
- intellectual property theft
- Joining processes
- knowledge acquisition
- malware
- Measurement
- Metrics
- multistage cyber-physical attack campaigns
- pubcrawl
- health risk
- Resiliency
- safety risk
- security information correlation
- security of data
- security operation centers
- shutdowns
- situational awareness
- SoC
- threat actors
- cyber physical systems
- APT
- attack countermeasures
- attack effect mitigation
- CAESAIR
- composability
- computer security
- Correlation
- CPS
- critical infrastructures
- advanced persistent threats
- cyber situational awareness
- cyber threat intelligence acquisition
- cyber threat intelligence analysis engine
- cyber-physical systems
- daily business operations
- data analysis
- equipment damage
- Europe
- financial loss