Visible to the public Acquiring Cyber Threat Intelligence through Security Information Correlation

TitleAcquiring Cyber Threat Intelligence through Security Information Correlation
Publication TypeConference Paper
Year of Publication2017
AuthorsSettanni, G., Shovgenya, Y., Skopik, F., Graf, R., Wurzenberger, M., Fiedler, R.
Conference Name2017 3rd IEEE International Conference on Cybernetics (CYBCONF)
Date Publishedjun
Keywordsadvanced persistent threats, APT, attack countermeasures, attack effect mitigation, CAESAIR, composability, computer security, Correlation, CPS, critical infrastructures, cyber physical systems, cyber situational awareness, cyber threat intelligence acquisition, cyber threat intelligence analysis engine, Cyber-physical systems, daily business operations, Data analysis, equipment damage, Europe, financial loss, health risk, highly sophisticated cyber attacks, incident handling, intellectual property theft, Joining processes, knowledge acquisition, Malware, Measurement, Metrics, multistage cyber-physical attack campaigns, pubcrawl, reputation damage, Resiliency, safety risk, security information correlation, security of data, security operation centers, shutdowns, situational awareness, SoC, threat actors
Abstract

Cyber Physical Systems (CPS) operating in modern critical infrastructures (CIs) are increasingly being targeted by highly sophisticated cyber attacks. Threat actors have quickly learned of the value and potential impact of targeting CPS, and numerous tailored multi-stage cyber-physical attack campaigns, such as Advanced Persistent Threats (APTs), have been perpetrated in the last years. They aim at stealthily compromising systems' operations and cause severe impact on daily business operations such as shutdowns, equipment damage, reputation damage, financial loss, intellectual property theft, and health and safety risks. Protecting CIs against such threats has become as crucial as complicated. Novel distributed detection and reaction methodologies are necessary to effectively uncover these attacks, and timely mitigate their effects. Correlating large amounts of data, collected from a multitude of relevant sources, is fundamental for Security Operation Centers (SOCs) to establish cyber situational awareness, and allow to promptly adopt suitable countermeasures in case of attacks. In our previous work we introduced three methods for security information correlation. In this paper we define metrics and benchmarks to evaluate these correlation methods, we assess their accuracy, and we compare their performance. We finally demonstrate how the presented techniques, implemented within our cyber threat intelligence analysis engine called CAESAIR, can be applied to support incident handling tasks performed by SOCs.

URLhttp://ieeexplore.ieee.org/document/7985754/
DOI10.1109/CYBConf.2017.7985754
Citation Keysettanni_acquiring_2017