AIセキュリティポータル K Program
AttacKG+:Boosting Attack Knowledge Graph Construction with Large Language Models
Share
Abstract
Attack knowledge graph construction seeks to convert textual cyber threat intelligence (CTI) reports into structured representations, portraying the evolutionary traces of cyber attacks. Even though previous research has proposed various methods to construct attack knowledge graphs, they generally suffer from limited generalization capability to diverse knowledge types as well as requirement of expertise in model design and tuning. Addressing these limitations, we seek to utilize Large Language Models (LLMs), which have achieved enormous success in a broad range of tasks given exceptional capabilities in both language understanding and zero-shot task fulfillment. Thus, we propose a fully automatic LLM-based framework to construct attack knowledge graphs named: AttacKG+. Our framework consists of four consecutive modules: rewriter, parser, identifier, and summarizer, each of which is implemented by instruction prompting and in-context learning empowered by LLMs. Furthermore, we upgrade the existing attack knowledge schema and propose a comprehensive version. We represent a cyber attack as a temporally unfolding event, each temporal step of which encapsulates three layers of representation, including behavior graph, MITRE TTP labels, and state summary. Extensive evaluation demonstrates that: 1) our formulation seamlessly satisfies the information needs in threat event analysis, 2) our construction framework is effective in faithfully and accurately extracting the information defined by AttacKG+, and 3) our attack graph directly benefits downstream security practices such as attack reconstruction. All the code and datasets will be released upon acceptance.
Attackg: Constructing technique knowledge graph from cyber threat intelligence reports
Z. Li, J. Zeng, Y. Chen, Z. Liang
Published: 2022
Extractor: Extracting attack behavior from threat reports
K. Satvat, R. Gjomemo, V. Venkatakrishnan
Published: 2021
Threatkg: A threat knowledge graph for automated open-source cyber threat intelligence gathering and management
Peng Gao, Xiaoyuan Liu, E. Choi, Sibo Ma, Xinyu Yang, Zheng Ji, Zilin Zhang, Dawn Song
Published: 2022
Ttpdrill: Automatic and accurate extraction of threat actions from unstructured text of cti sources
G. Husari, E. Al-Shaer, M. Ahmed, B. Chu, X. Niu
Published: 2017
Event detection and domain adaptation with convolutional neural networks
T. Nguyen, R. Grishman
Published: 2015
Extracting biomedical events with parallel multi-pooling convolutional neural networks
L. Li, Y. Liu, M. Qin
Published: 2018
Exploiting a More Global Context for Event Detection Through Bootstrapping
D. Kodelja, R. Besançon, O. Ferret
Published: 2019
Acing the ioc game: Toward automatic discovery and analysis of open-source cyber threat intelligence
X. Liao
Published: 2016
Share