These labels were automatically added by AI and may be inaccurate. For details, see About Literature Database.
Abstract
Attack knowledge graph construction seeks to convert textual cyber threat
intelligence (CTI) reports into structured representations, portraying the
evolutionary traces of cyber attacks. Even though previous research has
proposed various methods to construct attack knowledge graphs, they generally
suffer from limited generalization capability to diverse knowledge types as
well as requirement of expertise in model design and tuning. Addressing these
limitations, we seek to utilize Large Language Models (LLMs), which have
achieved enormous success in a broad range of tasks given exceptional
capabilities in both language understanding and zero-shot task fulfillment.
Thus, we propose a fully automatic LLM-based framework to construct attack
knowledge graphs named: AttacKG+. Our framework consists of four consecutive
modules: rewriter, parser, identifier, and summarizer, each of which is
implemented by instruction prompting and in-context learning empowered by LLMs.
Furthermore, we upgrade the existing attack knowledge schema and propose a
comprehensive version. We represent a cyber attack as a temporally unfolding
event, each temporal step of which encapsulates three layers of representation,
including behavior graph, MITRE TTP labels, and state summary. Extensive
evaluation demonstrates that: 1) our formulation seamlessly satisfies the
information needs in threat event analysis, 2) our construction framework is
effective in faithfully and accurately extracting the information defined by
AttacKG+, and 3) our attack graph directly benefits downstream security
practices such as attack reconstruction. All the code and datasets will be
released upon acceptance.
External Datasets
Re-CTI
CTI-TE
References
European Symposium on Research in Computer Security
Attackg: Constructing technique knowledge graph from cyber threat intelligence reports
Z. Li, J. Zeng, Y. Chen, Z. Liang
Published: 2022
2021 IEEE European Symposium on Security and Privacy (EuroS&P)
Extractor: Extracting attack behavior from threat reports
K. Satvat, R. Gjomemo, V. Venkatakrishnan
Published: 2021
Threatkg: A threat knowledge graph for automated open-source cyber threat intelligence gathering and management
Peng Gao, Xiaoyuan Liu, E. Choi, Sibo Ma, Xinyu Yang, Zheng Ji, Zilin Zhang, Dawn Song
Published: 2022
Proceedings of the 33rd annual computer security applications conference
Ttpdrill: Automatic and accurate extraction of threat actions from unstructured text of cti sources
G. Husari, E. Al-Shaer, M. Ahmed, B. Chu, X. Niu
Published: 2017
Event detection and domain adaptation with convolutional neural networks