NUST Institutional Repository

Managing Cyber Threat Activities through Formal Modeling of CTI Data

Show simple item record

dc.contributor.author Iqbal, Zafar
dc.date.accessioned 2023-07-17T07:43:06Z
dc.date.available 2023-07-17T07:43:06Z
dc.date.issued 2020
dc.identifier.other 2012-NUST-PhD-IT-35
dc.identifier.uri http://10.250.8.41:8080/xmlui/handle/123456789/34708
dc.description Supervisor: Dr. Zahid Anwar en_US
dc.description.abstract Cyber-attackslaunchedbynation-states,organizations,andindividualswithinand acrossbordersareontherise.Modern-dayadversarieschangesignaturesanduse multiple malwaretolaunchattacks.SuchattacksaretermedasAdvancedPersistence Threats(APTs).Although,alargeamountofcyberthreatdataregardingtheseAPTsis available online,however,duetoitshighveracityandlargevolume,timelyanalysis of APTsisachallengingtaskforsecurityanalysts.Moreover,itisbeingwitnessedthat APTslaunchedagainstanorganizationsubsequentlysucceededwithhighprobability against othersimilarorganizations.Therefore,ithasbecomeaneedofthetimethator- ganizations accumulateandsharecyberthreatdatawithpeers.Furthermore,thisdata should incorporateinformationregardingvariousphasesofcyberthreatmanagement (CTM) namelycyberthreatprevention,detection,andtheresponse.Inthisregard,a few effortshavebeenmadetowardsthestructuringandsharingofcyberthreatdata. Noteworthy amongtheseistheStructuredThreatInformationExpression(STIX).Un- fortunately,thecurrentstateofthestructureddataispoor.Structuredreportsarenot appropriatelyformatted,useincorrectvocabulary,wronglylabelthreatdataorleave out keycomponents,whichcurtailtheirusefulnessforCTM.Thesolutionpresented in thisthesistoaddresstheaforesaidproblemscanbecategorizedunderthreeformal sub-frameworks namely STIXGEN, SCERM, and A2CS. Eachofthesesub-frameworks is designedtowardsobtainingthreeexclusivethesisgoals. The STIXGeneration(STIGEN)frameworkisproposedanditsprototypeisdevel- oped toautomaticallygeneratedistinct,threatrelevant,anderror-freestructureddata. A comprehensiveSTIXdatasetofwell-knownAPTshasbeengeneratedandshared with thecommunityforthebenefitofresearchers. The StructuredthreatdataCleansing,Evaluation,andRefinement(SCERM)frame- work hasbeendevelopedtoacquireSTIXreportsfromtheSTIXGENandotherre- i sourcesandupliftCyberThreatIntelligence(CTI)data,refiningincompleteormissing components, andvaluatingitfordifferentphasesofCTM.DuringSCERM’sevalua- tion, itisobservedthatcurrentSTIXreportshavelimitedinformationonprevention and almostnonefortheresponsephaseofCTM.Theresultsfurtherdemonstratethat SCERM significantlyenrichesSTIXreports.Theimprovementinpreventionis73% and intheresponseis100%. Subsequently,theAPTsAnalysisandClassificationSystem(A2CS)hasbeendevel- oped forautomaticanalysisofAPTs.Itemploysontologymodelingandsemanticrules for APTsanalysis,identificationoftheirmissingartifacts,andinferencingofthetac- tics, techniquesandprocedures(TTPs)beingemployed.A2CStakesrefinedstructured data asinputfromSCERMandextractsbothhighandlow-levelartifactsaccordingto the variousattackeranddefendermodels.Then,itmapsthisdataontheontologythat helps inidentificationofthemissingartifactsofAPTsandinferencingofhigh-level TTPs withhelpoflow-levelartifacts. Overall theproposedsolutiongeneratesrefined,distinct,error-free,andproperly labeled structuredthreatdata,valuatesitfordifferentphasesofCTMandemploys differentattackeranddefendermodelsforautomatedanalysisofAPTs,identification of missingartifacts,andinferencingofthehigh-levelartifacts. en_US
dc.language.iso en en_US
dc.publisher School of Electrical Engineering and Computer Science (SEECS), NUST en_US
dc.subject Managing Cyber Threat Activities through Formal Modeling of CTI Data.ALLPhDTheses. en_US
dc.title Managing Cyber Threat Activities through Formal Modeling of CTI Data en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

  • MS [434]

Show simple item record

Search DSpace


Advanced Search

Browse

My Account