TY - JOUR
T1 - Improving quality of indicators of compromise using STIX graphs
AU - Chen, Sheng Shan
AU - Hwang, Ren Hung
AU - Ali, Asad
AU - Lin, Ying Dar
AU - Wei, Yu Chih
AU - Pai, Tun Wen
N1 - Publisher Copyright:
© 2024 Elsevier Ltd
PY - 2024/9
Y1 - 2024/9
N2 - Cybersecurity relies on Indicators of Compromise (IoCs) to detect and address threats. Although Threat Intelligence Platforms (TIPs) and Open Source Intelligence (OSINT) are common sources for gathering IoCs, their reliability varies. In our study, we enhance the management of IoCs and OSINT by introducing a novel method that reliably assesses IoC's threat severity and confidence scores, focusing on Structured Threat Information eXpression (STIX) for threat associations. Our approach, implemented on OpenCTI, significantly enhances IoC value, as it aggregates threat intelligence from diverse sources utilizing a STIX graph-based approach, which is a unique feature among TIPs. Additionally, our method employs heuristic analysis to optimize IoC scoring. It takes into account factors such as relevance, completeness, timeliness, accuracy, and consistency while emphasizing the confidence of the source. Notably, the proposed method has enhanced the precision of the confidence score, achieving a 25.18% reduction in the average difference of confidence scores compared to the benchmarked platform. The Emotet and Medusa case studies underscore the importance of source credibility in confidence scores, emphasizing our TIP's precision in cybersecurity threat assessment and defense enhancement.
AB - Cybersecurity relies on Indicators of Compromise (IoCs) to detect and address threats. Although Threat Intelligence Platforms (TIPs) and Open Source Intelligence (OSINT) are common sources for gathering IoCs, their reliability varies. In our study, we enhance the management of IoCs and OSINT by introducing a novel method that reliably assesses IoC's threat severity and confidence scores, focusing on Structured Threat Information eXpression (STIX) for threat associations. Our approach, implemented on OpenCTI, significantly enhances IoC value, as it aggregates threat intelligence from diverse sources utilizing a STIX graph-based approach, which is a unique feature among TIPs. Additionally, our method employs heuristic analysis to optimize IoC scoring. It takes into account factors such as relevance, completeness, timeliness, accuracy, and consistency while emphasizing the confidence of the source. Notably, the proposed method has enhanced the precision of the confidence score, achieving a 25.18% reduction in the average difference of confidence scores compared to the benchmarked platform. The Emotet and Medusa case studies underscore the importance of source credibility in confidence scores, emphasizing our TIP's precision in cybersecurity threat assessment and defense enhancement.
KW - Cyber Threat Intelligence (CTI)
KW - Indicators of Compromise (IoC)
KW - Open Source INTelligence (OSINT)
KW - Structured Threat Information eXpression (STIX)
KW - Threat Intelligence Platform (TIP)
UR - http://www.scopus.com/inward/record.url?scp=85198275249&partnerID=8YFLogxK
U2 - 10.1016/j.cose.2024.103972
DO - 10.1016/j.cose.2024.103972
M3 - Article
AN - SCOPUS:85198275249
SN - 0167-4048
VL - 144
JO - Computers and Security
JF - Computers and Security
M1 - 103972
ER -