摘要:本文提出了基于异构信息网络(HIN, Heterogeneous Information Network)的网络威胁情报框架——HINTI,旨在建模异构IOCs之间的相互依赖关系,以量化其相关性,对CTI进行建模和分析。 本文分享自华为云社区《[论文阅读] (07) RAID2020 Cyber Threat Intelligence Modeling GCN》,作
异构威胁智能建模(Heterogeneous Threat Intelligence Modeling)使用异构信息网络来建模不同类型的IOC,引入各种元路径捕获异构IOC之间的相互依赖关系,描述更全面的网络威胁事件概况。 威胁智能计算框架(Threat Intelligence Computing Framework)提出网络威胁智能计算的概念,设计一个通用的计算框架。该框架利用基于权重学习的节点相似...
[AI安全论文] 05.RAID-Cyber Threat Intelligence Modeling Based on GCN 摘要 网络威胁情报(CTI,Cyber Threat Intelligence)已在业界被广泛用于抵御流行的网络攻击,CTI通常被看作将威胁参与者形式化的妥协指标(IOC)。然而当前的网络威胁情报(CTI)存在三个主要局限性: IOC提取的准确性低 孤立的IOC几乎无法描述威胁事件...
摘要:本文提出了基于异构信息网络(HIN, Heterogeneous Information Network)的网络威胁情报框架——HINTI,旨在建模异构IOCs之间的相互依赖关系,以量化其相关性,对CTI进行建模和分析。 本文分享自华为云社区《[论文阅读] (07) RAID2020 Cyber Threat Intelligence Modeling GCN》,作者:eastmount。 原文作者...
本文分享自华为云社区《[论文阅读] (07) RAID2020 Cyber Threat Intelligence Modeling GCN》,作者:eastmount。 原文作者:Jun Zhao, Qiben Yan, Xudong Liu, Bo Li, Guangsheng Zuo 原文标题:Cyber Threat Intelligence Modeling Based on Heterogeneous Graph Convolutional Network ...
论文解读:Cyber Threat Intelligence Modeling Based on Heterogeneous Graph Convolutional Network 威胁情报的作用 从安全相关数据中提取的网络威胁情报 (CTI) 是用于主动抵御网络攻击的结构化信息。 CTI 包括关于现有或不断发展的网络攻击的推理、背景、机制、指标、影响和可操作的建议,可用于提前制定预防措施。 CTI 允许...
Owing to the limited labels of cyber threat infrastructure nodes involved in CTI, automatically identifying the threat type of infrastructure nodes for early warning is also challenging. To tackle these challenges, a practical system called HinCTI is developed for modeling cyber threat intelligence and...
OWLFootnote32ontologies provide conceptual modeling of concepts and properties for arbitrary knowledge domains, including cybersecurity, cyber-situational awareness [57], and cyberthreat intelligence, in which they can facilitate partial automation for tasks that would otherwise have to be manually conducted...
Sarhan I, Spruit M (2021) Open-CyKG: an open cyber threat intelligence knowledge graph. Knowl Based Syst. https://doi.org/10.1016/j.knosys.2021.107524 47. Sikos LF (2019) OWL ontologies in cybersecurity: conceptual modeling of cyber-knowledge. In: Sikos LF (ed) AI in cybersecurity. ...
Applying Threat Intelligence to the Diamond Model of Intrusion Analysis Recorded Future (2018) https://www.recordedfuture.com/diamond-model-intrusion-analysis Google Scholar [53] C. Tankard Advanced persistent threats and how to monitor and deter them Network Security, 2011 (8) (2011), pp. 16-...