Share your thoughts, 1 month free Claude Pro on usSee more
WorkDL logo mark

EXTRACTOR: Extracting Attack Behavior from Threat Reports

About

The knowledge on attacks contained in Cyber Threat Intelligence (CTI) reports is very important to effectively identify and quickly respond to cyber threats. However, this knowledge is often embedded in large amounts of text, and therefore difficult to use effectively. To address this challenge, we propose a novel approach and tool called EXTRACTOR that allows precise automatic extraction of concise attack behaviors from CTI reports. EXTRACTOR makes no strong assumptions about the text and is capable of extracting attack behaviors as provenance graphs from unstructured text. We evaluate EXTRACTOR using real-world incident reports from various sources as well as reports of DARPA adversarial engagements that involve several attack campaigns on various OS platforms of Windows, Linux, and FreeBSD. Our evaluation results show that EXTRACTOR can extract concise provenance graphs from CTI reports and show that these graphs can successfully be used by cyber-analytics tools in threat-hunting.

Kiavash Satvat, Rigel Gjomemo, V.N. Venkatakrishnan• 2021

Related benchmarks

TaskDatasetResultRank
Behavior Abstraction DetectionDARPA TC CADETS Nginx
Precision100
3
Behavior Abstraction DetectionDARPA TC Firefox Drakon
Precision100
3
Behavior Abstraction DetectionDARPA TC Metasploit
Precision91
3
Behavior Abstraction DetectionDARPA TC AppStarter
Precision100
3
Behavior Abstraction DetectionDARPA TC JAVA APK
Precision91
3
Behavior Abstraction DetectionDARPA TC Barephone
Precision88
3
Behavior Abstraction DetectionDARPA TC Micro BinFmt
Precision88
3
Behavior Abstraction DetectionDARPA TC Webshell
Precision89
3
Showing 8 of 8 rows

Other info

Follow for update