Leveraging Hierarchies: HMCAT for Efficiently Mapping CTI to Attack Techniques

Zhiqiang Hao, Chuanyi Li, Xiao Fu, Bin Luo, Xiaojiang Du

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

With the advancement of cyber technology, proactive security methods such as adversary emulation and leveraging Cyber Threat Intelligence (CTI) have become increasingly essential. Currently, some methods have achieved automatic mapping of unstructured text Cyber Threat Intelligence to attack techniques that could facilitate proactive security. However, these methods do not consider the semantic relationships between CTI and attack techniques at different abstraction levels, which leads to poor performance in the classification. In this work, we propose a Hierarchy-aware method for Mapping of CTI to Attack Techniques (HMCAT). Specifically, HMCAT first extracts Indicators of Compromise (IOC) entities in the CTI with two steps, then projects the CTI with IOC entities and the corresponding attack technique into a joint embedding space. Finally, HMCAT captures the semantics relationship among text descriptions, coarse-grained techniques, fine-grained techniques and unrelated techniques through a hierarchy-aware mapping loss. Meanwhile, we also propose a data augmentation technique based on in-context learning to solve the problem of long-tailed distribution in the Adversarial Tactics, Techniques and Common Knowledge (ATT&CK) datasets, which could further improve the performance of mapping. Experimental results demonstrate that HMCAT significantly outperforms previous ML and DL methods, improving precision, recall and F-Measure by 6.6%, 13.9% and 9.9% respectively.

Original languageEnglish
Title of host publicationComputer Security – ESORICS 2024 - 29th European Symposium on Research in Computer Security, Proceedings
EditorsJoaquin Garcia-Alfaro, Rafał Kozik, Michał Choraś, Sokratis Katsikas
Pages65-85
Number of pages21
DOIs
StatePublished - 2024
Event29th European Symposium on Research in Computer Security, ESORICS 2024 - Bydgoszcz, Poland
Duration: 16 Sep 202420 Sep 2024

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume14985 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference29th European Symposium on Research in Computer Security, ESORICS 2024
Country/TerritoryPoland
CityBydgoszcz
Period16/09/2420/09/24

Keywords

  • Attack Techniques
  • CTI
  • IOC Entities

Fingerprint

Dive into the research topics of 'Leveraging Hierarchies: HMCAT for Efficiently Mapping CTI to Attack Techniques'. Together they form a unique fingerprint.

Cite this