Presentation | 2017-03-14 Representation for Attack Activity to Associate Threat Information Daiki Ito, Kenta Nomura, Masaki Kamizono, Yoshiaki Shiraishi, Yasuhiro Takano, Masami Mohri, Yuji Hoshizawa, Masakatu Morii, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | As sophisticated and complicated cyber attacks become a social problem, Threat Intelligence, in which new knowledge obtained from diversified analysis of various information on cyber security is utilized for security measures, has attracted attention in recent years It is important to analyze the attack activity of adversary in Threat Intelligence. There is modeling of attack activity as a method for analyzing it. By using “Diamond Model” which is one of the modeling methods, a series of attack activity can be expressed as graph, which is called “activity thread”. In this paper, we assume that the characteristics and trends of attack activity appear in the structure of “activity thread” and propose a method to associate different attack activities with “activity thread.” We make a numerical experiment to check the effectiveness. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Diamond Model / Threat Intelligence / Graph structure / Data-Driven Fingerprints |
Paper # | ICSS2016-64 |
Date of Issue | 2017-03-06 (ICSS) |
Conference Information | |
Committee | ICSS / IPSJ-SPT |
---|---|
Conference Date | 2017/3/13(2days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | University of Nagasaki |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | System Security, etc. |
Chair | Yutaka Miyake(KDDI R&D Labs.) |
Vice Chair | Yoshiaki Shiraishi(Kobe Univ.) / Takeshi Ueda(Mitsubishi Electric) |
Secretary | Yoshiaki Shiraishi(NII) / Takeshi Ueda(Yokohama National Univ.) |
Assistant | Kazunori Kamiya(NTT) / Takahiro Kasama(NICT) |
Paper Information | |
Registration To | Technical Committee on Information and Communication System Security / Special Interest Group on Security Psychology and Trust |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Representation for Attack Activity to Associate Threat Information |
Sub Title (in English) | |
Keyword(1) | Diamond Model |
Keyword(2) | Threat Intelligence |
Keyword(3) | Graph structure |
Keyword(4) | Data-Driven Fingerprints |
1st Author's Name | Daiki Ito |
1st Author's Affiliation | Kobe University(Kobe Univ.) |
2nd Author's Name | Kenta Nomura |
2nd Author's Affiliation | Kobe University(Kobe Univ.) |
3rd Author's Name | Masaki Kamizono |
3rd Author's Affiliation | PwC Cyber Services(PwC Cyber Services) |
4th Author's Name | Yoshiaki Shiraishi |
4th Author's Affiliation | Kobe University(Kobe Univ.) |
5th Author's Name | Yasuhiro Takano |
5th Author's Affiliation | Kobe University(Kobe Univ.) |
6th Author's Name | Masami Mohri |
6th Author's Affiliation | Gifu University(Gifu Univ.) |
7th Author's Name | Yuji Hoshizawa |
7th Author's Affiliation | PwC Cyber Services(PwC Cyber Services) |
8th Author's Name | Masakatu Morii |
8th Author's Affiliation | Kobe University(Kobe Univ.) |
Date | 2017-03-14 |
Paper # | ICSS2016-64 |
Volume (vol) | vol.116 |
Number (no) | ICSS-522 |
Page | pp.pp.147-152(ICSS), |
#Pages | 6 |
Date of Issue | 2017-03-06 (ICSS) |