论文标题
当前使用公众枚举的网络威胁和脆弱性识别的挑战
Current Challenges of Cyber Threat and Vulnerability Identification Using Public Enumerations
论文作者
论文摘要
确定网络威胁是安全团队的重要任务之一。当前,可以使用组织为各种格式,枚举和知识库的知识来确定网络威胁。本文研究了使用有关资产的枚举和数据来确定网络空间中漏洞和威胁的当前挑战。尽管在实践中使用了枚举,但我们指出了一些仍然降低脆弱性和威胁识别质量的问题。由于漏洞识别方法基于网络监控和代理,因此问题与资产发现,脆弱性发现的精度和数据量有关。另一方面,威胁识别利用基于图,自然语言,机器学习和本体论方法。当前的趋势是提出利用策略,技术和程序的方法,而不是妥协的低级指标,以使网络威胁识别更加成熟。威胁,脆弱性和资产管理的标准之间的合作也是通过分析公众枚举与知识库之间的关系来确认的一个尚未解决的问题。最后,我们研究了使用网络监控来捕获数据的MITER ATT&CK知识库中技术的可用性。尽管网络流量不是最常用的数据源,但它允许从MITER ATT&CK对所有策略进行建模。
Identification of cyber threats is one of the essential tasks for security teams. Currently, cyber threats can be identified using knowledge organized into various formats, enumerations, and knowledge bases. This paper studies the current challenges of identifying vulnerabilities and threats in cyberspace using enumerations and data about assets. Although enumerations are used in practice, we point out several issues that still decrease the quality of vulnerability and threat identification. Since vulnerability identification methods are based on network monitoring and agents, the issues are related to the asset discovery, the precision of vulnerability discovery, and the amount of data. On the other hand, threat identification utilizes graph-based, nature-language, machine-learning, and ontological approaches. The current trend is to propose methods that utilize tactics, techniques, and procedures instead of low-level indicators of compromise to make cyber threat identification more mature. Cooperation between standards from threat, vulnerability, and asset management is also an unresolved issue confirmed by analyzing relationships between public enumerations and knowledge bases. Last, we studied the usability of techniques from the MITRE ATT&CK knowledge base for threat modeling using network monitoring to capture data. Although network traffic is not the most used data source, it allows the modeling of almost all tactics from the MITRE ATT&CK.