论文标题

攻击技术和漏洞的威胁识别

Attack Techniques and Threat Identification for Vulnerabilities

论文作者

Adam, Constantin, Bulut, Muhammed Fatih, Sow, Daby, Ocepek, Steven, Bedell, Chris, Ngweta, Lilian

论文摘要

现代组织为其网络和应用程序漏洞扫描仪发现和报告的漏洞数量奋斗。因此,优先级和专注力变得至关重要,将有限的时间花在最高风险脆弱性上。这样一来,对于这些组织而言,重要的是要了解漏洞的技术描述,而且要了解攻击者的观点。在这项工作中,我们使用机器学习和自然语言处理技术,以及几个可公开可用的数据集来提供攻击技术和威胁参与者的漏洞的可解释映射。这项工作通过预测最有可能使用哪种攻击技术来利用给定的漏洞以及哪些威胁参与者最有可能进行剥削来提供新的安全情报。缺乏标记的数据和不同的词汇使映射漏洞以大规模攻击技术一个具有挑战性的问题,使用受监督或无监督的(相似性搜索)学习技术无法轻松解决。为了解决这个问题,我们首先将漏洞映射到一组标准的共同弱点,然后将攻击技术的共同弱点映射到一组常见的弱点。这种方法产生的平均相互等级(MRR)为0.95,这是与最新系统报告的准确性相当的准确性。我们的解决方案已部署到IBM安全X-Force红色脆弱性管理服务,自2021年以来的生产中。该解决方案帮助安全从业人员帮助客户管理和优先考虑其漏洞,从

Modern organizations struggle with insurmountable number of vulnerabilities that are discovered and reported by their network and application vulnerability scanners. Therefore, prioritization and focus become critical, to spend their limited time on the highest risk vulnerabilities. In doing this, it is important for these organizations not only to understand the technical descriptions of the vulnerabilities, but also to gain insights into attackers' perspectives. In this work, we use machine learning and natural language processing techniques, as well as several publicly available data sets to provide an explainable mapping of vulnerabilities to attack techniques and threat actors. This work provides new security intelligence, by predicting which attack techniques are most likely to be used to exploit a given vulnerability and which threat actors are most likely to conduct the exploitation. Lack of labeled data and different vocabularies make mapping vulnerabilities to attack techniques at scale a challenging problem that cannot be addressed easily using supervised or unsupervised (similarity search) learning techniques. To solve this problem, we first map the vulnerabilities to a standard set of common weaknesses, and then common weaknesses to the attack techniques. This approach yields a Mean Reciprocal Rank (MRR) of 0.95, an accuracy comparable with those reported for state-of-the-art systems. Our solution has been deployed to IBM Security X-Force Red Vulnerability Management Services, and in production since 2021. The solution helps security practitioners to assist customers to manage and prioritize their vulnerabilities, providing them with an explainable mapping of vulnerabilities to attack techniques and threat actors

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源