Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
97 tokens/sec
GPT-4o
53 tokens/sec
Gemini 2.5 Pro Pro
44 tokens/sec
o3 Pro
5 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

A System for Efficiently Hunting for Cyber Threats in Computer Systems Using Threat Intelligence (2101.06761v2)

Published 17 Jan 2021 in cs.CR, cs.CL, and cs.DB

Abstract: Log-based cyber threat hunting has emerged as an important solution to counter sophisticated cyber attacks. However, existing approaches require non-trivial efforts of manual query construction and have overlooked the rich external knowledge about threat behaviors provided by open-source Cyber Threat Intelligence (OSCTI). To bridge the gap, we build ThreatRaptor, a system that facilitates cyber threat hunting in computer systems using OSCTI. Built upon mature system auditing frameworks, ThreatRaptor provides (1) an unsupervised, light-weight, and accurate NLP pipeline that extracts structured threat behaviors from unstructured OSCTI text, (2) a concise and expressive domain-specific query language, TBQL, to hunt for malicious system activities, (3) a query synthesis mechanism that automatically synthesizes a TBQL query from the extracted threat behaviors, and (4) an efficient query execution engine to search the big system audit logging data.

User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (10)
  1. Peng Gao (402 papers)
  2. Fei Shao (3 papers)
  3. Xiaoyuan Liu (44 papers)
  4. Xusheng Xiao (17 papers)
  5. Haoyuan Liu (5 papers)
  6. Zheng Qin (58 papers)
  7. Fengyuan Xu (18 papers)
  8. Prateek Mittal (129 papers)
  9. Sanjeev R. Kulkarni (32 papers)
  10. Dawn Song (229 papers)
Citations (13)

Summary

We haven't generated a summary for this paper yet.