Skip to main content

SMET: Semantic Mapping of CVE to ATT&CK and Its Application to Cybersecurity

  • Conference paper
  • First Online:
Data and Applications Security and Privacy XXXVII (DBSec 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13942))

Included in the following conference series:

Abstract

Cybercriminals relentlessly pursue vulnerabilities across cyberspace to exploit software, threatening the security of individuals, organizations, and governments. Although security teams strive to establish defense measures to thwart attackers, the complexity of cyber defense and the magnitude of existing threats exceed the capacity of defenders. Therefore, MITRE took the initiative and introduced multiple frameworks to facilitate the sharing of vital knowledge about vulnerabilities, attacks, and defense information. The Common Vulnerabilities and Exposures (CVE) program and ATT&CK Matrix are two significant MITRE endeavors. CVE facilitates the sharing of publicly discovered vulnerabilities, while ATT&CK collects and categorizes adversaries’ Tactics, Techniques, and Procedures (TTP) and recommends appropriate countermeasures.

As CVE yields a low-level description of the vulnerability, ATT&CK can complement it by providing more insights into that vulnerability from an attacking perspective, thereby aiding defenders in countering exploitation attempts. Unfortunately, due to the complexity of this mapping and the rapid growth of these frameworks, mapping CVE to ATT&CK is a daunting and time-intensive undertaking. Multiple studies have proposed models that automatically achieve this mapping. However, due to their reliance on annotated datasets, these models exhibit limitations in quality and coverage and fail to justify their decisions. To overcome these challenges, we present SMET—a tool that automatically maps CVE entries to ATT&CK techniques based on their textual similarity. SMET achieves this mapping by leveraging ATT&CK BERT, a model that we trained using the SIAMESE network to learn semantic similarity among attack actions. In inference, SMET utilizes semantic extraction, ATT&CK BERT, and a logistic regression model to map CVE entries to ATT&CK techniques. As a result, SMET has demonstrated superior performance compared to other state-of-the-art models.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://github.com/basel-a/SMET.git.

References

  1. 3.3. metrics and scoring: Quantifying the quality of predictions. https://scikit-learn.org/stable/modules/model_evaluation.html#multilabel-ranking-metrics

  2. Jackaduma/secbert \(\cdot \) hugging face. https://huggingface.co/jackaduma/SecBERT

  3. Pretrained models. https://www.sbert.net/docs/pretrained_models.html

  4. Aghaei, E., Niu, X., Shadid, W., Al-Shaer, E.: SecureBERT: a domain-specific language model for cybersecurity. In: Li, F., Liang, K., Lin, Z., Katsikas, S.K. (eds.) SecureComm 2022. LNICS, SITE, vol. 462, pp. 39–56. Springer, Cham (2023). https://doi.org/10.1007/978-3-031-25538-0_3

  5. Aghaei, E., Shadid, W., Al-Shaer, E.: ThreatZoom: hierarchical neural network for CVEs to CWEs classification. In: Park, N., Sun, K., Foresti, S., Butler, K., Saxena, N. (eds.) SecureComm 2020. LNICSSITE, vol. 335, pp. 23–41. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-63086-7_2

    Chapter  Google Scholar 

  6. Ampel, B., Samtani, S., Ullman, S., Chen, H.: Linking common vulnerabilities and exposures to the Mitre ATT&CK framework: a self-distillation approach. arXiv preprint arXiv:2108.01696 (2021)

  7. Andrew, Y., Lim, C., Budiarto, E.: Mapping Linux shell commands to Mitre ATT&CK using NLP-based approach. In: 2022 International Conference on Electrical Engineering and Informatics (ICELTICs), pp. 37–42. IEEE (2022)

    Google Scholar 

  8. Ayoade, G., Chandra, S., Khan, L., Hamlen, K., Thuraisingham, B.: Automated threat report classification over multi-source data. In: 2018 IEEE 4th International Conference on Collaboration and Internet Computing (CIC), pp. 236–245. IEEE (2018)

    Google Scholar 

  9. Center-for-Threat-Informed-Defense: Center-for-threat-informed-defense/attack_to_cve: A methodology for mapping Mitre ATT&CK techniques to vulnerability records to describe the impact of a vulnerability. https://github.com/center-for-threat-informed-defense/attack_to_cve

  10. Das, S.S., Halappanavar, M., Tumeo, A., Serra, E., Pothen, A., Al-Shaer, E.: VWC-BERT: scaling vulnerability-weakness-exploit mapping on modern ai accelerators. In: 2022 IEEE International Conference on Big Data (Big Data), pp. 1224–1229. IEEE (2022)

    Google Scholar 

  11. Devlin, J., Chang, M.W., Lee, K., Toutanova, K.: BERT: pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805 (2018)

  12. Editor, C.C., Cooper, C., Editor, C., the AuthorCharles CooperConsulting EditorCharles Cooper has covered technology, A., business for more than 25 years. He is now assisting Symantec with our blog writing, managing our editorial team., Author, A.T.: Wannacry: Lessons learned 1 year later. https://symantec-enterprise-blogs.security.com/blogs/feature-stories/wannacry-lessons-learned-1-year-later

  13. Engenuity, M.: MAPPING ATT&CK to CVE: Threat-informed defense project, January 2023. https://mitre-engenuity.org/blog/2021/10/21/mapping-attck-to-cve-for-impact/

  14. Fleck, A., Richter, F.: Infographic: cybercrime expected to skyrocket in coming years, December 2022. https://www.statista.com/chart/28878/expected-cost-of-cybercrime-until-2027/

  15. Gardner, M., et al.: AllenNLP: a deep semantic natural language processing platform (2017)

    Google Scholar 

  16. Grigorescu, O., Nica, A., Dascalu, M., Rughinis, R.: CVE2ATT&CK: BERT-based mapping of CVEs to Mitre ATT&CK techniques. Algorithms 15(9), 314 (2022)

    Article  Google Scholar 

  17. Hemberg, E., et al.: Linking threat tactics, techniques, and patterns with defensive weaknesses, vulnerabilities and affected platform configurations for cyber hunting. arXiv preprint arXiv:2010.00533 (2020)

  18. Husari, G., Al-Shaer, E., Ahmed, M., Chu, B., Niu, X.: Ttpdrill: automatic and accurate extraction of threat actions from unstructured text of CTI sources. In: Proceedings of the 33rd Annual Computer Security Applications Conference, pp. 103–115 (2017)

    Google Scholar 

  19. Izzuddin, A.B., Lim, C.: Mapping threats in smart grid system using the Mitre ATT&CK ICS framework. In: 2022 IEEE International Conference on Aerospace Electronics and Remote Sensing Technology (ICARES), pp. 1–7. IEEE (2022)

    Google Scholar 

  20. Kuppa, A., Aouad, L., Le-Khac, N.A.: Linking CVE’s to Mitre ATT&CK techniques. In: Proceedings of the 16th International Conference on Availability, Reliability and Security, pp. 1–12 (2021)

    Google Scholar 

  21. Legoy, V., Caselli, M., Seifert, C., Peter, A.: Automated retrieval of ATT&CK tactics and techniques for cyber threat reports. arXiv preprint arXiv:2004.14322 (2020)

  22. Li, Z., Zeng, J., Chen, Y., Liang, Z.: ATTACKG: constructing technique knowledge graph from cyber threat intelligence reports. In: Atluri, V., Di Pietro, R., Jensen, C.D., Meng, W. (eds.) ESORICS 2022. LNCS, vol. 13554, pp. 589–609. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-17140-6_29

  23. Mendsaikhan, O., Hasegawa, H., Yamaguchi, Y., Shimada, H.: Automatic mapping of vulnerability information to adversary techniques. In: The Fourteenth International Conference on Emerging Security Information, Systems and Technologies SECUREWARE2020 (2020)

    Google Scholar 

  24. Reimers, N., Gurevych, I.: Sentence-BERT: sentence embeddings using Siamese BERT-networks. arXiv preprint arXiv:1908.10084 (2019)

  25. Sajid, M.S.I., Wei, J., Abdeen, B., Al-Shaer, E., Islam, M.M., Diong, W., Khan, L.: Soda: a system for cyber deception orchestration and automation. In: Annual Computer Security Applications Conference, pp. 675–689 (2021)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Basel Abdeen .

Editor information

Editors and Affiliations

Ethics declarations

Disclaimer

Certain equipment, instruments, software, or materials are identified in this paper in order to specify the experimental procedure adequately. Such identification is not intended to imply recommendation or endorsement of any product or service by NIST, nor is it intended to imply that the materials or equipment identified are necessarily the best available for the purpose.

Rights and permissions

Reprints and permissions

Copyright information

© 2023 IFIP International Federation for Information Processing

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Abdeen, B., Al-Shaer, E., Singhal, A., Khan, L., Hamlen, K. (2023). SMET: Semantic Mapping of CVE to ATT&CK and Its Application to Cybersecurity. In: Atluri, V., Ferrara, A.L. (eds) Data and Applications Security and Privacy XXXVII. DBSec 2023. Lecture Notes in Computer Science, vol 13942. Springer, Cham. https://doi.org/10.1007/978-3-031-37586-6_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-37586-6_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-37585-9

  • Online ISBN: 978-3-031-37586-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics