Skip to main content

MTIV: A Trustworthiness Determination Approach for Threat Intelligence

  • Conference paper
  • First Online:
Security, Privacy, and Anonymity in Computation, Communication, and Storage (SpaCCS 2017)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10658))

Abstract

With the gradually sharing of threat intelligences, users concern more about their trustworthiness, which is difficult to be judged. Some threat intelligence sharing platforms choose to show the risk or credibility, and inform users the trustworthiness of the threat intelligence. Several researchers have proposed the requirements and techniques for threat intelligence trust assessment. However, they do not present any tool-based or model solutions. In this paper, we present a Trustworthiness Determination Approach for Threat Intelligence (MTIV) to make up these shortcomings. First, we propose a framework to excavate threat intelligence via multiple sharing platforms, and extract multidimensional trustful features of the threat intelligence. Based on these, contributions of dimensional trustful features to the trustworthiness determination can be derived. Then we introduce Deep Belief Network (DBN) to determine the trustworthiness of the threat intelligence. The experimental results verify that MTIV is more effective than traditional methods. Our work will be of benefit to build a more credible threat intelligence sharing platform, and enhance the capability of real-time detection and resisting the cyberspace attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Hinton, G.E.: Training products of experts by minimizing contrastive divergence. Neural Comput. 14, 1771–1800 (2002)

    Article  MATH  Google Scholar 

  2. Hinton, G.E., Salakhutdinov, R.R.: Reducing the dimensionality of data with neural networks. Science 313(5786), 504–507 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  3. Su, X., Khoshgoftaar, T.M.: A survey of collaborative filtering techniques. Adv. Artif. Intell. Article ID 421425, p. 19 (2009)

    Google Scholar 

  4. Lucassen, T., Muilwijk, R.: Topic familiarity and information skills in online credibility evaluation. J. Assoc. Inf. Sci. Technol. 64(2), 254–264 (2013)

    Article  Google Scholar 

  5. Ginsca, A.L., Popescu, A., Lupu, M.: Credibility in information retrieval. Found. Trends® Inf. Retr. 9(5), 355–475 (2015)

    Article  Google Scholar 

  6. Skopik, F., Settanni, G., Fiedler, R.: A problem shared is a problem halved: a survey on the dimensions of collective cyber defense through security information sharing. Comput. Secur. 60, 154–176 (2016)

    Article  Google Scholar 

  7. Gabrilovich, E., Markovitch, S.: Computing semantic relatedness using Wikipedia-based explicit semantic analysis. Morgan Kaufmann, San Francisco (2007)

    Google Scholar 

  8. Liu, J., Wang, C., Gao, J., Han, J.: Multi-view clustering via joint nonnegative matrix factorization. In: Proceedings of The 2013 SIAM International Conference on Data Mining. Society for Industrial and Applied Mathematics, pp. 252–260 (2013)

    Google Scholar 

  9. Ge, L., Gao, J., Li, X., Zhang, A.: Multi-source deep learning for information trustworthiness estimation. In: Proceedings of The 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2013), pp. 766–774. ACM, New York (2013)

    Google Scholar 

  10. Dandurand, L., Serrano, O.S.: Towards improved cyber security information sharing. In: Proceedings of The 5th International Conference on Cyber Conflict, pp. 1–16, Tallinn (2013)

    Google Scholar 

  11. Umbrich, J., Neumaier, S., Polleres, A.: Quality assessment and evolution of open data portals. In: Proceedings of The 3rd International Conference on Future Internet of Things and Cloud, pp. 404–411 (2015)

    Google Scholar 

  12. Brown, S., Gommers, J., Serrano, O.: From cyber security information sharing to threat management. In: Proceedings of The 2nd ACM Work-shop on WISCS 2015, pp. 43–49. ACM, New York (2015)

    Google Scholar 

  13. Sillaber, C., Sauerwein, C., Mussmann, A., Breu, R.: Data quality challenges and future research directions in threat intelligence sharing practice. In: The ACM Proceedings on Workshop on Information Sharing and Collaborative Security, pp. 65–70. ACM, New York (2016)

    Google Scholar 

  14. Bianco, D.: The Pyramid of Pain. http://detect-respond.blogspot.jp/2013/03/the-pyramid-of-pain.html

  15. Poision Ivy: Assessing Dam age and Extracting Intelligence. https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/rpt-poison-ivy.pdf

  16. Definition: Threat Intelligence. https://www.gartner.com/doc/2487216/definition-threat-intelligence

Download references

Acknowledgements

This work is supported by the National Key Research and Development Program of China (No. 2016QY03D0605), the National Nature Science Foundation of China (Nos. 61672111, 61370069), and Beijing Natural Science Foundation (No. 4162043).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lei Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Li, L., Li, X., Gao, Y. (2017). MTIV: A Trustworthiness Determination Approach for Threat Intelligence. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, KK. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2017. Lecture Notes in Computer Science(), vol 10658. Springer, Cham. https://doi.org/10.1007/978-3-319-72395-2_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-72395-2_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-72394-5

  • Online ISBN: 978-3-319-72395-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics