skip to main content
10.1145/2663876.2663883acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Taxonomy Model for Cyber Threat Intelligence Information Exchange Technologies

Published:03 November 2014Publication History

ABSTRACT

The cyber threat intelligence information exchange ecosystem is a holistic approach to the automated sharing of threat intelligence. For automation to succeed, it must handle tomorrow's attacks, not just yesterday's. There are numerous ontologies that attempt to enable the sharing of cyber threats, such as OpenIOC, STIX, and IODEF. To date, most ontologies are based on various use cases. Ontology developers collect threat indicators that through experi-ence seem to be useful for exchange. This approach is pragmatic and offers a collection of useful threat indicators in real-world scenarios. However, such a selection method is episodic. What is useful today may not be useful tomorrow. What we consider to be chaff or too hard to share today might become a critically im-portant piece of information. Therefore, in addition to use case-based ontology, ontologies need to be based on first principles. In this document we propose taxonomy for classifying threat-sharing technologies. The purpose of this taxonomy is to classify existing technologies using an agnostic framework, identify gaps in existing technologies, and explain their differences from a sci-entific perspective. We are currently working on a thesaurus that will describe, compare, and classify detailed cyber security terms. This paper focuses on the classification of the ontologies them-selves.

References

  1. Barnum, S., Standardizing Cyber Threat Intelligence Information with the Structured Threat Information eXpression (STIX™), http://stix.mitre.org/about/documents/STIX_Whitepaper_v1.0.pdf, page 11. Accessed: July 16, 2014.Google ScholarGoogle Scholar
  2. Cain, P., APWG Adventures In Information Sharing: Now and For the Future, http://scap.nist.gov/events/2011/itsac/presentations/day2/Cain%20-%20Advenures%20in%20Info%20Sharing.pdf. Accessed: July 16, 2014.Google ScholarGoogle Scholar
  3. Claise, B., Trammell, B., Aitken, P., Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of Flow Information, IETF RFC 7011, September 2013.Google ScholarGoogle Scholar
  4. Danyliw, R., Meijer, J., Demchenko, Y., The Incident Object Description Exchange Format, IETF RFC5070, December 2007.Google ScholarGoogle Scholar
  5. DHS, DHS Sensitive Systems Policy Directive 4300A, Ver-sion 8.0, DHS, March 14, 2011.Google ScholarGoogle Scholar
  6. Davidson, M. and Schmidt, C., The TAXII Default Query Specification: Version 1.0, MITRE, January 13, 2014.Google ScholarGoogle Scholar
  7. Farsight Security, https://github.com/farsightsec/nmsg, Accessed July 30, 2014.Google ScholarGoogle Scholar
  8. Field, J., Resource-Oriented Lightweight Indicator Ex-change, IETF Internet Draft draft-field-mile-rolie-02, August 15, 2013, work in progress (expired).Google ScholarGoogle Scholar
  9. Hefczyc, A. et al., XEP-0268: Incident Handling, XMPP Standards Foundation draft XEP-0268. May 29, 2012. Work in progress.Google ScholarGoogle Scholar
  10. Herzberg, D. and Marburger, A., "The use of layers and planes for architectural design of communication systems," in Proceedings Fourth ISORC, May 2001, pp. 235--242. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. ICASI, "The Common Vulnerability Reporting Framework," http://www.icasi.org/cvrf. Accessed: July 16, 2014Google ScholarGoogle Scholar
  12. Kampanakis, P., Survey: Security Automation and Threat Information Sharing Options, to appear in IEEE Security and Privacy Magazine, September/October 2014.Google ScholarGoogle Scholar
  13. MANDIANT, "OpenIOC," http://www.openioc.org/. Accessed: July 22, 2014.Google ScholarGoogle Scholar
  14. MITRE, "Common Vulnerabilities and Exposures," https://cve.mitre.org/. Accessed: July 23, 2014.Google ScholarGoogle Scholar
  15. MITRE, "Cyber Observable eXpression," http://cybox.mitre.org/, Accessed July 16, 2014.Google ScholarGoogle Scholar
  16. MITRE, "Malware Attribute Enumeration and Characterization," https://maec.mitre.org, Accessed: July 16, 2014.Google ScholarGoogle Scholar
  17. MITRE, "Open Vulnerability and Assessment Language," https://oval.mitre.org, Accessed: July 16, 2014.Google ScholarGoogle Scholar
  18. MITRE, "Structured Threat Information eXpression," http://stix.mitre.org/. Accessed: July 16, 2014.Google ScholarGoogle Scholar
  19. MITRE, "Trusted Automated eXchange of Indicator Information," https://taxii.mitre.org. Accessed: July 16, 2014.Google ScholarGoogle Scholar
  20. Moriarty, K., Real-time Inter-network Defense (RID), IETF RFC6545, April 2012. Accessed July 22, 2014.Google ScholarGoogle Scholar
  21. OASIS, OASIS Customer Information Quality (CIQ) Technical Committee, https://www.oasis-open.org/committees/tc_home.php?wg_abbrev=ciq. Accessed: July 16, 2014.Google ScholarGoogle Scholar
  22. OUSD, "Information Assurance Vulnerability Management," http://www.prim.osd.mil/cap/iavm_req.html?p=1.1.1.1.3, Accessed: July 29, 2014.Google ScholarGoogle Scholar
  23. Parnas, D., "On the criteria to be used in decomposing systems into modules," in Communications of the ACM, v. 15 n. 12, December 1972, pp. 1053--1058. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Savolainen, J. and Myllarniemi, V., "Layered architecture revisited -- Comparison of research and practice," in WICSA/ECSA 2009, September 2009, pp. 317--320.Google ScholarGoogle Scholar
  25. Struse, R., Release of STIX 1.0 and CybOX 2.0, email dated 10 April 2013 to the MITRE STIX discussion list.Google ScholarGoogle Scholar
  26. http://en.wikipedia.org/wiki/Five_Ws, Accessed: July 23, 2014.Google ScholarGoogle Scholar
  27. Takahashi, T., Landfield, K, and Kadobayashi, Y, An Incident Object Description Exchange Format (IODEF) Extension for Structured Cybersecurity Information, IETF RFC 7203, April 2014.Google ScholarGoogle Scholar
  28. Trammel, B., Transport of Real-time Inter-network Defense (RID) Messages over HTTP/TLS, IETF RFC6546, April 2012. Accessed July 22, 2014.Google ScholarGoogle Scholar
  29. VERIZON, Verizon Enterprise Risk And Incident Sharing Metrics Framework, https://www.verizonenterprise.com/resources/whitepapers/wp_verizon-incident-sharing-metrics-framework_en_xg.pdf, Accessed: July 16, 2014Google ScholarGoogle Scholar
  30. YARA, http://plusvic.github.io/yara/. Accessed: July 16, 2014.Google ScholarGoogle Scholar

Index Terms

  1. Taxonomy Model for Cyber Threat Intelligence Information Exchange Technologies

                  Recommendations

                  Comments

                  Login options

                  Check if you have access through your login credentials or your institution to get full access on this article.

                  Sign in
                  • Published in

                    cover image ACM Conferences
                    WISCS '14: Proceedings of the 2014 ACM Workshop on Information Sharing & Collaborative Security
                    November 2014
                    110 pages
                    ISBN:9781450331517
                    DOI:10.1145/2663876

                    Copyright © 2014 ACM

                    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                    Publisher

                    Association for Computing Machinery

                    New York, NY, United States

                    Publication History

                    • Published: 3 November 2014

                    Permissions

                    Request permissions about this article.

                    Request Permissions

                    Check for updates

                    Qualifiers

                    • research-article

                    Acceptance Rates

                    WISCS '14 Paper Acceptance Rate9of18submissions,50%Overall Acceptance Rate23of58submissions,40%

                    Upcoming Conference

                    CCS '24
                    ACM SIGSAC Conference on Computer and Communications Security
                    October 14 - 18, 2024
                    Salt Lake City , UT , USA

                  PDF Format

                  View or Download as a PDF file.

                  PDF

                  eReader

                  View online with eReader.

                  eReader