skip to main content
10.1145/3444370.3444600acmotherconferencesArticle/Chapter ViewAbstractPublication PagesciatConference Proceedingsconference-collections
research-article

An APT Group Knowledge Model based on MDATA

Authors Info & Claims
Published:04 January 2021Publication History

ABSTRACT

Situational awareness is significant for cyber security, which can help researchers and security analysts obtain the network security situation comprehensively and accurately. Advanced Persistent Threat (APT) attack could cause severe consequences to cyberspace and detecting such attacks have become a very important part of cyber security situational awareness. Some APT attacks may belong to a same group, many countries and organizations have established databases for APT groups, such as adopting knowledge graph (KG) to represent the knowledge. However, cyberspace security knowledge varies by temporal and spatial characteristics, such as the attack technologies are updated very frequently, traditional KG cannot represent such knowledge timely. To address this problem, the MDATA (Multi-dimensional Data Association and inTelligent Analysis) model is proposed in [1], which is a supplement and improvement to traditional KG. In this paper, we introduce an APT group knowledge model based on MDATA, which adds spatial-temporal characteristics of the APT groups. We also analyze how this knowledge model could help address the challenges of APT attack awareness.

References

  1. Y. Jia, B. Fang, Z. Gu, et al (2020). Network Security Situation Awareness. ISBN 9787121394843.Google ScholarGoogle Scholar
  2. B. Fang, Y. Jia, X. Li, A. Li, and X. Wu (2017). Big Search in Cyberspace. In IEEE Transactions on Knowledge and Data Engineering.Google ScholarGoogle ScholarCross RefCross Ref
  3. Z.H. Gong, Y. Zhou (2010). Research on cyberspace situational awareness. Journal of Software, 21(7), pp. 1605--1619.Google ScholarGoogle Scholar
  4. Y. Cheng, Y. Sagduyu, J. Deng, J. Li and P. Liu (2012). Integrated situational awareness for cyber attack detection, analysis, and mitigation. https://doi.org/10.1117/12.919261.Google ScholarGoogle Scholar
  5. Y. Jia, Y. Qi and H. Shang et al. (2018). A Practical Approach to Constructing a Knowledge Graph for Cybersecurity. Engineering, 4(1), pp. 53--60.Google ScholarGoogle ScholarCross RefCross Ref
  6. M. Iannacone, S. Bohn and G. Nakamura et al. (2015). Developing an Ontology for Cyber Security Knowledge Graphs. https://doi.org/10.1145/2746266. 2746278. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. A. Piplai, S. Mittal and A. Joshi et al (2019). Creating Cybersecurity Knowledge Graphs from Malware After Action Reports. https://ebiquity.umbc.edu/paper/html/id/872/Creating-Cybersecurity-Knowledge-Graphs-from-Malware-After-Action-Reports.Google ScholarGoogle Scholar
  8. Y. Qi, R. Jiang, Y. Jia and A. Li. An APT Attack Analysis Framework Based on Self-define Rules and Mapreduce. https://ieeexplore.ieee.org/abstract/document/9172855.Google ScholarGoogle Scholar
  9. T. Debatty, W. Mees and T. Gilon (2018). Graph-based APT detection. International Conference on Military Communications and Information Systems (ICMCIS), pp. 1--8.Google ScholarGoogle ScholarCross RefCross Ref
  10. P. Giura and W. Wang (2012). A Context-Based Detection Framework for Advanced Persistent Threats. International Conference on Cyber Security, pp. 69--74. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. An APT Group Knowledge Model based on MDATA

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        CIAT 2020: Proceedings of the 2020 International Conference on Cyberspace Innovation of Advanced Technologies
        December 2020
        597 pages
        ISBN:9781450387828
        DOI:10.1145/3444370

        Copyright © 2020 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 4 January 2021

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited

        Acceptance Rates

        CIAT 2020 Paper Acceptance Rate94of232submissions,41%Overall Acceptance Rate94of232submissions,41%
      • Article Metrics

        • Downloads (Last 12 months)39
        • Downloads (Last 6 weeks)5

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader