Show simple item record

CYTAG: Multi-Source Behavioral Aggregation of Natural Language Cyber Threat Intelligence

dc.contributor.authorDavid, Olajide D.
dc.contributor.advisorBirhanu Eshete
dc.date.accessioned2022-08-29T19:24:32Z
dc.date.available2022-08-29T19:24:32Z
dc.date.issued2022-08-24
dc.identifier.urihttps://hdl.handle.net/2027.42/174144
dc.description.abstractThe current state-of-the-art in extracting machine-readable attack behavior graphs from natural language cyber threat intelligence (CTI) reports relies on one prominent CTI source such as a high-profile advanced persistent threat (APT) report. This thesis hypothesizes that multiple CTI sources offer complementary fragments of attack behavior due to factors such as variation in analysis details of an attack, polymorphic nature of malicious behavior manifestations, and experience and resources available to the analyst(s) who produce a CTI report. To test this hypothesis, this work proposes a systematic attack behavior graph aggregation approach, called CYTAG, that significantly enhances the fidelity of an attack graph given multiple CTI sources about a given attack such as an APT. CYTAG achieves this while preserving attack semantics and minimizing redundancy of nodes and edges in the aggregated attack graph. Evaluation of CYTAG on CTI reports covering multiple years and comparing its attack graph aggregation results with state-of-the- art attack behavior extraction approach suggests that CYTAG significantly improves the detection and forensics arsenal of cyber threat hunters with reasonable aggregation performance overhead.
dc.languageEnglish
dc.subjectCyber threat intelligence
dc.subjectAttack graph aggregation
dc.subjectAdvanced persistent threats
dc.titleCYTAG: Multi-Source Behavioral Aggregation of Natural Language Cyber Threat Intelligence
dc.typeThesis
dc.description.thesisdegreenameMaster of Science (MS)en_US
dc.description.thesisdegreedisciplineCybersecurity and Information Assurance, College of Engineering & Computer Science
dc.description.thesisdegreegrantorUniversity of Michigan-Dearborn
dc.subject.hlbtoplevelComputer Science
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/174144/1/Olajide_David_Thesis_Final.pdf
dc.identifier.doihttps://dx.doi.org/10.7302/5875
dc.identifier.orcid0000-0002-8328-8454
dc.identifier.name-orcidDavid, Olajide; 0000-0002-8328-8454en_US
dc.working.doi10.7302/5875en
dc.owningcollnameDissertations and Theses (Ph.D. and Master's)


Files in this item

Show simple item record

Remediation of Harmful Language

The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.

Accessibility

If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.