Association ruleset formulation for cyberattack attribution process in cyber threat intelligence using apriori algorithm

The current threat landscape shows that the rapid evolving cyberattacks with the Tactic, Technique and Procedure (TTPs) used by an adversary become less predictable, more persistent, resourceful, money motivated and better funded. Many organisation has taken an initiative to utilize Cyber Threat Int...

Full description

Bibliographic Details
Main Author: Abu, Md Sahrom
Format: Thesis
Language:English
English
Published: 2021
Subjects:
Online Access:http://eprints.utem.edu.my/id/eprint/26021/
https://plh.utem.edu.my/cgi-bin/koha/opac-detail.pl?biblionumber=121151
Abstract Abstract here
_version_ 1855619784123613184
author Abu, Md Sahrom
author_facet Abu, Md Sahrom
author_sort Abu, Md Sahrom
description The current threat landscape shows that the rapid evolving cyberattacks with the Tactic, Technique and Procedure (TTPs) used by an adversary become less predictable, more persistent, resourceful, money motivated and better funded. Many organisation has taken an initiative to utilize Cyber Threat Intelligence (CTI) in their security posture in attributing cyberattack effectively. However, the massive amount of data from threat intelligence feeds for CTI is sketchy and not dependable in terms of quality. This voluminous data can lead to ineffectiveness of identifying cyberattack attribution level due to a lack of useful data from various data sources. To fully leverage CTI capabilities for threat attribution, an organisation need to spend their focus more on discovering the hidden knowledge behind the voluminous data to produce an effective cyberattack attribution. Hence, this thesis focused mainly on the relationship between data in the CTI, with the aim of investigating the critical CTI process involved in cyberattacks attribution and formulating the association ruleset to perform the attribution process in the CTI. Data collected from various sources underwent preprocessing state to prepare a required data format for data analysis. Prior to that, an analysis of CTI framework was conducted to classify the critical CTI processes that involved in cyberattack attribution. Based on these critical processes, an experiment is designed to produce cyberattack attribution. This attribution was produced through data preprocessing and association analysis processes. In data preprocessing, a clean and useful data is produced and become as an input for association analysis process. Then, the Apriori algorithm is used to formulate association ruleset in association analysis process and is known as the CTI Association Ruleset (CTI-AR). The CTI-AR was evaluated and validated to verify its effectiveness in identifying cyberattack attribution level by using an experimental approach. The results showed that CTI-AR effectively identify the attributes, relationship between attributes and attribution level group of cyberattack in CTI. This confirmed that CTI-AR capable to identify a strong and meaningful association between basic indicator of compromise (IOC) in network traffic and TTPs that can help to perform cyberattack attribution. This research has a high potential of being expanded into cyber threat hunting process in providing a more proactive cybersecurity environment.
format Thesis
id utem-26021
institution Universiti Teknikal Malaysia Melaka
language English
English
publishDate 2021
record_format EPrints
record_pdf Restricted
spelling utem-260212022-09-29T12:09:22Z http://eprints.utem.edu.my/id/eprint/26021/ Association ruleset formulation for cyberattack attribution process in cyber threat intelligence using apriori algorithm Abu, Md Sahrom Q Science (General) QA Mathematics The current threat landscape shows that the rapid evolving cyberattacks with the Tactic, Technique and Procedure (TTPs) used by an adversary become less predictable, more persistent, resourceful, money motivated and better funded. Many organisation has taken an initiative to utilize Cyber Threat Intelligence (CTI) in their security posture in attributing cyberattack effectively. However, the massive amount of data from threat intelligence feeds for CTI is sketchy and not dependable in terms of quality. This voluminous data can lead to ineffectiveness of identifying cyberattack attribution level due to a lack of useful data from various data sources. To fully leverage CTI capabilities for threat attribution, an organisation need to spend their focus more on discovering the hidden knowledge behind the voluminous data to produce an effective cyberattack attribution. Hence, this thesis focused mainly on the relationship between data in the CTI, with the aim of investigating the critical CTI process involved in cyberattacks attribution and formulating the association ruleset to perform the attribution process in the CTI. Data collected from various sources underwent preprocessing state to prepare a required data format for data analysis. Prior to that, an analysis of CTI framework was conducted to classify the critical CTI processes that involved in cyberattack attribution. Based on these critical processes, an experiment is designed to produce cyberattack attribution. This attribution was produced through data preprocessing and association analysis processes. In data preprocessing, a clean and useful data is produced and become as an input for association analysis process. Then, the Apriori algorithm is used to formulate association ruleset in association analysis process and is known as the CTI Association Ruleset (CTI-AR). The CTI-AR was evaluated and validated to verify its effectiveness in identifying cyberattack attribution level by using an experimental approach. The results showed that CTI-AR effectively identify the attributes, relationship between attributes and attribution level group of cyberattack in CTI. This confirmed that CTI-AR capable to identify a strong and meaningful association between basic indicator of compromise (IOC) in network traffic and TTPs that can help to perform cyberattack attribution. This research has a high potential of being expanded into cyber threat hunting process in providing a more proactive cybersecurity environment. 2021 Thesis NonPeerReviewed text en http://eprints.utem.edu.my/id/eprint/26021/1/Association%20ruleset%20formulation%20for%20cyberattack%20attribution%20process%20in%20cyber%20threat%20intelligence%20using%20apriori%20algorithm.pdf text en http://eprints.utem.edu.my/id/eprint/26021/2/Association%20ruleset%20formulation%20for%20cyberattack%20attribution%20process%20in%20cyber%20threat%20intelligence%20using%20apriori%20algorithm.pdf Abu, Md Sahrom (2021) Association ruleset formulation for cyberattack attribution process in cyber threat intelligence using apriori algorithm. Masters thesis, Universiti Teknikal Malaysia Melaka. https://plh.utem.edu.my/cgi-bin/koha/opac-detail.pl?biblionumber=121151
spellingShingle Q Science (General)
QA Mathematics
Abu, Md Sahrom
Association ruleset formulation for cyberattack attribution process in cyber threat intelligence using apriori algorithm
thesis_level Master
title Association ruleset formulation for cyberattack attribution process in cyber threat intelligence using apriori algorithm
title_full Association ruleset formulation for cyberattack attribution process in cyber threat intelligence using apriori algorithm
title_fullStr Association ruleset formulation for cyberattack attribution process in cyber threat intelligence using apriori algorithm
title_full_unstemmed Association ruleset formulation for cyberattack attribution process in cyber threat intelligence using apriori algorithm
title_short Association ruleset formulation for cyberattack attribution process in cyber threat intelligence using apriori algorithm
title_sort association ruleset formulation for cyberattack attribution process in cyber threat intelligence using apriori algorithm
topic Q Science (General)
QA Mathematics
url http://eprints.utem.edu.my/id/eprint/26021/
https://plh.utem.edu.my/cgi-bin/koha/opac-detail.pl?biblionumber=121151
work_keys_str_mv AT abumdsahrom associationrulesetformulationforcyberattackattributionprocessincyberthreatintelligenceusingapriorialgorithm