Authors:
Mario Faiella
1
;
Gustavo Gonzalez-Granadillo
1
;
Ibéria Medeiros
2
;
Rui Azevedo
2
and
Susana Gonzalez-Zarzosa
1
Affiliations:
1
Atos Research & Innovation, Cybersecurity Laboratory and Spain
;
2
LASIGE, Faculty of Sciences, University of Lisboa and Portugal
Keyword(s):
Threat Intelligence Platforms, Open Source Intelligence (OSINT), Data Enrichment, MISP, Threat Score.
Related
Ontology
Subjects/Areas/Topics:
Data and Application Security and Privacy
;
Information and Systems Security
;
Information Assurance
;
Management of Computing Security
;
Risk Assessment
;
Security in Information Systems
;
Security Management
;
Security Metrics and Measurement
Abstract:
One of the weakest points in actual security detection and monitoring systems is the data retrieval from Open Source Intelligence (OSINT), as well as how this kind of information should be processed and normalized, considering their unstructured nature. This cybersecurity related information (e.g., Indicator of Compromise - IoC) is obtained from diverse and different sources and collected by Threat Intelligence Platforms (TIPs). In order to improve its quality, such information should be correlated with real-time data coming from the monitored infrastructure, before being further analyzed and shared. In this way, it could be prioritized, allowing a faster incident detection and response. This paper presents an Enriched Threat Intelligence Platform as a way to extend import, quality assessment processes, and information sharing capabilities in current TIPs. The platform receives structured cyber threat information from multiple sources, and performs the correlation among them with bot
h static and dynamic data coming from the monitored infrastructure. This allows the evaluation of a threat score through heuristic-based analysis, used for enriching the information received from OSINT and other sources. The final result, expressed in a well defined format, is sent to external entities, which is further used for monitoring and detecting incidents (e.g., SIEMs), or for more in-depth analysis, and shared with trusted organizations.
(More)