외부 STIX 수집 정보를 이용한 내부자산과 연계한 TTP 대응 전략 자동 매핑 구조에 관한 연구

Vol. 34, No. 6, pp. 1601-1609, 12월. 2024
10.13089/JKIISC.2024.34.6.1601, Full Text:
Keywords: Cyber Threat Intelligence, STIX/TAXII, Response Strategy, Automation
Abstract

This paper proposes an automated system for detecting and managing security threats by incorporating SOAR technology for intelligent cybersecurity. The objective of the study is to analyze external STIX/TAXII-based data to build Cyber Threat Intelligence (CTI), thereby accurately assessing the risk levels of internal assets and establishing effective response strategies. The proposed system consists of four main components: CTI collection and normalization, CTI-based TTP mapping, internal asset CPE identification, and risk assessment and response strategy formulation. The information collection method involves gathering publicly available external threat intelligence and normalizing it for storage in a CTI integrated database. Additionally, a rule-based mapping algorithm is utilized to derive risk levels and response strategies based on key information such as CVE, CPE, CVSS, and TTP. As a result, the automated system proposed in this paper demonstrates the capability to analyze approximately 2,300 reports within one hour and achieve a high detection accuracy of 99.74%.

Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
유현수 and 김환국, "Automatic Mapping Structure of TTP Response Strategies Linked to Internal Assets Using External STIX Collection Information," Journal of The Korea Institute of Information Security and Cryptology, vol. 34, no. 6, pp. 1601-1609, 2024. DOI: 10.13089/JKIISC.2024.34.6.1601.

[ACM Style]
유현수 and 김환국. 2024. Automatic Mapping Structure of TTP Response Strategies Linked to Internal Assets Using External STIX Collection Information. Journal of The Korea Institute of Information Security and Cryptology, 34, 6, (2024), 1601-1609. DOI: 10.13089/JKIISC.2024.34.6.1601.