skip to main content
10.1145/3199478.3199490acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccspConference Proceedingsconference-collections
research-article

Data-Driven Threat Hunting Using Sysmon

Published:16 March 2018Publication History

ABSTRACT

Threat actors can be persistent, motivated and agile, and they leverage a diversified and extensive set of tactics, techniques, and procedures to attain their goals. In response to that, organizations establish threat intelligence programs to improve their defense capabilities and mitigate risk. Actionable threat intelligence is integrated into security information and event management systems (SIEM) forming a threat intelligence platform. A threat intelligence platform aggregates log data from multiple disparate sources by deploying numerous collection agents and provides centralized analysis and reporting of an organization's security events for identifying malicious activity. Sysmon logs is a data source that has received considerable attention for endpoint visibility. Approaches for threat detection using Sysmon have been proposed mainly focusing on search engines (NoSQL database systems). This paper presents a new automated threat assessment system that relies on the analysis of continuous incoming feeds of Sysmon logs. The system is based on a cyber threat intelligence ontology and analyses Sysmon logs to classify software in different threat levels and augment cyber defensive capabilities through situational awareness, prediction, and automated courses of action.

References

  1. Vasileios Mavroeidis and Siri Bromander. Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligence. In Proceedings of the European Intelligence and Security Informatics Conference. IEEE, 2017.Google ScholarGoogle ScholarCross RefCross Ref
  2. Michael Iannacone, Shawn Bohn, Grant Nakamura, John Gerth, Kelly Huffer, Robert Bridges, Erik Ferragut, and John Goodall. Developing an Ontology for Cyber Security Knowledge Graphs. In Proceedings of the 10th Annual Cyber and Information Security Research Conference, page 12. ACM, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Zareen Syed, Ankur Padia, M Lisa Mathews, Tim Finin, and Anupam Joshi. UCO: A Unified Cybersecurity Ontology. In Proceedings of the AAAI Workshop on Artificial Intelligence for Cyber Security. AAAI Press, 2016.Google ScholarGoogle Scholar
  4. Sean Barnum. Unified Cyber Ontology (UCO). https://github.com/ucoProject/uco, 2016.Google ScholarGoogle Scholar
  5. Ju AnWang and Minzhe Guo. OVM: An Ontology for Vulnerability Management. In Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies, page 34. ACM, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Ontology-Based Security Assessment for Software Products, author=Wang, Ju An and Guo, Minzhe and Wang, Hao and Xia, Min and Zhou, Linfeng, booktitle= Proceedings of the 5th AnnualWorkshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies, pages=15, year=2009, organization=ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Leo Obrst, Penny Chase, and Richard Markeloff. Developing an Ontology of the Cyber Security Domain. In STIDS, pages 49--56, 2012.Google ScholarGoogle Scholar
  8. Alessandro Oltramari, Lorrie Faith Cranor, Robert J Walls, and Patrick Drew McDaniel. Building an Ontology of Cyber Security. In STIDS, pages 54--61. Citeseer, 2014.Google ScholarGoogle Scholar
  9. André Grégio, Rodrigo Bonacin, Olga Nabuco, Vitor Monte Afonso, Paulo Lício De Geus, and Mario Jino. Ontology for Malware Behavior: A Core Model Proposal. In WETICE Conference (WETICE), 2014 IEEE 23rd International, pages 453--458. IEEE, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. André Grégio, Rodrigo Bonacin, Antonio Carlos de Marchi, Olga Fernanda Nabuco, and Paulo Lício de Geus. An Ontology of Suspicious Software Behavior. Applied Ontology, 11(1):29--49, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  11. Malek Ben Salem and Chris Wacek. Enabling New Technologies for Cyber Security Defense with the ICAS Cyber Security Ontology. In STIDS, pages 42--49, 2015.Google ScholarGoogle Scholar
  12. Daniel Popescu and Alexandru Citea. Malware OWL. https://pdan93.github.io/ MalwareOWL/scholarly.html, 2016.Google ScholarGoogle Scholar
  13. Marcus Pendleton, Richard Garcia-Lebron, Jin-Hee Cho, and Shouhuai Xu. A Survey on Systems Security Metrics. ACM Computing Surveys (CSUR), 49(4):62, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Chris Johnson, Lee Badger, David Waltermire, Julie Snyder, and Clem Skorupka. Guide to Cyber Threat Information Sharing. NIST Special Publication, 800:150, 2016.Google ScholarGoogle Scholar
  15. David Chismon and Martyn Ruks. Threat Intelligence: Collecting, Analysing, Evaluating, 2015.Google ScholarGoogle Scholar
  16. Clemens Sauerwein, Christian Sillaber, Andrea Mussmann, and Ruth Breu. Threat Intelligence Sharing Platforms: An Exploratory Study of Software Vendors and Research Perspectives. 2017.Google ScholarGoogle Scholar
  17. Elchin Asgarli and Eric Burger. Semantic Ontologies for Cyber Threat Sharing Standards. In Technologies for Homeland Security (HST), 2016 IEEE Symposium on, pages 1--6. IEEE, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  18. D McMorrow. Science of Cyber-Security. Technical report, MITRE CORP MCLEAN VA JASON PROGRAM OFFICE, 2010.Google ScholarGoogle Scholar
  19. AlienVault. Beginner's Guide to Threat Intelligence, 2017.Google ScholarGoogle Scholar
  20. OASIS. Open Command and Control (OpenC2), 2017.Google ScholarGoogle Scholar

Index Terms

  1. Data-Driven Threat Hunting Using Sysmon

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        ICCSP 2018: Proceedings of the 2nd International Conference on Cryptography, Security and Privacy
        March 2018
        187 pages
        ISBN:9781450363617
        DOI:10.1145/3199478

        Copyright © 2018 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 16 March 2018

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader