Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1007/978-3-030-57878-7_14guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Quality Evaluation of Cyber Threat Intelligence Feeds

Published: 19 October 2020 Publication History

Abstract

In order to mount an effective defense, information about likely adversaries, as well as their techniques, tactics and procedures is needed. This so-called cyber threat intelligence helps an organization to better understand its threat profile. Next to this understanding, specialized feeds of indicators about these threats downloaded into a firewall or intrusion detection system allow for a timely reaction to emerging threats.
These feeds however only provide an actual benefit if they are of high quality. In other words, if they provide relevant, complete information in a timely manner. Incorrect and incomplete information may even cause harm, for example if it leads an organization to block legitimate clients or if the information is too unspecific and results in an excessive amount of collateral damage.
In this paper, we evaluate the quality of 17 open source cyber threat intelligence feeds over a period of 14 months, and 7 additional feeds over 7 months. Our analysis shows that the majority of indicators are active for at least 20 days before they are listed. Additionally, we have found that many list have biases towards certain countries. Finally, we also show that blocking listed IP addresses can yield large amounts of collateral damage.

References

[3]
The second annual study on exchanging cyber threat intelligence: there has to be a better way. https://www.ponemon.org/blog/the-second-annual-study-on-exchanging-cyber-threat-intelligence-there-has-to-be-a-better-way
[4]
Abbink, J., Doerr, C.: Popularity-based detection of domain generation algorithms. In: 2nd International Workshop on Malware Analysis (2017)
[5]
EclecticIQ: Intelligence-powered defences. https://www.eclecticiq.com/dss
[6]
Foukarakis, M., Antoniades, D., Antonatos, S., Markato, E.P.: Flexible and high-performance anonymization of NetFlow records using anontool. In: Third International Conference on Security and Privacy in Communications Networks and the Workshops (2007)
[7]
Kührer M, Rossow C, and Holz T Stavrou A, Bos H, and Portokalidis G Paint it black: evaluating the effectiveness of malware blacklists Research in Attacks, Intrusions and Defenses 2014 Cham Springer 1-21
[8]
Oest, A., Safaei, Y., Doupé, A., Ahn, G.J., Wardman, B., Tyers, K.: PhishFarm: a scalable framework for measuring the effectiveness of evasion techniques against browser phishing blacklists. IEEE (2019)
[9]
Ramachandran, A., Feamster, N., Vempala, S.: Filtering spam with behavioral blacklisting. In: Proceedings of the 14th ACM Conference on Computer and communications Security, pp. 342–351. ACM (2007)
[10]
Sheng, S., Wardman, B., Warner, G., Cranor, L.F., Hong, J., Zhang, C.: An empirical analysis of phishing blacklists. In: Sixth Conference on Email and Anti-Spam (CEAS), California, USA (2009)
[11]
Sinha, S., Bailey, M., Jahanian, F.: Shades of grey: on the effectiveness of reputation-based “blacklists”. In: 2008 3rd International Conference on Malicious and Unwanted Software (MALWARE), pp. 57–64. IEEE (2008)
[12]
Tounsi W and Rais H A survey on technical threat intelligence in the age of sophisticated cyber attacks Comput. Secur. 2018 72 212-233
[13]
Xu, J., Fan, J., Ammar, M., Moon, S.B.: On the design and performance of prefix-preserving IP traffic trace anonymization. In: Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement, IMW 2001 (2001)

Cited By

View all
  • (2024)You Might Have Known It Earlier: Analyzing the Role of Underground Forums in Threat IntelligenceProceedings of the 27th International Symposium on Research in Attacks, Intrusions and Defenses10.1145/3678890.3678930(368-383)Online publication date: 30-Sep-2024
  • (2023)Blockchain-Based Cyber Threat Intelligence Sharing Using Proof-of-Quality ConsensusSecurity and Communication Networks10.1155/2023/33031222023Online publication date: 1-Jan-2023
  • (2022)Stepping out of the MUD: Contextual threat information for IoT devices with manufacturer-provided behavior profilesProceedings of the 38th Annual Computer Security Applications Conference10.1145/3564625.3564644(467-480)Online publication date: 5-Dec-2022
  • Show More Cited By

Index Terms

  1. Quality Evaluation of Cyber Threat Intelligence Feeds
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image Guide Proceedings
        Applied Cryptography and Network Security: 18th International Conference, ACNS 2020, Rome, Italy, October 19–22, 2020, Proceedings, Part II
        Oct 2020
        488 pages
        ISBN:978-3-030-57877-0
        DOI:10.1007/978-3-030-57878-7
        • Editors:
        • Mauro Conti,
        • Jianying Zhou,
        • Emiliano Casalicchio,
        • Angelo Spognardi

        Publisher

        Springer-Verlag

        Berlin, Heidelberg

        Publication History

        Published: 19 October 2020

        Author Tags

        1. Cyber threat intelligence
        2. Blocklist

        Qualifiers

        • Article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 04 Oct 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)You Might Have Known It Earlier: Analyzing the Role of Underground Forums in Threat IntelligenceProceedings of the 27th International Symposium on Research in Attacks, Intrusions and Defenses10.1145/3678890.3678930(368-383)Online publication date: 30-Sep-2024
        • (2023)Blockchain-Based Cyber Threat Intelligence Sharing Using Proof-of-Quality ConsensusSecurity and Communication Networks10.1155/2023/33031222023Online publication date: 1-Jan-2023
        • (2022)Stepping out of the MUD: Contextual threat information for IoT devices with manufacturer-provided behavior profilesProceedings of the 38th Annual Computer Security Applications Conference10.1145/3564625.3564644(467-480)Online publication date: 5-Dec-2022
        • (2021)Scan, Test, Execute: Adversarial Tactics in Amplification DDoS AttacksProceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security10.1145/3460120.3484747(940-954)Online publication date: 12-Nov-2021

        View Options

        View options

        Get Access

        Login options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media