LOCALINTEL: Generating Organizational Threat Intelligence from Global
and Local Cyber Knowledge
- URL: http://arxiv.org/abs/2401.10036v1
- Date: Thu, 18 Jan 2024 15:00:01 GMT
- Title: LOCALINTEL: Generating Organizational Threat Intelligence from Global
and Local Cyber Knowledge
- Authors: Shaswata Mitra, Subash Neupane, Trisha Chakraborty, Sudip Mittal,
Aritran Piplai, Manas Gaur, Shahram Rahimi
- Abstract summary: Security Operations Center analysts gather threat reports from openly accessible global threat databases and customize them manually to suit a particular organization's needs.
Analysts undertake a labor intensive task utilizing these global and local knowledge databases to manually create organization's unique threat response and mitigation strategies.
We present LOCALINTEL, a novel automated knowledge contextualization system that retrieves threat reports from the global threat repositories and uses its local knowledge database to contextualize them for a specific organization.
- Score: 10.151042468807402
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: Security Operations Center (SoC) analysts gather threat reports from openly
accessible global threat databases and customize them manually to suit a
particular organization's needs. These analysts also depend on internal
repositories, which act as private local knowledge database for an
organization. Credible cyber intelligence, critical operational details, and
relevant organizational information are all stored in these local knowledge
databases. Analysts undertake a labor intensive task utilizing these global and
local knowledge databases to manually create organization's unique threat
response and mitigation strategies. Recently, Large Language Models (LLMs) have
shown the capability to efficiently process large diverse knowledge sources. We
leverage this ability to process global and local knowledge databases to
automate the generation of organization-specific threat intelligence.
In this work, we present LOCALINTEL, a novel automated knowledge
contextualization system that, upon prompting, retrieves threat reports from
the global threat repositories and uses its local knowledge database to
contextualize them for a specific organization. LOCALINTEL comprises of three
key phases: global threat intelligence retrieval, local knowledge retrieval,
and contextualized completion generation. The former retrieves intelligence
from global threat repositories, while the second retrieves pertinent knowledge
from the local knowledge database. Finally, the fusion of these knowledge
sources is orchestrated through a generator to produce a contextualized
completion.
Related papers
- How to Understand Whole Software Repository? [64.19431011897515]
An excellent understanding of the whole repository will be the critical path to Automatic Software Engineering (ASE)
We develop a novel method named RepoUnderstander by guiding agents to comprehensively understand the whole repositories.
To better utilize the repository-level knowledge, we guide the agents to summarize, analyze, and plan.
arXiv Detail & Related papers (2024-06-03T15:20:06Z) - DIVKNOWQA: Assessing the Reasoning Ability of LLMs via Open-Domain
Question Answering over Knowledge Base and Text [73.68051228972024]
Large Language Models (LLMs) have exhibited impressive generation capabilities, but they suffer from hallucinations when relying on their internal knowledge.
Retrieval-augmented LLMs have emerged as a potential solution to ground LLMs in external knowledge.
arXiv Detail & Related papers (2023-10-31T04:37:57Z) - Beyond Factuality: A Comprehensive Evaluation of Large Language Models
as Knowledge Generators [78.63553017938911]
Large language models (LLMs) outperform information retrieval techniques for downstream knowledge-intensive tasks.
However, community concerns abound regarding the factuality and potential implications of using this uncensored knowledge.
We introduce CONNER, designed to evaluate generated knowledge from six important perspectives.
arXiv Detail & Related papers (2023-10-11T08:22:37Z) - ThreatKG: An AI-Powered System for Automated Open-Source Cyber Threat Intelligence Gathering and Management [65.0114141380651]
ThreatKG is an automated system for OSCTI gathering and management.
It efficiently collects a large number of OSCTI reports from multiple sources.
It uses specialized AI-based techniques to extract high-quality knowledge about various threat entities.
arXiv Detail & Related papers (2022-12-20T16:13:59Z) - Recognizing and Extracting Cybersecurtity-relevant Entities from Text [1.7499351967216343]
Cyber Threat Intelligence (CTI) is information describing threat vectors, vulnerabilities, and attacks.
CTI is often used as training data for AI-based cyber defense systems such as Cybersecurity Knowledge Graphs (CKG)
arXiv Detail & Related papers (2022-08-02T18:44:06Z) - Asking for Knowledge: Training RL Agents to Query External Knowledge
Using Language [121.56329458876655]
We introduce two new environments: the grid-world-based Q-BabyAI and the text-based Q-TextWorld.
We propose the "Asking for Knowledge" (AFK) agent, which learns to generate language commands to query for meaningful knowledge.
arXiv Detail & Related papers (2022-05-12T14:20:31Z) - A Deep Learning Approach for Ontology Enrichment from Unstructured Text [2.932750332087746]
Existing information vulnerabilities on attacks, controls, and advisories available on the web provide an opportunity to represent and perform security analytics.
Ontology enrichment algorithms based on natural language processing and ML models have issues with contextual extraction of concepts in words, phrases, and sentences.
Bidirectional LSTMs trained on a large DB dataset and Wikipedia corpus of 2.8 GB along with Universal Sentence is deployed to enrich ISO-based information security.
arXiv Detail & Related papers (2021-12-16T01:32:21Z) - A System for Automated Open-Source Threat Intelligence Gathering and
Management [53.65687495231605]
SecurityKG is a system for automated OSCTI gathering and management.
It uses a combination of AI and NLP techniques to extract high-fidelity knowledge about threat behaviors.
arXiv Detail & Related papers (2021-01-19T18:31:35Z) - Ontology and Cognitive Outcomes [0.0]
The intelligence community (IC) of the United States (US) is a community of organizations that collaborate in collecting and processing intelligence for the US.
The IC relies on human-machine-based analytic strategies that 1) access and integrate vast amounts of information from disparate sources, 2) continuously process this information, so that, 3) a maximally comprehensive understanding of world actors and their behaviors can be developed and updated.
arXiv Detail & Related papers (2020-05-16T19:50:26Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.