TY - GEN
T1 - Designing Comprehensive Cyber Threat Analysis Platform
T2 - 2021 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, PerCom Workshops 2021
AU - Takahashi, Takeshi
AU - Umemura, Yuki
AU - Han, Chansu
AU - Ban, Tao
AU - Furumoto, Keisuke
AU - Nakamura, Ohnori
AU - Yoshioka, Katsunari
AU - Takeuchi, Junichi
AU - Murata, Noboru
AU - Shiraishi, Yoshiaki
N1 - Funding Information:
ACKNOWLEDGMENTS This research was conducted under a contract of ”Research and development on IoT malware removal / make it nonfunctional technologies for effective use of the radio spectrum” among ”Research and Development for Expansion of Radio Wave Resources(JPJ000254)”, which was supported by the Ministry of Internal Affairs and Communications, Japan.
Publisher Copyright:
© 2021 IEEE.
PY - 2021/3/22
Y1 - 2021/3/22
N2 - To cope with growing cyber threats on the Internet, various techniques have been proposed and implemented. Each of these techniques automates specific tasks of cybersecurity operations, and operators in the field locate and choose multiple tools and conduct security operations by subsequently using the tools and combining their outputs. Recent studies have been introducing many automation techniques for specific security tasks, but their combined use has not been thoroughly studied until now. To advance security automation further, a series of cybersecurity operation tasks needs to be automated by orchestrating different techniques. In this paper, we propose the cyber threat hybrid analysis platform, which orchestrates multiple automation techniques to expand their applicable scope. We also demonstrate the platform's usability and feasibility by describing a case study with a real malware sample.
AB - To cope with growing cyber threats on the Internet, various techniques have been proposed and implemented. Each of these techniques automates specific tasks of cybersecurity operations, and operators in the field locate and choose multiple tools and conduct security operations by subsequently using the tools and combining their outputs. Recent studies have been introducing many automation techniques for specific security tasks, but their combined use has not been thoroughly studied until now. To advance security automation further, a series of cybersecurity operation tasks needs to be automated by orchestrating different techniques. In this paper, we propose the cyber threat hybrid analysis platform, which orchestrates multiple automation techniques to expand their applicable scope. We also demonstrate the platform's usability and feasibility by describing a case study with a real malware sample.
KW - Malware analysis
KW - cybersecurity
KW - honeypot
KW - machine learning
KW - threat intelligence
UR - http://www.scopus.com/inward/record.url?scp=85107608611&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85107608611&partnerID=8YFLogxK
U2 - 10.1109/PerComWorkshops51409.2021.9431125
DO - 10.1109/PerComWorkshops51409.2021.9431125
M3 - Conference contribution
AN - SCOPUS:85107608611
T3 - 2021 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, PerCom Workshops 2021
SP - 376
EP - 379
BT - 2021 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, PerCom Workshops 2021
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 22 March 2021 through 26 March 2021
ER -