论文标题
学习MITER ATT&CK对抗技术的关联
Learning the Associations of MITRE ATT&CK Adversarial Techniques
论文作者
论文摘要
MITER ATT&CK框架提供了一个丰富且可操作的对抗策略,技术和程序(TTP)的存储库。但是,如果我们能够可靠地构建技术关联,这些信息将对攻击诊断(即取证)和缓解措施(即入侵响应)非常有用。在本文中,我们介绍了Miter ATT&CK报告的APT和软件攻击数据的统计机器学习分析,以推断代表可用于技术预测的重要相关性的技术群集。由于技术之间复杂的多维关系,许多传统的聚类方法无法获得可用的关联。我们的方法使用分层聚类以95%的置信度推断攻击技术关联,提供了具有统计学意义和可解释的技术相关性。我们的分析发现了98个不同的技术关联(即群集),用于APT和软件攻击。我们的评估结果表明,我们算法相关的78%的技术表现出明显的共同信息,表明可预测性相当高。
The MITRE ATT&CK Framework provides a rich and actionable repository of adversarial tactics, techniques, and procedures (TTP). However, this information would be highly useful for attack diagnosis (i.e., forensics) and mitigation (i.e., intrusion response) if we can reliably construct technique associations that will enable predicting unobserved attack techniques based on observed ones. In this paper, we present our statistical machine learning analysis on APT and Software attack data reported by MITRE ATT&CK to infer the technique clustering that represents the significant correlation that can be used for technique prediction. Due to the complex multidimensional relationships between techniques, many of the traditional clustering methods could not obtain usable associations. Our approach, using hierarchical clustering for inferring attack technique associations with 95% confidence, provides statistically significant and explainable technique correlations. Our analysis discovers 98 different technique associations (i.e., clusters) for both APT and Software attacks. Our evaluation results show that 78% of the techniques associated by our algorithm exhibit significant mutual information that indicates reasonably high predictability.