Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3460120.3485353acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
poster

An Ontology-driven Knowledge Graph for Android Malware

Published: 13 November 2021 Publication History
  • Get Citation Alerts
  • Abstract

    We present MalONT2.0 -- an ontology for malware threat intelligence [4]. New classes (attack patterns, infrastructural resources to enable attacks, malware analysis to incorporate static analysis, and dynamic analysis of binaries) and relations have been added following a broadened scope of core competency questions. MalONT2.0 allows researchers to extensively capture all requisite classes and relations that gather semantic and syntactic characteristics of an android malware attack. This ontology forms the basis for the malware threat intelligence knowledge graph, MalKG, which we exemplify using three different, non-overlapping demonstrations. Malware features have been extracted from openCTI reports on android threat intelligence shared on the Internet and written in the form of unstructured text. Some of these sources are blogs, threat intelligence reports, tweets, and news articles. The smallest unit of information that captures malware features is written as triples comprising head and tail entities, each connected with a relation. In the poster and demonstration, we discuss MalONT2.0 and MalKG.

    Supplementary Material

    We present an ontology for malware threat intelligence that defines new classes and is interoperable with the STIXX2.1 framework. Known an MalONT2.0, the main highlight of the ontology is that it defines classes that, when instantiated over a corpus of threat intelligence, called openCTI, can capture key phrases describing the steps and phases of a malware attack. Specifically, it captures details about an attack, infrastructural resources to enable attacks, malware analysis to incorporate static analysis, and dynamic analysis of binaries. It also defines relationships between the instances of the class (called entities). The ontology allows researchers to extensively capture all requisite classes and relations that gather semantic and syntactic characteristics of an android malware attack. This ontology forms the basis for the malware threat intelligence knowledge graph MalKG, which we exemplify using 3 different, non-overlapping demonstrations. (ACM-CCS2021.pptx)

    References

    [1]
    Julie Connolly, Mark Davidson, and Charles Schmidt. 2014. The trusted automated exchange of indicator information (taxii). The MITRE Corporation (2014), 1--20.
    [2]
    Jay Pujara, Hui Miao, Lise Getoor, and William Cohen. 2013. Knowledge graph identification. In International Semantic Web Conference. Springer, 542--557.
    [3]
    James Pustejovsky and Amber Stubbs. 2013. Natural Language Annotation for Machine Learning. OReilly Media.
    [4]
    Nidhi Rastogi, Sharmishtha Dutta, Mohammed J Zaki, Alex Gittens, and Charu Aggarwal. 2020. MalONT: An ontology for malware threat intelligence. In International Workshop on Deployable Machine Learning for Security Defense. Springer, 28--44.
    [5]
    Morton Swimmer. 2008. Towards an ontology of malware classes. Online] January 27 (2008).
    [6]
    Zareen Syed, Ankur Padia, Tim Finin, Lisa Mathews, and Anupam Joshi. 2016. UCO: A unified cybersecurity ontology. In Workshops at the Thirtieth AAAI Conference on Artificial Intelligence.

    Cited By

    View all
    • (2023)An APT Event Extraction Method Based on BERT-BiGRU-CRF for APT Attack DetectionElectronics10.3390/electronics1215334912:15(3349)Online publication date: 4-Aug-2023
    • (2023)Event-Based Threat Intelligence Ontology ModelScience of Cyber Security10.1007/978-3-031-45933-7_16(261-282)Online publication date: 21-Nov-2023
    • (2022)TINKER: A framework for Open source Cyberthreat Intelligence2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)10.1109/TrustCom56396.2022.00225(1569-1574)Online publication date: Dec-2022

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security
    November 2021
    3558 pages
    ISBN:9781450384544
    DOI:10.1145/3460120
    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 13 November 2021

    Check for updates

    Author Tags

    1. inference
    2. knowledge graphs
    3. malware
    4. ontology

    Qualifiers

    • Poster

    Funding Sources

    • BM AI Research Collaboration(AIRC)

    Conference

    CCS '21
    Sponsor:
    CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security
    November 15 - 19, 2021
    Virtual Event, Republic of Korea

    Acceptance Rates

    Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

    Upcoming Conference

    CCS '24
    ACM SIGSAC Conference on Computer and Communications Security
    October 14 - 18, 2024
    Salt Lake City , UT , USA

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)130
    • Downloads (Last 6 weeks)14

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)An APT Event Extraction Method Based on BERT-BiGRU-CRF for APT Attack DetectionElectronics10.3390/electronics1215334912:15(3349)Online publication date: 4-Aug-2023
    • (2023)Event-Based Threat Intelligence Ontology ModelScience of Cyber Security10.1007/978-3-031-45933-7_16(261-282)Online publication date: 21-Nov-2023
    • (2022)TINKER: A framework for Open source Cyberthreat Intelligence2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)10.1109/TrustCom56396.2022.00225(1569-1574)Online publication date: Dec-2022

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media