Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3465481.3465758acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
research-article
Open access

Linking CVE’s to MITRE ATT&CK Techniques

Published: 17 August 2021 Publication History

Abstract

The MITRE Corporation is a non-profit organization that has made substantial efforts into creating and maintaining knowledge bases relevant to cybersecurity and has been widely adopted by the community. ATT&CK ”Adversarial Tactics, Techniques, and Common Knowledge” is a popular taxonomy by MITRE, which describes threat actor behaviors. Techniques are the foundation of the ATT&CK model, they are the actions that adversaries perform to accomplish goals, which translate into the model’s tactics. The aim of ATT&CK is to categorize adversary behavior to help improve the post-compromise detection of advanced intrusions.
Software vulnerabilities (CVE) play an important role in cyber-intrusions, mostly classified into 4 ATT&CK techniques, which cover the exploitation phase of the attack chain. Identifying vulnerabilities that are actively exploited by the attackers, and understanding how a vulnerability can enable the attacker at each stage of the attack life cycle is absolutely critical for vulnerability assessments. Given the sparse classification of a CVE into ATT&CK taxonomy, lack of methods to extract labels from threat reports and, the volume of vulnerabilities disclosed defenders lack a concrete approach to prioritize CVE’s based on their role in the attack chain and in the context of controls in place.
In this work, we propose a Multi-Head Joint Embedding Neural Network model to automatically map CVE’s to ATT&CK techniques. We address the problem of lack of labels for this task, by a novel unsupervised labeling technique. We enrich CVE’s with a curated knowledgebase 50 mitigation strategies, which help the model to learn both attacker and defender view of a given CVE. We evaluate our approach with the dataset containing CVE’s disclosed from the past 10 years and compare it with standard baseline models and ablation analysis. Using the proposed model, we mapped 62,000 CVE records to 37 different ATT&CK techniques and show that the proposed multi head design performs well in the absence of labels in the training dataset.

References

[1]
[1] Luca Allodi, Fabio Massacci Comparing vulnerability severity and exploits using case-control studies ACM Transaction on Information and System Security (TISSEC) volume 17, 2014.
[2]
[2] M Hutchins, Eric & J Cloppert, Michael & M Amin, Rohan Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains. Leading Issues in Information Warfare & Security Research. 1.
[3]
[3] Z. Junjie, et al. ARROW: GenerAting SignatuRes to Detect DRive-By DOWnloads Proceedings of the 20th International Conference on World Wide Web WWW ’11
[4]
[4] D. Rachna, J.D. Tygar, and M. Hearst Why Phishing Works, SIGCHI Conference on Human Factors in Computing Systems, CHI’06
[5]
[5]Luca Allodi, Shim Woohyun, and Fabio Massacci Quantitative assessment of risk reduction with cybercrime black market monitoring. In In Proc. of IWCC’13.
[6]
[6] He, K.; Zhang, X.; Ren, S.; and Sun, J. 2016. Deep residual learning for image recognition. In CVPR.
[7]
[7] Luca Allodi, Fabio Massacci and Julian Williams The Work-Averse Cyber Attacker Model. Evidence from two million attack signatures. In Published in WEIS 2017. .
[8]
[8] Vaswani, A.; Shazeer, N.; Parmar, N.; Uszkoreit, J.; Jones, L.; Gomez, A. N.; Kaiser, Ł.; and Polosukhin, I. 2017. Attention is all you need. In NIPS.
[9]
[9] Lei Ba, J.; Kiros, J. R.; and Hinton, G. E. 2016. Layer normalization. arXiv preprint arXiv:1607.06450.
[10]
[10]Allodi, L. & Etalle, S. Towards realistic threat modeling: attack commodification, irrelevant vulnerabilities, and unrealistic assumptions. (2017)
[11]
[11]Strom, B., Applebaum, A., Miller, D., Nickels, K., Pennington, A. & Thomas, C. MITRE ATT&CK: Design and Philosophy. Mitre Product Mp. pp. 18–0944 (2018)
[12]
[12] T. Mikolov, I. Sutskever, K. Chen, G. S. Corrado, and J. Dean, “Distributed representations of words and phrases and their compositionality,” in Advances in neural information processing systems, 2013, pp. 3111–3119.
[13]
[13] Ronan Collobert, Jason Weston, Léon Bottou, Michael Karlen, Koray Kavukcuoglu, and Pavel Kuksa. 2011. Natural language processing (almost) from scratch. Journal of Machine Learning Research, 12:2493–2537.
[14]
[14] Quoc V. Le and Tomas Mikolov. 2014. Distributed representations of sentences and documents. In Proceedings of The 31st International Conference on Machine Learning, pages 1188––1196, Beijing, China.
[15]
[15] Yoon Kim. 2014. Convolutional neural networks for sentence classification. In Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing, pages 1746–1751, Doha, Qatar.
[16]
[16] Rie Johnson and Tong Zhang. 2015. Effective use of word order for text categorization with convolutional neural networks. In Proceedings of the 2015 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, pages 103–112, Denver, Colorado.
[17]
[17] Xiang Zhang, Junbo Zhao, and Yann LeCun. 2015. Character-level convolutional networks for text classification. In Advances in Neural Information Processing Systems 28, pages 649–657, Montreal, Canada.
[18]
[18] Duyu Tang, Bing Qin, and Ting Liu. 2015. Document modeling with gated recurrent neural network for sentiment classification. In Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing, pages 1422–1432, Lisbon, Portugal. Association for Computational Linguistics.
[19]
[19] Nikolaos Pappas and Andrei Popescu-Belis. 2017. Multilingual hierarchical attention networks for document classification. In Proceedings of the Eighth International Joint Conference on Natural Language Processing (Volume 1: Long Papers), pages 1015–1025.
[20]
[20] Vivek Srikumar and Christopher D. Manning. 2014. Learning distributed representations for structured output prediction. In Proceedings of the 27th International Conference on Neural Information Processing Systems - Volume 2, NIPS’14, pages 3266–3274, Cambridge, MA, USA. MIT Press.
[21]
[21] Chih-Kuan Yeh, Wei-Chieh Wu, Wei-Jen Ko, and Yu-Chiang Frank Wang. 2018. Learning deep latent spaces for multi-label classification. In In Proceedings of the 32nd AAAI Conference on Artificial Intelligence, New Orleans, USA.
[22]
[22] Isabelle Augenstein, Sebastian Ruder, and Anders Søgaard. 2018. Multi-task learning of pairwise sequence classification tasks over disparate label spaces. In Proceedings of the 2018 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Volume 1 (Long Papers), pages 1896–1906, New Orleans, Louisiana.
[23]
[23] Guoyin Wang, Chunyuan Li, Wenlin Wang, Yizhe Zhang, Dinghan Shen, Xinyuan Zhang, Ricardo Henao, and Lawrence Carin. 2018. Joint embedding of words and labels for text classification. In Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), pages 2321–2331. Association for Computational Linguistics.
[24]
[24] Majid Yazdani and James Henderson. 2015. A model of zero-shot learning of spoken language understanding. In Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing, pages 244–249, Lisbon, Portugal.
[25]
[25]Xiao, L., Huang, X., Chen, B. & Jing, L. Label-Specific Document Representation for Multi-Label Text Classification. (2019)
[26]
[26]Du, C., Chen, Z., Feng, F., Zhu, L., Gan, T. & Nie, L. Explicit interaction model towards text classification. (2019)
[27]
[27] Towards the detection of inconsistencies in public security vulnerability reports, Dong, Ying and Guo, Wenbo and Chen, Yueqi and Xing, Xinyu and Zhang, Yuqing and Wang, Gang, 28th {USENIX} Security Symposium ({USENIX} Security 19), 869–885, 2019
[28]
[28] Understanding the reproducibility of crowd-reported security vulnerabilities Mu, Dongliang and Cuevas, Alejandro and Yang, Limin and Hu, Hang and Xing, Xinyu and Mao, Bing and Wang, Gang, 27th {USENIX} Security Symposium ({USENIX} Security 18), 919–936, 2018
[29]
[29] Pappas, N. & Henderson, J. GILE: A Generalized Input-Label Embedding for Text Classification. Transactions Of The Association For Computational Linguistics. 7 pp. 139–155 (2019)
[30]
[30]Neuhaus, S. & Zimmermann, T. Security trend analysis with cve topic models. (2010)
[31]
[31]Urbanska, M., Ray, I., Howe, A. & Roberts, M. Structuring a vulnerability description for comprehensive single system security analysis. Rocky Mountain Celebration Of Women In Computing, Fort Collins, Co, Usa. (2012)
[32]
[32] Riskwriter: Predicting cyber risk of an enterprise Aditya, K and Grzonkowski, Slawomir and Le-Khac, Nhien-An International Conference on Information Systems Security 88–106, 2018,Springer
[33]
[33] Black box attacks on deep anomaly detectors Kuppa, Aditya and Grzonkowski, Slawomir and Asghar, Muhammad Rizwan and Le-Khac, Nhien-An Proceedings of the 14th International Conference on Availability, Reliability and Security, 1–10, 2019
[34]
[34] Black Box Attacks on Explainable Artificial Intelligence (XAI) methods in Cyber Security Kuppa, Aditya and Le-Khac, Nhien-An, International Joint Conference on Neural Networks (IJCNN) 2020
[35]
[35] Effect of Security Controls on Patching Window: A Causal Inference based Approach Kuppa, Aditya and Aouad, Lamine and Le-Khac, Nhien-An Annual Computer Security Applications Conference 556–566 2020
[36]
[36]Gretton, A., Borgwardt, K., Rasch, M., Sch”olkopf, B. & Smola, A. A kernel two-sample test. Jmlr. (2012)
[37]
[37]Friedman, J., Hastie, T. & Tibshirani, R. The elements of statistical learning. (Springer,2001)
[38]
[38]Tavabi, N., Goyal, P., Almukaynizi, M., Shakarian, P. & Lerman, K. Darkembed: Exploit prediction with neural language models. (2018)
[39]
[39]Khazaei, A., Ghasemzadeh, M. & Derhami, V. An automatic method for CVSS score prediction using vulnerabilities description. Journal Of Intelligent & Fuzzy Systems. 30, 89–96 (2016)
[40]
[40]Williams, M., Dey, S., Barranco, R., Naim, S., Hossain, M. & Akbar, M. Analyzing Evolving Trends of Vulnerabilities in National Vulnerability Database. (2018)
[41]
[41]Murtaza, S., Khreich, W., Hamou-lhadj, A. & Bener, A. Mining trends and patterns of software vulnerabilities. Journal Of Systems And Software. 117 pp. 218–228 (2016)
[42]
[42]Bullough, B., Yanchenko, A., Smith, C. & Zipkin, J. Predicting exploitation of disclosed software vulnerabilities using open-source data. (2017)
[43]
[43]Almukaynizi, M., Nunes, E., Dharaiya, K., Senguttuvan, M., Shakarian, J. & Shakarian, P. Patch Before Exploited: An Approach to Identify Targeted Software Vulnerabilities. (Springer,2019)
[44]
[44]Bozorgi, M., Saul, L., Savage, S. & Voelker, G. Beyond heuristics: learning to classify vulnerabilities and predict exploits. (2010)
[45]
[45]Spanos, G. & Angelis, L. A multi-target approach to estimate software vulnerability characteristics and severity scores. Journal Of Systems And Software. 146 pp. 152–166 (2018)
[46]
[46]Luong, M., Sutskever, I., Le, Q., Vinyals, O. & Zaremba, W. Addressing the rare word problem in neural machine translation. Arxiv Preprint Arxiv:1410.8206. (2014)
[47]
[47]Huang, C., Yen, H., Yang, P., Huang, S. & Chang, J. Using sublexical translations to handle the OOV problem in machine translation. Acm Transactions On Asian Language Information Processing (talip). 10, 16 (2011)
[48]
[48]Liu, A. & Kirchhoff, K. Context models for oov word translation in low-resource languages. Arxiv Preprint Arxiv:1801.08660. (2018)

Cited By

View all
  • (2024)Predicting and Visualizing Lateral Movements Based on ATT&CK and Quantification Theory Type 3Journal of Cases on Information Technology10.4018/JCIT.34072226:1(1-14)Online publication date: 20-Mar-2024
  • (2024)Integrating Wazuh for Efficient Real-Time Threat Monitoring and Vulnerability Assessment in a SOC EnvironmentUtilizing Renewable Energy, Technology, and Education for Industry 5.010.4018/979-8-3693-2814-9.ch013(292-320)Online publication date: 21-Jun-2024
  • (2024)SMET: Semantic mapping of CTI reports and CVE to ATT&CK for advanced threat intelligenceJournal of Computer Security10.3233/JCS-230218(1-20)Online publication date: 28-Jun-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ARES '21: Proceedings of the 16th International Conference on Availability, Reliability and Security
August 2021
1447 pages
ISBN:9781450390514
DOI:10.1145/3465481
This work is licensed under a Creative Commons Attribution International 4.0 License.

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 17 August 2021

Check for updates

Author Tags

  1. ATT&CK
  2. Attack Models
  3. CVE
  4. Deep Learning
  5. unsupervised labeling

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ARES 2021

Acceptance Rates

Overall Acceptance Rate 228 of 451 submissions, 51%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3,523
  • Downloads (Last 6 weeks)363
Reflects downloads up to 13 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Predicting and Visualizing Lateral Movements Based on ATT&CK and Quantification Theory Type 3Journal of Cases on Information Technology10.4018/JCIT.34072226:1(1-14)Online publication date: 20-Mar-2024
  • (2024)Integrating Wazuh for Efficient Real-Time Threat Monitoring and Vulnerability Assessment in a SOC EnvironmentUtilizing Renewable Energy, Technology, and Education for Industry 5.010.4018/979-8-3693-2814-9.ch013(292-320)Online publication date: 21-Jun-2024
  • (2024)SMET: Semantic mapping of CTI reports and CVE to ATT&CK for advanced threat intelligenceJournal of Computer Security10.3233/JCS-230218(1-20)Online publication date: 28-Jun-2024
  • (2024)MITRE ATT&CK: State of the Art and Way ForwardACM Computing Surveys10.1145/368730057:1(1-37)Online publication date: 7-Oct-2024
  • (2024)Vulnerability Detection for software-intensive systemProceedings of the 28th International Conference on Evaluation and Assessment in Software Engineering10.1145/3661167.3661170(510-515)Online publication date: 18-Jun-2024
  • (2024)Improving Automated Labeling for ATT&CK Tactics in Malware Threat ReportsDigital Threats: Research and Practice10.1145/35945535:1(1-16)Online publication date: 21-Mar-2024
  • (2024)Cybersecurity Defenses: Exploration of CVE Types Through Attack Descriptions2024 50th Euromicro Conference on Software Engineering and Advanced Applications (SEAA)10.1109/SEAA64295.2024.00069(415-418)Online publication date: 28-Aug-2024
  • (2024)Modeling for Identifying Attack Techniques Based on Semantic Vulnerability Analysis2024 IEEE 12th International Conference on Information, Communication and Networks (ICICN)10.1109/ICICN62625.2024.10761895(211-216)Online publication date: 21-Aug-2024
  • (2024)Mapping ICS Vulnerabilities: Prioritization and Risk Propagation Analysis with MITRE ATT&CK Framework and Bayesian Belief Networks2024 IEEE 29th International Conference on Emerging Technologies and Factory Automation (ETFA)10.1109/ETFA61755.2024.10710893(1-8)Online publication date: 10-Sep-2024
  • (2024)Improving ML-based Solutions for Linking of CVE to MITRE ATT &CK Techniques2024 IEEE 48th Annual Computers, Software, and Applications Conference (COMPSAC)10.1109/COMPSAC61105.2024.00392(2442-2447)Online publication date: 2-Jul-2024
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media