Knowledge Enrichment by Fusing Representations for Malware Threat Intelligence and Behavior
dc.contributor.author | Piplai, Aritran | |
dc.contributor.author | Mittal, Sudip | |
dc.contributor.author | Abdelsalam, Mahmoud | |
dc.contributor.author | Gupta, Maanak | |
dc.contributor.author | Joshi, Anupam | |
dc.contributor.author | Finin, Tim | |
dc.date.accessioned | 2020-10-06T15:50:19Z | |
dc.date.available | 2020-10-06T15:50:19Z | |
dc.description | 2020 IEEE International Conference on Intelligence and Security Informatics (ISI) | |
dc.description.abstract | Security engineers and researchers use their disparate knowledge and discretion to identify malware present in a system. Sometimes, they may also use previously extracted knowledge and available Cyber Threat Intelligence (CTI), about known attacks to establish a pattern. To aid in this process, they need knowledge about malware behavior mapped to the available CTI. Such mappings enrich our CKG and also helps in the verification of the information. In this paper, we retrieve malware samples and execute them in a local system. The tracked malware behavior is represented in our Cybersecurity Knowledge Graph (CKG), so that a security professional can reason with behavioral information present in the knowledge graph, draw parallels with that information. We also merge the behavioral information with knowledge extracted from CTI sources like technical reports and blogs about the same malware so that we can significantly improve the reasoning capabilities of our CKG. | en_US |
dc.description.sponsorship | This work was supported by National Science Foundation awards 2025685, 2025682, and 2025686, a grant from U.S. Department of Defence, and a gift from IBM Research. | en_US |
dc.description.uri | https://ieeexplore.ieee.org/document/9280512 | en_US |
dc.format.extent | 6 pages | en_US |
dc.genre | conference papers and proceedings | en_US |
dc.genre | preprints | |
dc.identifier | doi:10.13016/m2fhn5-vy1z | |
dc.identifier.citation | Aritran Piplai, Sudip Mittal, Mahmoud Abdelsalam, Maanak Gupta, Anupam Joshi, and Tim Finin, Knowledge Enrichment by Fusing Representations for Malware Threat Intelligence and Behavior, 2020 IEEE International Conference on Intelligence and Security Informatics (ISI), 8 December, 2020; https://doi.org/10.1109/ISI49825.2020.9280512 | en_US |
dc.identifier.uri | http://hdl.handle.net/11603/19723 | |
dc.identifier.uri | https://doi.org/10.1109/ISI49825.2020.9280512 | |
dc.language.iso | en_US | en_US |
dc.publisher | IEEE | en_US |
dc.relation.isAvailableAt | The University of Maryland, Baltimore County (UMBC) | |
dc.relation.ispartof | UMBC Computer Science and Electrical Engineering Department Collection | |
dc.relation.ispartof | UMBC Faculty Collection | |
dc.relation.ispartof | UMBC Student Collection | |
dc.rights | This item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author. | |
dc.rights | © 2020 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. | |
dc.subject | UMBC Ebiquity Research Group | |
dc.title | Knowledge Enrichment by Fusing Representations for Malware Threat Intelligence and Behavior | en_US |
dc.type | Text | en_US |