Knowledge Enrichment by Fusing Representations for Malware Threat Intelligence and Behavior

dc.contributor.authorPiplai, Aritran
dc.contributor.authorMittal, Sudip
dc.contributor.authorAbdelsalam, Mahmoud
dc.contributor.authorGupta, Maanak
dc.contributor.authorJoshi, Anupam
dc.contributor.authorFinin, Tim
dc.date.accessioned2020-10-06T15:50:19Z
dc.date.available2020-10-06T15:50:19Z
dc.description2020 IEEE International Conference on Intelligence and Security Informatics (ISI)
dc.description.abstractSecurity engineers and researchers use their disparate knowledge and discretion to identify malware present in a system. Sometimes, they may also use previously extracted knowledge and available Cyber Threat Intelligence (CTI), about known attacks to establish a pattern. To aid in this process, they need knowledge about malware behavior mapped to the available CTI. Such mappings enrich our CKG and also helps in the verification of the information. In this paper, we retrieve malware samples and execute them in a local system. The tracked malware behavior is represented in our Cybersecurity Knowledge Graph (CKG), so that a security professional can reason with behavioral information present in the knowledge graph, draw parallels with that information. We also merge the behavioral information with knowledge extracted from CTI sources like technical reports and blogs about the same malware so that we can significantly improve the reasoning capabilities of our CKG.en_US
dc.description.sponsorshipThis work was supported by National Science Foundation awards 2025685, 2025682, and 2025686, a grant from U.S. Department of Defence, and a gift from IBM Research.en_US
dc.description.urihttps://ieeexplore.ieee.org/document/9280512en_US
dc.format.extent6 pagesen_US
dc.genreconference papers and proceedingsen_US
dc.genrepreprints
dc.identifierdoi:10.13016/m2fhn5-vy1z
dc.identifier.citationAritran Piplai, Sudip Mittal, Mahmoud Abdelsalam, Maanak Gupta, Anupam Joshi, and Tim Finin, Knowledge Enrichment by Fusing Representations for Malware Threat Intelligence and Behavior, 2020 IEEE International Conference on Intelligence and Security Informatics (ISI), 8 December, 2020; https://doi.org/10.1109/ISI49825.2020.9280512en_US
dc.identifier.urihttp://hdl.handle.net/11603/19723
dc.identifier.urihttps://doi.org/10.1109/ISI49825.2020.9280512
dc.language.isoen_USen_US
dc.publisherIEEEen_US
dc.relation.isAvailableAtThe University of Maryland, Baltimore County (UMBC)
dc.relation.ispartofUMBC Computer Science and Electrical Engineering Department Collection
dc.relation.ispartofUMBC Faculty Collection
dc.relation.ispartofUMBC Student Collection
dc.rightsThis item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author.
dc.rights© 2020 IEEE.  Personal use of this material is permitted.  Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
dc.subjectUMBC Ebiquity Research Group
dc.titleKnowledge Enrichment by Fusing Representations for Malware Threat Intelligence and Behavioren_US
dc.typeTexten_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
1034.pdf
Size:
463 KB
Format:
Adobe Portable Document Format
Description:

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
2.56 KB
Format:
Item-specific license agreed upon to submission
Description: