An Overview of Cybersecurity Knowledge Graphs Mapped to the MITRE ATT&CK Framework Domains

dc.contributor.authorBolton, Joshua
dc.contributor.authorElluri, Lavanya
dc.contributor.authorJoshi, Karuna
dc.date.accessioned2023-08-30T19:15:09Z
dc.date.available2023-08-30T19:15:09Z
dc.date.issued2023-11-01
dc.descriptionIEEE International conference on Intelligence and Security Informatics (ISI 2023); Charlotte, North Carolina, USA; October 2 – 3, 2023en_US
dc.description.abstractA large volume of cybersecurity-related data sets are generated daily from systems following disparate protocols and standards. It is humanly impossible for cybersecurity experts to manually sieve through these large data sets, with different schema and metadata, to determine potential attacks or issues. A myriad of applications and tool sets are offered to automate the analysis of large cyber data sets. Semantic Web’s community has been studying the field of cybersecurity for over a decade and produced numerous knowledge graphs and frameworks. The Unified Cybersecurity Ontology (UCO) connected many of the leading knowledge representation frameworks, providing a holistic mapping of cyber data, beginning in 2016. MITRE ATT&CK is used by a wide variety of practitioners to understand how their current data and tooling prepare them to defend against both Advanced Persistent Threats (APTs) and less formal threat actors. The UCO and MITRE ATT&CK have provided researchers and practitioners, respectively, with tools to standardize data collection, correlation, and analysis. However, it is not apparent how current knowledge graphs and their applications in the cybersecurity domain utilize ATT&CK. In this paper, we present the results of our study on whether current cybersecurity knowledge graphs have mapped the main MITRE ATT&CK matrices.en_US
dc.description.sponsorshipThis research was partially supported by the NSF award 1747724, Phase I IUCRC UMBC: Center for Accelerated Real time Analytics (CARTA). The authors would like to thank Jessica Bolton for expertise in professional writing for this manuscript.en_US
dc.description.urihttps://ieeexplore.ieee.org/document/10297134en_US
dc.format.extent6 pagesen_US
dc.genreconference papers and proceedingsen_US
dc.genrepreprintsen_US
dc.identifierdoi:10.13016/m2duhr-dvve
dc.identifier.citationBolton, Joshua, Lavanya Elluri, and Karuna Pande Joshi. “An Overview of Cybersecurity Knowledge Graphs Mapped to the MITRE ATT&CK Framework Domains.” In 2023 IEEE International Conference on Intelligence and Security Informatics (ISI), 01–06, 2023. https://doi.org/10.1109/ISI58743.2023.10297134.
dc.identifier.urihttps://doi.org/10.1109/ISI58743.2023.10297134
dc.language.isoen_USen_US
dc.publisherIEEE
dc.relation.isAvailableAtThe University of Maryland, Baltimore County (UMBC)
dc.relation.ispartofUMBC Information Systems Department Collection
dc.relation.ispartofUMBC Faculty Collection
dc.relation.ispartofUMBC Student Collection
dc.relation.ispartofUMBC Center for Accelerated Real Time Analysis
dc.rights© 2023 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.en_US
dc.subjectUMBC Ebiquity Research Groupen_US
dc.titleAn Overview of Cybersecurity Knowledge Graphs Mapped to the MITRE ATT&CK Framework Domainsen_US
dc.typeTexten_US
dcterms.creatorhttps://orcid.org/0000-0002-6354-1686en_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
1210.pdf
Size:
216.63 KB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
2.56 KB
Format:
Item-specific license agreed upon to submission
Description: