Skip navigation

DSpace

機構典藏 DSpace 系統致力於保存各式數位資料(如:文字、圖片、PDF)並使其易於取用。

點此認識 DSpace
DSpace logo
English
中文
  • 瀏覽論文
    • 校院系所
    • 出版年
    • 作者
    • 標題
    • 關鍵字
    • 指導教授
  • 搜尋 TDR
  • 授權 Q&A
    • 我的頁面
    • 接受 E-mail 通知
    • 編輯個人資料
  1. NTU Theses and Dissertations Repository
  2. 管理學院
  3. 資訊管理學系
請用此 Handle URI 來引用此文件: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/60060
標題: 自動化資安威脅情報萃取與知識本體產製
Automated Extraction of Cyber Threat Intelligence and Its Ontology Generation
作者: Chun-Dai Teng
鄧鈞岱
指導教授: 孫雅麗(Yeali S. Sun)
關鍵字: 惡意程式,依存關聯分析,威脅行為萃取,知識本體,執行序列分析,
Malware,Dependency Parser,Threat Action Extraction,Ontology,Execution Trace Analysis,
出版年 : 2020
學位: 碩士
摘要: 近年來對惡意程式的研究,大多基於一個給定的惡意程式樣本,利用沙箱技術做動態紀錄,分析樣本在系統內的執行的高階函式呼叫序,以瞭解該惡意程式活動的實際作為,然而此方法存在侷限性,例如內容量過大、低階資訊細節過多、分析成本過高、呈現格式不一等…,即使是各家大型資訊安全公司產出的技術報告也面臨同樣問題。
為從高階與宏觀角度,探討惡意程式攻擊的來龍去脈,須充分瞭解惡意程式行為特徵及接觸的系統資源,本研究設計一套自動化威脅情報萃取方法,彙整、分析MITRE ATT CK框架資源中每一個攻擊戰略 (Tactic) 下的攻擊手法 (Technique) 收錄之攻擊事件案例 (Procedure Example) 內容,擷取出一或多個可辨識該攻擊戰略及攻擊手法的惡意行為,並結合哲學領域中用於描述領域知識的本體論 (Ontology),建立用於描述惡意活動攻擊手法與企圖的威脅知識本體 (Threat Ontology)。藉由威脅知識本體,便可針對一惡意程式樣本執行序,比對、整理兩者間互相對應的惡意活動資訊,最後產製具備時間脈絡、具體化、結構化特性之TTP (Tactic, Technique, Procedure) 技術摘要報告,呈現該惡意程式在其生命週期內經歷的重要活動過程。
實驗結果展現了研究流程產製的威脅知識本體,確實能提供低階惡意程式活動具體威脅與高階惡意程式生命週期資訊,並且證明能夠應用於實際惡意程式樣本的惡意行為偵測任務,藉此快速、有效率地提供易於人類解讀的威脅情資,對於資安管理者的情報掌握與傳遞,或是一般人學習資安專業知識皆能有所助益。
In recent years, the researches on malware mostly use sandbox to make dynamic records, and analyze the tracelog to understand the actual activity that malware perform based on a given malicious executable sample. However, this approach has limitations, such as too much content, too detailed information, too high analysis cost (time, manpower), different presentation formats, and so on. Technical reports which are generated by threat intelligence companies even face the same problem.
In order to explore the ins and outs of malware attacks from a high-level and macro perspective, it is necessary to fully understand the behavioral characteristics of malware and the system resources which it contacts. This research designed an automated threat intelligence extraction method to analyze the technical and tactical content proposed in the MITER ATT CK framework. Then, we extract one or more attack event cases (process examples) , and identify the malicious behavior of the attack strategy and method. When the extracted malicious behaviors are combined with the ontology, the threat ontology can be established to describe the attack methods and attempts. With the threat ontology, malicious activities corresponding to the malware's tracelog can be found. Finally, we can procduce the TTP (Tactic, Technique, Procedure) summary report. This report reflects the important process of the malware during its life cycle with som characteristics including time sequential, specific, and structured.
The experiment result shows the threat ontology produced by the research process, which can indeed provide specific information about low-level malware’s activities and high-level malware’s lifecycle. In addition, the threat ontology has been proven to be applicable to malicious behavior detection of actual malware samples. In this way, it is possible to quickly and effectively provide easy-to-understand threat intelligence, which is helpful for security managers to collect and transmit information, and it is also conducive for ordinary people to acquire knowledge of cyber security.
URI: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/60060
DOI: 10.6342/NTU202003257
全文授權: 有償授權
顯示於系所單位:資訊管理學系

文件中的檔案:
檔案 大小格式 
U0001-1308202014501400.pdf
  未授權公開取用
4.8 MBAdobe PDF
顯示文件完整紀錄


系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved