Cyber Threat Inference Focused on Threat Class Sequence With Threat Class Sequence System

Cyber threats are becoming increasingly diverse, sophisticated, and intelligent, posing significant challenges in various domains. Among these threats, advanced persistent threat (APT) attacks are particularly concerning because of sustained and intelligent assault tactics. These attacks have a tend...

Full description

Saved in:
Bibliographic Details
Main Authors: Hyoungjun Kim, Jae-Yeol Kim, Kyung-Ho Lee
Format: Article
Language:English
Published: IEEE 2025-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10857319/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832088074143662080
author Hyoungjun Kim
Jae-Yeol Kim
Kyung-Ho Lee
author_facet Hyoungjun Kim
Jae-Yeol Kim
Kyung-Ho Lee
author_sort Hyoungjun Kim
collection DOAJ
description Cyber threats are becoming increasingly diverse, sophisticated, and intelligent, posing significant challenges in various domains. Among these threats, advanced persistent threat (APT) attacks are particularly concerning because of sustained and intelligent assault tactics. These attacks have a tendency to continuously expand the scale of the damage during the attack stage. This study developed novel attack-inference techniques for significantly minimizing cyberattack damage. By proactively identifying potential additional attacks, the impact of APT attacks is mitigated. Cyberattack points are anticipated, and attack types are discerned using the compositional patterns of pretrained threat payloads and the continuous correlations inherent in these attacks. The cyber-threat inference method minimizes damage through early detection and blocking of successive attacks using a threat class sequence system (TCSS). Experiments were conducted using 12,054,842,738,181 extensive real-world security device events collected by more than 420 companies. To assess the efficacy of TCSS in detecting connected attacks, a 39-month threat dataset comprising 27,832,130 instances manually analyzed by real-world security analysts was utilized. The analysis confirmed the necessity of TCSS, revealing it could identify 63.99% of successive attack patterns. Various experimental results demonstrate the superiority of TCSS over comparable methods, achieving an impressive 98.73% post-connection attack detection rate. TCSS outperformed other similar methods in terms of true positive rate by 15.62% to 3.37%. By preemptively blocking persistent cyber threats, TCSS is highly effective in minimizing cyberattack damage. In particular, TCSS shows promising potential for proactive defense of cyberattacks, including APT in security operations center goals.
format Article
id doaj-art-c14410121604480a8a88c62b49812849
institution Kabale University
issn 2169-3536
language English
publishDate 2025-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj-art-c14410121604480a8a88c62b498128492025-02-06T00:00:29ZengIEEEIEEE Access2169-35362025-01-0113216652167710.1109/ACCESS.2025.353601110857319Cyber Threat Inference Focused on Threat Class Sequence With Threat Class Sequence SystemHyoungjun Kim0https://orcid.org/0009-0009-6612-8537Jae-Yeol Kim1https://orcid.org/0009-0007-7363-9621Kyung-Ho Lee2https://orcid.org/0000-0002-5183-5927Graduate School of Information Security, Korea University, Seoul, South KoreaGraduate School of Public Policy and Information Technology, Seoul National University of Science and Technology, Seoul, South KoreaGraduate School of Information Security, Korea University, Seoul, South KoreaCyber threats are becoming increasingly diverse, sophisticated, and intelligent, posing significant challenges in various domains. Among these threats, advanced persistent threat (APT) attacks are particularly concerning because of sustained and intelligent assault tactics. These attacks have a tendency to continuously expand the scale of the damage during the attack stage. This study developed novel attack-inference techniques for significantly minimizing cyberattack damage. By proactively identifying potential additional attacks, the impact of APT attacks is mitigated. Cyberattack points are anticipated, and attack types are discerned using the compositional patterns of pretrained threat payloads and the continuous correlations inherent in these attacks. The cyber-threat inference method minimizes damage through early detection and blocking of successive attacks using a threat class sequence system (TCSS). Experiments were conducted using 12,054,842,738,181 extensive real-world security device events collected by more than 420 companies. To assess the efficacy of TCSS in detecting connected attacks, a 39-month threat dataset comprising 27,832,130 instances manually analyzed by real-world security analysts was utilized. The analysis confirmed the necessity of TCSS, revealing it could identify 63.99% of successive attack patterns. Various experimental results demonstrate the superiority of TCSS over comparable methods, achieving an impressive 98.73% post-connection attack detection rate. TCSS outperformed other similar methods in terms of true positive rate by 15.62% to 3.37%. By preemptively blocking persistent cyber threats, TCSS is highly effective in minimizing cyberattack damage. In particular, TCSS shows promising potential for proactive defense of cyberattacks, including APT in security operations center goals.https://ieeexplore.ieee.org/document/10857319/APTchain-rulecorrelation analysiscyberattackreal threat datasetssecurity operations center
spellingShingle Hyoungjun Kim
Jae-Yeol Kim
Kyung-Ho Lee
Cyber Threat Inference Focused on Threat Class Sequence With Threat Class Sequence System
IEEE Access
APT
chain-rule
correlation analysis
cyberattack
real threat datasets
security operations center
title Cyber Threat Inference Focused on Threat Class Sequence With Threat Class Sequence System
title_full Cyber Threat Inference Focused on Threat Class Sequence With Threat Class Sequence System
title_fullStr Cyber Threat Inference Focused on Threat Class Sequence With Threat Class Sequence System
title_full_unstemmed Cyber Threat Inference Focused on Threat Class Sequence With Threat Class Sequence System
title_short Cyber Threat Inference Focused on Threat Class Sequence With Threat Class Sequence System
title_sort cyber threat inference focused on threat class sequence with threat class sequence system
topic APT
chain-rule
correlation analysis
cyberattack
real threat datasets
security operations center
url https://ieeexplore.ieee.org/document/10857319/
work_keys_str_mv AT hyoungjunkim cyberthreatinferencefocusedonthreatclasssequencewiththreatclasssequencesystem
AT jaeyeolkim cyberthreatinferencefocusedonthreatclasssequencewiththreatclasssequencesystem
AT kyungholee cyberthreatinferencefocusedonthreatclasssequencewiththreatclasssequencesystem