论文标题
调查斜切ATT \&CK技术的共发生
Investigating co-occurrences of MITRE ATT\&CK Techniques
论文作者
论文摘要
网络攻击使用对抗技术绕过系统防御,持续存在,并最终违反系统。 MITER ATT \&CK框架分类了一组对手技术和对手之间的地图及其使用的技术和策略。了解对手如何共同部署技术是学习对手行为,狩猎潜在威胁并制定积极主动的辩护的关键。这项研究的目的是通过共同出现在MITER&CK中报道的对抗技术来帮助网络安全从业者和研究人员选择检测和缓解策略。我们从MITER ATT \&CK收集了115个网络犯罪组和484个恶意软件的对抗技术。我们采用关联规则挖掘和网络分析来研究对抗技术如何共发生。我们确定对手对T1059:命令和脚本接口以及T1105:Ingress工具传输技术具有相对较大的ATT \&CK技术。我们还使用T1082:系统信息发现技术来确定对手,以确定其下一步行动。我们观察到对手部署了TA0005:防御逃避和TA0007:发现策略的最多技术。根据我们对共发生的发现,我们确定了六个检测,六个缓解策略和十二个对手行为。我们敦促防御者优先考虑检测TA0007:TA0005的发现和缓解:国防逃避技术。总体而言,这项研究近似于对手如何根据公开报告的文件利用技术。我们提倡组织在其环境中调查对抗技术,并使调查结果可用于更精确,更可行的理解。
Cyberattacks use adversarial techniques to bypass system defenses, persist, and eventually breach systems. The MITRE ATT\&CK framework catalogs a set of adversarial techniques and maps between adversaries and their used techniques and tactics. Understanding how adversaries deploy techniques in conjunction is pivotal for learning adversary behavior, hunting potential threats, and formulating a proactive defense. The goal of this research is to aid cybersecurity practitioners and researchers in choosing detection and mitigation strategies through co-occurrence analysis of adversarial techniques reported in MITRE ATT&CK. We collect the adversarial techniques of 115 cybercrime groups and 484 malware from the MITRE ATT\&CK. We apply association rule mining and network analysis to investigate how adversarial techniques co-occur. We identify that adversaries pair T1059: Command and scripting interface and T1105: Ingress tool transfer techniques with a relatively large number of ATT\&CK techniques. We also identify adversaries using the T1082: System Information Discovery technique to determine their next course of action. We observe adversaries deploy the highest number of techniques from the TA0005: Defense evasion and TA0007: Discovery tactics. Based on our findings on co-occurrence, we identify six detection, six mitigation strategies, and twelve adversary behaviors. We urge defenders to prioritize primarily the detection of TA0007: Discovery and mitigation of TA0005: Defense evasion techniques. Overall, this study approximates how adversaries leverage techniques based on publicly reported documents. We advocate organizations investigate adversarial techniques in their environment and make the findings available for a more precise and actionable understanding.