Skip to main content
Top
Published in: The Journal of Supercomputing 4/2023

23-09-2022

Architecting threat hunting system based on the DODAF framework

Authors: Ali Aghamohammadpour, Ebrahim Mahdipour, Iman Attarzadeh

Published in: The Journal of Supercomputing | Issue 4/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The importance of large data analytic systems for cyber security is expanding. Thus, collecting systematically, thoroughly assessing, and synthesizing the literature on architectural techniques for developing such systems is critical. There is a general lack of an overview of architectural techniques for developing threat intelligence systems. Threat hunting is an analyst-centric process that helps organizations discover hidden advanced threats that miss by automatic preventative and investigative systems. The Department of Defense Architecture Framework (DODAF) establishes a modeling framework for capturing high-level system design and operational requirements. This paper presents different threat hunting system viewpoints using the DODAF attribute-based method. The proposed architecture enriches by state-of-the-art MITRE’s ATT&CK and D3FEND frameworks. Also, we proposed a unique approach to infer malicious threats category associations by comparing suspicious and malicious events' similarities. Using ATT&CK’s rich techniques made the similarity between malicious and suspicious files more accurate. Finally, we used a survey questionnaire approach to collect relational data to assess the impact of qualitative attributes on the development of threat hunting processes. We evaluated the proposed hunting architecture using twelve essential quality attributes indirectly. We believe that the proposed method can reduce the architectural shortcomings in threat hunting systems development.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Cole E (2016) Threat hunting: open season on the adversary. SANS Institute Information Reading Room Cole E (2016) Threat hunting: open season on the adversary. SANS Institute Information Reading Room
4.
go back to reference Vance A (2016) Securing enterprise architecture with DoD architectural framework (DoDAF). In: Presented at the International Conference on Cyber Conflict (CyCon) Vance A (2016) Securing enterprise architecture with DoD architectural framework (DoDAF). In: Presented at the International Conference on Cyber Conflict (CyCon)
5.
go back to reference Ring SJ, Nicholson D, Thilenius J, Harris S (2007) Activity-based methodology for development and analysis of integrated DoD architecture. In: Handbook of enterprise systems architecture in practice: IGI Global, pp 85–113 Ring SJ, Nicholson D, Thilenius J, Harris S (2007) Activity-based methodology for development and analysis of integrated DoD architecture. In: Handbook of enterprise systems architecture in practice: IGI Global, pp 85–113
6.
go back to reference Brown S, Carlin S, Torres-Negron I (2017) Next-generation defensive cyber operations (DCO) platform. J Inform Warfare 16(2):43–55 Brown S, Carlin S, Torres-Negron I (2017) Next-generation defensive cyber operations (DCO) platform. J Inform Warfare 16(2):43–55
7.
go back to reference Meland PH, Nesheim DA, Bernsmed K, Sindre G (2022) Assessing cyber threats for storyless systems. J Inform Secur Appl 64:103050 Meland PH, Nesheim DA, Bernsmed K, Sindre G (2022) Assessing cyber threats for storyless systems. J Inform Secur Appl 64:103050
8.
go back to reference Gao P et al (2021) Enabling efficient cyber threat hunting with cyber threat intelligence. In: 2021 IEEE 37th International Conference on Data Engineering (ICDE), IEEE, pp 193–204CrossRef Gao P et al (2021) Enabling efficient cyber threat hunting with cyber threat intelligence. In: 2021 IEEE 37th International Conference on Data Engineering (ICDE), IEEE, pp 193–204CrossRef
9.
go back to reference Shlapentokh-Rothman M (2020) Unifying public threat knowledge for cyber hunting. Massachusetts Institute of Technology Shlapentokh-Rothman M (2020) Unifying public threat knowledge for cyber hunting. Massachusetts Institute of Technology
10.
go back to reference Milajerdi SM, Eshete B, Gjomemo R, Venkatakrishnan V (2019) Poirot: aligning attack behavior with kernel audit records for cyber threat hunting. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp 1795–1812 Milajerdi SM, Eshete B, Gjomemo R, Venkatakrishnan V (2019) Poirot: aligning attack behavior with kernel audit records for cyber threat hunting. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp 1795–1812
11.
go back to reference Silva A, Gondim J, Albuquerque R, Villalba L (2020) A methodology to evaluate standards and platforms within cyber threat intelligence. Future Internet 12(6):108CrossRef Silva A, Gondim J, Albuquerque R, Villalba L (2020) A methodology to evaluate standards and platforms within cyber threat intelligence. Future Internet 12(6):108CrossRef
13.
go back to reference Ullah F, Babar MA (2019) Architectural tactics for big data cybersecurity analytics systems: a review. J Syst Softw 151:81–118CrossRef Ullah F, Babar MA (2019) Architectural tactics for big data cybersecurity analytics systems: a review. J Syst Softw 151:81–118CrossRef
14.
go back to reference Saaty TL (1994) Fundamentals of decision making and priority theory with the analytic hierarchy process. RWS publications Saaty TL (1994) Fundamentals of decision making and priority theory with the analytic hierarchy process. RWS publications
15.
go back to reference Strom BE, Applebaum A, Miller DP, Nickels KC, Pennington AG, Thomas CB (2018) Mitre attack: design and philosophy. Technical report Strom BE, Applebaum A, Miller DP, Nickels KC, Pennington AG, Thomas CB (2018) Mitre attack: design and philosophy. Technical report
16.
go back to reference Kaloroumakis PE, Smith MJ (2021) Toward a knowledge graph of cybersecurity countermeasures. The MITRE Corporation Kaloroumakis PE, Smith MJ (2021) Toward a knowledge graph of cybersecurity countermeasures. The MITRE Corporation
17.
go back to reference Shu X, Coccoli P (2021) Kestrel threat hunting language Shu X, Coccoli P (2021) Kestrel threat hunting language
18.
go back to reference Xiong W, Legrand E, Åberg O, Lagerström R (2021) Cyber security threat modeling based on the MITRE enterprise ATT&CK matrix. Softw Syst Model, pp 1–21 Xiong W, Legrand E, Åberg O, Lagerström R (2021) Cyber security threat modeling based on the MITRE enterprise ATT&CK matrix. Softw Syst Model, pp 1–21
19.
go back to reference Guide to cyber threat modelling (2020) Cybersecurity Agency of Singapore Guide to cyber threat modelling (2020) Cybersecurity Agency of Singapore
20.
go back to reference Mavroeidis V, Jøsang A (2018) Data-driven threat hunting using sysmon. In: Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, pp 82–88 Mavroeidis V, Jøsang A (2018) Data-driven threat hunting using sysmon. In: Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, pp 82–88
21.
go back to reference Muckin M, Fitch SC (2019) A threat-driven approach to cyber security. Lockheed Martin Corporation Muckin M, Fitch SC (2019) A threat-driven approach to cyber security. Lockheed Martin Corporation
23.
go back to reference Wafula K, Wang Y (2019) CARVE: a scientific method-based threat hunting hypothesis development model. In: 2019 IEEE International Conference on Electro Information Technology (EIT), IEEE,pp 1–6 Wafula K, Wang Y (2019) CARVE: a scientific method-based threat hunting hypothesis development model. In: 2019 IEEE International Conference on Electro Information Technology (EIT), IEEE,pp 1–6
25.
go back to reference Konev A, Shelupanov A, Kataev M, Ageeva V, Nabieva A (2022) A survey on threat-modeling techniques: protected objects and classification of threats. Symmetry 14(3):549CrossRef Konev A, Shelupanov A, Kataev M, Ageeva V, Nabieva A (2022) A survey on threat-modeling techniques: protected objects and classification of threats. Symmetry 14(3):549CrossRef
26.
go back to reference Lee J, Moon D, Kim I, Lee Y (2019) A semantic approach to improving machine readability of a large-scale attack graph. J Supercomput 75(6):3028–3045CrossRef Lee J, Moon D, Kim I, Lee Y (2019) A semantic approach to improving machine readability of a large-scale attack graph. J Supercomput 75(6):3028–3045CrossRef
27.
go back to reference Al-Shaer R, Spring JM, Christou E (2020) Learning the associations of mitre att&ck adversarial techniques. In: 2020 IEEE Conference on Communications and Network Security (CNS), IEEE, pp 1–9 Al-Shaer R, Spring JM, Christou E (2020) Learning the associations of mitre att&ck adversarial techniques. In: 2020 IEEE Conference on Communications and Network Security (CNS), IEEE, pp 1–9
28.
go back to reference Shin Y, Kim K, Lee JJ, Lee K (2021) ART: automated reclassification for threat actors based on ATT&CK matrix similarity. In: 2021 world automation congress (WAC), IEEE, pp 15–20CrossRef Shin Y, Kim K, Lee JJ, Lee K (2021) ART: automated reclassification for threat actors based on ATT&CK matrix similarity. In: 2021 world automation congress (WAC), IEEE, pp 15–20CrossRef
29.
go back to reference (2021) Zero trust reference architecture. U.S Department of Defence (DOD) (2021) Zero trust reference architecture. U.S Department of Defence (DOD)
30.
go back to reference Pan X, Yin B, Hu J (2011) Modeling and simulation for SoS based on the DoDAF framework. In: The Proceedings of 2011 9th International Conference on Reliability, Maintainability and Safety, IEEE, pp 1283–1287CrossRef Pan X, Yin B, Hu J (2011) Modeling and simulation for SoS based on the DoDAF framework. In: The Proceedings of 2011 9th International Conference on Reliability, Maintainability and Safety, IEEE, pp 1283–1287CrossRef
31.
go back to reference Pan X, Yin B, Hu J (2011) Modeling and simulation for SoS based on The DODAF framework. In: International Conference on Reliability, Maintainability and Safety Pan X, Yin B, Hu J (2011) Modeling and simulation for SoS based on The DODAF framework. In: International Conference on Reliability, Maintainability and Safety
32.
go back to reference Richards J (2014) Using the department of defense architecture framework to develop security requirements. SANS institute Richards J (2014) Using the department of defense architecture framework to develop security requirements. SANS institute
37.
go back to reference Shahid A et al (2020) Insights into relevant knowledge extraction techniques: a comprehensive review. J Supercomput 76(3):1695–1733CrossRef Shahid A et al (2020) Insights into relevant knowledge extraction techniques: a comprehensive review. J Supercomput 76(3):1695–1733CrossRef
Metadata
Title
Architecting threat hunting system based on the DODAF framework
Authors
Ali Aghamohammadpour
Ebrahim Mahdipour
Iman Attarzadeh
Publication date
23-09-2022
Publisher
Springer US
Published in
The Journal of Supercomputing / Issue 4/2023
Print ISSN: 0920-8542
Electronic ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-022-04808-6

Other articles of this Issue 4/2023

The Journal of Supercomputing 4/2023 Go to the issue

Premium Partner