IPAttributor: Cyber Attacker Attribution with Threat Intelligence-Enriched Intrusion Data
Xiayu Xiang,
Hao Liu,
Liyi Zeng,
Huan Zhang and
Zhaoquan Gu ()
Additional contact information
Xiayu Xiang: Department of New Networks, Peng Cheng Laboratory, Shenzhen 518000, China
Hao Liu: School of Computer Science, Harbin Institute of Technology (Shenzhen), Shenzhen 518000, China
Liyi Zeng: Department of New Networks, Peng Cheng Laboratory, Shenzhen 518000, China
Huan Zhang: Department of New Networks, Peng Cheng Laboratory, Shenzhen 518000, China
Zhaoquan Gu: Department of New Networks, Peng Cheng Laboratory, Shenzhen 518000, China
Mathematics, 2024, vol. 12, issue 9, 1-19
Abstract:
In the dynamic landscape of cyberspace, organizations face a myriad of coordinated advanced threats that challenge the traditional defense paradigm. Cyber Threat Intelligence (CTI) plays a crucial role, providing in-depth insights into adversary groups and enhancing the detection and neutralization of complex cyber attacks. However, attributing attacks poses significant challenges due to over-reliance on malware samples or network detection data alone, which falls short of comprehensively profiling attackers. This paper proposes an IPv4-based threat attribution model, IPAttributor, that improves attack characterization by merging a real-world network behavior dataset comprising 39,707 intrusion entries with commercial threat intelligence from three distinct sources, offering a more nuanced context. A total of 30 features were utilized from the enriched dataset for each IP to create a feature matrix to assess the similarities and linkage of associated IPs, and a dynamic weighted threat segmentation algorithm was employed to discern attacker communities. The experiments affirm the efficacy of our method in pinpointing attackers sharing a common origin, achieving the highest accuracy of 88.89%. Our study advances the relatively underexplored line of work of cyber attacker attribution, with a specific interest in IP-based attribution strategies, thereby enhancing the overall understanding of the attacker’s group regarding their capabilities and intentions.
Keywords: cyber threat intelligence; attacker attribution; APT; community discovery (search for similar items in EconPapers)
JEL-codes: C (search for similar items in EconPapers)
Date: 2024
References: View complete reference list from CitEc
Citations:
Downloads: (external link)
https://www.mdpi.com/2227-7390/12/9/1364/pdf (application/pdf)
https://www.mdpi.com/2227-7390/12/9/1364/ (text/html)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:gam:jmathe:v:12:y:2024:i:9:p:1364-:d:1386457
Access Statistics for this article
Mathematics is currently edited by Ms. Emma He
More articles in Mathematics from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().