Home > Article > Operation and Maintenance > How to conduct APT organization tracking and governance based on knowledge graph
Advanced persistent threats (APT) are increasingly becoming a major cyberspace threat that cannot be ignored against important assets of governments and enterprises. Since APT attacks often have clear attack intentions, and their attack methods are extremely concealed and latent, traditional network detection methods are usually unable to effectively detect them. In recent years, APT attack detection and defense technologies have gradually attracted the attention of governments and network security researchers from various countries.
1. Research on the governance of APT organizations in developed countries
1.1 At the strategic level, the United States emphasizes "America First" and "Promoting Peace through Strength"
The Trump administration has successively released the "National Security Strategy Report", "DoD Cyber Strategy" and "National Cyber Strategy", interpreting Trump's "America First" strategy and emphasizing "cyber deterrence" and "promoting peace through strength," highlighting the importance of cyber warfare, placing the role of "military and force" before diplomacy and state affairs, and emphasizing the protection of U.S. infrastructure to ensure the continued prosperity of the United States. At the same time, the importance of artificial intelligence (AI) to economic growth was emphasized.
1.2 At the regulatory level, the United States legislates to track APT organizations
On September 5, 2018, the U.S. House of Representatives voted to pass the "Cyber Deterrence and Response Act of 2018", which aims to Deter and sanction future state-sponsored cyberattacks against the United States to protect U.S. political, economic, and critical infrastructure from compromise. The bill requires the President of the United States to identify a list of advanced persistent threat (APT) organizations, publish it in the Federal Register, and update it regularly.
1.3 At the attack level, the U.S. military develops advanced cyber warfare tools based on knowledge graphs
In September 2010, "****" disclosed that the Pentagon strives to control the network Preemptively strike in war and achieve the "5D" effects of deception, denial, separation, degradation, and destruction. Research on the attack level of cyber warfare has always been a focus of the U.S. government and its affiliated research institutions. According to the models built by the United States around cyber warfare in recent years, it is important to map the battlefield network with a multi-level knowledge graph and conduct model verification combined with shooting range exercises. Direction of the research.
1.3.1 DARPA’s Plan X uses knowledge graphs to depict battlefield maps to support VR operations
PLAN Revolutionary technology to understand, plan and manage cyber warfare in real-time, large-scale and dynamic cyber environments. Based on a well-established universal map, it helps military network operators use a visual method to perform network intrusion tasks on the battlefield. PLAN The optimal invasion path and invasion plan are provided to combatants.
1.3.2 MITER's CyGraph prototype supports network operations
CyGraph is MITER's prototype system for graph model research. CyGraph uses a hierarchical graph structure, including four levels of graph data: Network Infrastructure, Security Posture, Cyber Threats, and Mission Dependencies, to support the protection of key assets. tasks such as attack surface identification and attack situation understanding.
Figure 1.1 CyGraph’s multi-layer graph structure
1.4 At the defense level, develop a new generation APT description language model based on ATT&CK
ATT&CK is a model and knowledge base that reflects the attack behavior of each attack life cycle. ATT&CK uses a knowledge base to analyze opponent attack methods and evaluate existing protection systems. It can also be combined with the shooting range to conduct attack simulation testing and automated verification. At the same time, many foreign security manufacturers use it to detect and track the actual effects of APT organizations.
Figure 1.2 ATT&CK Comparative analysis of TTP capabilities for lazarus and APT15
2. APT organization tracking practice based on knowledge graph
The APT tracking practice based on the knowledge graph takes the threat primitive model as the core and uses a top-down approach to build the APT knowledge graph.
2.1 Entity class construction based on threat primitive model
The definition of APT knowledge type refers to various current security standards and specifications, such as the common attack mode enumeration of attack mechanisms and classification (CAPEC), Malware Attribute Enumeration and Characteristics (MAEC) and Common Vulnerabilities and Exposures (CVE), etc. Twelve knowledge types are designed: attack mode, campaign, defense measures, identity, threat indicator, intrusion set ,Malicious Code, Observable Entities, Reports, Attackers,Tools, Vulnerabilities.
2.2 APT knowledge graph ontology structure
The knowledge type definition only forms isolated knowledge nodes with relevant information describing the characteristics of the APT organization. There is no semantic relationship between knowledge nodes. On the one hand, the semantic design extracts expert knowledge related to vulnerabilities, vulnerabilities, assets, and attack mechanisms contained in the U.S. National Vulnerability Database (NVD). Secondly, it refers to the seven types of relationships defined by STIX. An overview of STIX2.0 object relationships is shown in Figure 2.1 below.
Figure 2.1 STIX2.0 structure diagram
Summarizes and summarizes the multiple types of semantic relationships involved in the APT report, including "instruction", "exploitation", " Belongs to" and other semantic relations, construct the ontology structure as shown in Figure 2.2.
Figure 2.2 APT knowledge graph ontology structure
2.3 APT attack organization knowledge base construction
This article is based on APT knowledge base is established in a top-down manner. First, the information extraction and alignment operation is performed. Based on the APT knowledge graph ontology, knowledge entities, attributes and knowledge relationships related to the APT organization are extracted from massive data. Then, attribute disambiguation and fusion are performed based on the knowledge attributes defined in the APT knowledge ontology, and the APT knowledge base is output.
The sources of information related to the APT organization include structured data (structured intelligence database, STIX intelligence), semi-structured data (open source intelligence community websites such as Alienvault, IBM x-force intelligence community website, MISP, ATT&CK ), unstructured data (Talos security blog, Github APT report).
2.4 Experiments and Applications
The APT theme knowledge graph constructed in this article currently includes 257 APT organizations, as shown in Figure 2.3.
Figure 2.3 Overview of APT organizations
Combined with the constructed knowledge graph ontology structure, a portrait of the APT32 attack organization was made through semantic search, as shown in Figure 2.4 , shown in 2.5.
Figure 2.4 APT32 diamond model
Figure 2.5 APT 32 portrait
The portrait information includes APT32 The infrastructure, technical means, and attack tools controlled by the organization. Combined with the knowledge of APT portraits, through real-time monitoring and comparison of APT organizational characteristics, the organizational relevance of events is marked, and real-time monitoring and statistics of the activity of APT organizations are achieved.
Based on IDS and sandbox probe equipment in a certain environment, a big data analysis cluster experimental environment composed of 4 servers, combined with the APT organizational portrait characteristics provided by the knowledge graph, from June 2 to June 2019 A total of 5 APT organizations were found to be active during the 9-day period, and the results are shown in Figure 2.6.
Figure 2.6 APT Organization Tracking
3. Countermeasures and Suggestions
1. Improve information related to APT attacks Formulation of policies and regulations. At present, the Chinese government has not yet issued specific policies and regulations to respond to APT attacks, which is very detrimental to promoting, standardizing, and guiding the analysis and detection of domestic APT attacks.
2. Recommend a research ecosystem of co-construction, co-research and sharing. The cooperation between the Chinese government and enterprises needs to be further deepened to build technical solutions and model standards that can be adopted at the industry and national levels.
3. Build a unified intelligence sharing format and strengthen intelligence sharing. Since its implementation, GB/T 36643-2018 "Information Security Technology - Network Security Threat Information Format Specification" has not been widely used in domestic governments and enterprises.
4. Strengthen the construction of universal threat primitive models. my country has not yet fully constructed a set of common threat primitives to support a unified threat intelligence expression format and the sharing of APT-related threat intelligence and knowledge.
The above is the detailed content of How to conduct APT organization tracking and governance based on knowledge graph. For more information, please follow other related articles on the PHP Chinese website!