<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>New Approaches to the Investigations and Classification of Cyber Threats Challenged by the Application of Artificial Intelligence Methods</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Roumen Trifonov</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ognian Nakov</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Slavcho Manolov</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Georgi Tsochev</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Galya Pavlova</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Technical University of Sofia</institution>
          ,
          <addr-line>Sofia 1000</addr-line>
          ,
          <country country="BG">Bulgaria</country>
        </aff>
      </contrib-group>
      <fpage>82</fpage>
      <lpage>91</lpage>
      <abstract>
        <p>The investigations of Cyber Threats on a global scale has, in recent years, taken on a new dimension related to the unprecedented growth of Cyber Crime, Cyber Terrorism and Cyber war, as well as the introduction of Artificial Intelligence methods in the field of Cyber Defense. The research and practice of this implementation shows that there is no universal method effective enough to protect against various types of Cyber Attacks. It turns out that the choice of Artificial Intelligence methods that are best suited to counteract certain classes of threats depends on the systematization, unification and classification of Cyber Security Threats and the sources of those threats. This paper examines the new approaches for identification and analysis of Cyber Threats, as well as the tools used by the various so-called “Threat Agents”. These analyses and classification schemes can serve to create criteria for selecting appropriate Artificial Intelligence methods to counteract concrete classes of Cyber Threats.</p>
      </abstract>
      <kwd-group>
        <kwd>cyber threats</kwd>
        <kwd>taxonomy</kwd>
        <kwd>threat agents</kwd>
        <kwd>threat vector</kwd>
        <kwd>threat matrix</kwd>
        <kwd>kill chain</kwd>
        <kwd>cyber threat intelligence</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>
        International Standard ISO / IEC TR 13335-1:1996 [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. Nevertheless, in recent
years, this activity has acquired entirely new goals and characteristics, due to
two fundamental factors triggered by the unprecedented rise in cybercrime and
the emergence of elements of cyber terrorism and cyber war. These factors are
as follows:
      </p>
      <p>a) The adoption in Cyber Defense of important military technologies and
methods, such as the Cyber Intelligence (Strategic, Operational and Tactical) and
the concept of the so-called “Kill Chain”;</p>
      <p>b) The widespread introduction into the practice of Cyber Defense of
Artificial Intelligence methods.</p>
      <p>Thus, on the one hand, different aspects of Cyber Threats are essential for the
different phases and varieties of military methods; on the other hand, the research
and practice of the implementation of Artificial Intelligence methods shows that
there is no universal method effective enough to protect against various types of
Cyber Attacks.</p>
      <p>The motivation of the present research is based on the belief that the new
approaches to identification, classification and analysis of Cyber Security Threats
and the sources of those threats will be useful in choosing the appropriate method
for counteraction to certain classes of threats.</p>
      <p>Research by the team from Computer Systems and Technology Faculty at the
Technical University - Sofia in the field of application of Artificial Intelligence
methods in different phases of Cyber Defense (Operational Cyber Intelligence,
Tactical Cyber Intelligence, Incident Handling) shows that the typification,
unification and classification of Cyber Threats play an important role in achieving
the specific objectives for each phase. Thus, in Operational Cyber Intelligence,
where the primary task is to identify the behavior of a potential adversary, it is
important, among the vast information on the network activity of the alleged
adversary, to extract so-called “features” - characteristics that make it highly
likely to determine its behavior. Moreover, in the case of Incident Handling, it
is essential that the incident relate to a high degree of likelihood of a particular
element of the Cyber-Threat Classification scheme, for which a remedial
procedure has been developed, i.e. to solve a classification problem.</p>
      <p>It should be noted that the present work is not just a “literature review” of sources
related to the analysis and classification of cyber threats, but also an attempt to show how
these classifications can influence the creation of criteria for adequate choice of methods
of Artificial Intelligence for different areas of application in Cyber Security.
2</p>
      <sec id="sec-1-1">
        <title>A New Generation of Cyber-Security Threats</title>
        <p>
          The most adequate analysis of the radical changes in Cyber Security in the
last few years has been carried out in the report of the European Network and
Information Security Agency (ENISA) “Threat Landscape Report 2016” [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ].
ENISA and other leading Cyber Security players have identified and formulated
the two main directions of these changes:
        </p>
        <p>
          a) fifth-generation Cyber-Criminality, where threats are becoming more
complex and automated. Major Cybercrime schemes integrate into several tools
that perform different functions. One of the features of the fifth generation is
called “Advanced Persistent Threats” (APT) as the definition of targeted attacks
against specific organizations by some well-coordinated cybercriminals [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ]. In
addition, such popular cloud computing services as SaaS (Software as a Service),
IaaS (Infrastructure as a Service), PaaS (Platform as a Service), and so on in the
Cyber-Criminality world has been developed so called “Crimeware as a Service
(CaaS)” - a modern model that provides easy access to the tools and services
needed to commit Cyber Attacks [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ]. This allows even novice Cyber Criminals to
perform attacks on a scale that disproportionate to their technical capacity.
        </p>
        <p>b) the transition from the Cyber-Criminality phase to the Cyber-War
phase, where the most serious destructive effects are those of a hybrid nature
- a combination of cyberattack and physical attack, i.e. Cyber-attacks affecting
communications and information systems and violating physical, personal and
communication security. The complexity and extent of the impact can affect all
spheres of society and turn into a hybrid war against a state or group of states.</p>
        <p>
          The military concept related to the structure of the attack and aimed at
creating effective prevention or counter-attack at the various stages of the attack,
known as the “Kill Chain”, was adapted to the Cyber Defense by IT experts
at Lockheed-Martin Corporation [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ]. Gradually, this concept was accepted by
the expert community as a Cyber Defense tool that defines the stages of
Cyberattacks and the respective counteraction at each stage. The “Lockheed-Martin”
model (Fig. 1) [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ] includes the following seven steps:
        </p>
        <p>a) Intelligence: selection of the target by attacker selects a target, examination
of resources and attempts to identify vulnerabilities in the target network;
b) Creation of the weapon: respective creates weapons for remote access,
such as a virus, adapted to specific vulnerabilities;</p>
        <p>c) Delivery: dispatch of the weapon to the victim (via e-mail attachments,
websites, USB devices, etc.):</p>
        <p>d) Exploitation: activation of the weapon program code aiming to exploit the
vulnerability;</p>
        <p>e) Installation: implementation of unregulated access point (for example, a
“back door”) usable by the offender;</p>
        <p>f) Command and control: obtaining so called “keyboard hands” - constant
access to the target network;</p>
        <p>g) Action on the target: realization of malicious action, such as fishing, data
destruction, or ransom encryption.</p>
        <p>The “Kill Chain” model can be used in the analysis of the most common and
important threats, differentiating them into the relevant phases of the chain. The
analysis should focus on the dynamic development of Cyber Threat assessments
and aim to integrate different types of information and provide stakeholders with
interactive assessments of threats and related instruments.</p>
        <p>By assessing the impact on asset groups at different stages of the chain, it
can be determined, which security measures are most appropriate for the different
phases, including the intelligence to prevent asset abuse?
3</p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>Classifications of Cyber Threats and Their Important Attributes</title>
      <p>In order to build a rational and consistent approach to the choice of Artificial
Intelligence methods best suited to counteract certain classes of threats, it is
necessary to enable systematization, unification and classification of
CyberSecurity Threats and the sources of these threats. The first step in this way can be
the identification and analysis of the new concepts in the classifications of Cyber
Threats.</p>
      <sec id="sec-2-1">
        <title>A. Currently, the most authoritative classification is so called „Cyber</title>
      </sec>
      <sec id="sec-2-2">
        <title>Threats Taxonomy“ [8] published by ENISA on the basis of an analysis of</title>
        <p>about 40 taxonomies developed by world-leading organizations (including</p>
      </sec>
      <sec id="sec-2-3">
        <title>NIST and the US Department of Defense (USA), BSI (BRD), TERENA (Netherlands), etc.).</title>
        <p>This information structure is not just a classification by any selected attribute,
but a starting point for analysis, providing opportunities for combining, sorting,
modifying and refining the definitions of threats. Threat taxonomy is a living
structure that is used to maintain a consistent view of threats based on updated
information.</p>
        <p>ENISA‘s taxonomy consists of the following sections:
a) threat category (including threat families);
b) the individual threats included in a category;
c) threat parameters - such as: specific type, method of attack, targeting a
specific IT asset, etc.;</p>
        <p>d) additional features such as affected assets, threat agents, related sources,
URLs, etc.</p>
      </sec>
      <sec id="sec-2-4">
        <title>B. The systematization of the sources of Cyber Threats is an important element of their systematic analysis.</title>
        <p>The mentioned above report of ENISA explained formation of groups of
sources with similar characteristics (motivations, level of capabilities, focus,
level of preparedness, striking power, etc.) and called „threat agents”:
a) Cyber-Criminals are the most active threat agent group in Cyber-space,
being responsible for at least two third of the registered incidents. This group has
set up networks to exchange tools for malicious action and hire assistants for the
various stages of the attack;
b) Insiders are also the cause of a significant number of incidents. In addition
to malicious acts of all kinds, there are widespread violations of existing security
policies through negligence and user errors;</p>
        <p>c) Hacktivists usually protest against environmental policy, discrimination,
corruption, pacifism, public health issues, support of minorities, etc. In the
majority of cases they cooperate on a group basis without any leadership schemes;
d) State-sponsored agents (including the cyber-spies) are the fourth most
active Threat Agent group. Due to the early maturity of military cyber-capabilities
it is not perfectly clear where is the differentiation between cyber-spying and
cyber-combating;</p>
        <p>e) Others: cyber-fighters, cyber-terrorists, script-kiddies, etc. - their role is
less important.</p>
        <p>Advanced intruders also use Cyber-Intelligence methods (mainly to look
for vulnerabilities and apply anonymization techniques). They are investing
significant amounts of their profits to improve and mature their infrastructure. In
addition, they use the dark web to exchange information between them.</p>
      </sec>
      <sec id="sec-2-5">
        <title>C. Identifying a particular attacker’s affiliation with a respective group of Threat Agents is too useful for Cyber Defense, as analyses show that each group is distinguished by a specific set of instruments for Cyber Attacks. The Table 1 visualize which threat agent groups are involving in which threats.</title>
        <p>This information might be useful for all interested stakeholders in order
to identify the capability level can be assumed behind the top threats and thus
support in decisions concerning the strength of the security controls that are
implemented to protect valuable assets.</p>
      </sec>
      <sec id="sec-2-6">
        <title>D. One of the new defined attributes of the Cyber Threats is so-called</title>
        <p>“Attack Vector”, charactering methods and tools applied by the concrete</p>
      </sec>
      <sec id="sec-2-7">
        <title>Threat Agent. A threat agent can abuse of weaknesses or vulnerabilities on</title>
        <p>assets (including human) to achieve a specific outcome by this means. In
the correct context, the study of the different steps performed on an attack
vectors can provide valuable information about how Cyber Threats can be
materialized.</p>
        <p>The description of the workflow of the attacks based on the „kill chain“
model, also has quite similar features within a particular group of Threat Agents.
This understanding creates additional opportunities for adequate planning of
Cyber Defense.</p>
        <p>
          E. One of the results of the newest Cyber Threat analyses is the so-called
“threat matrix” [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ], which describes the identification of the adversary’s
abilities, the patterns of past and current behavior, and his specific tasks,
techniques and procedures. This matrix (Fig. 2) [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ] is focused to those
who have already shown intent and ability to attack. It contain qualitative
and quantitative evaluation criteria. The matrix can be used for priority
allocation of resources to most likely opponents.
        </p>
        <p>
          F. The threat modelling [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ] as another useful tool for the systematic
analysis of Cyber Threats realizes an iterative process consisting of five
major steps (Fig. 3) [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ]:
        </p>
        <p>a) identification / verification of security objectives – threat modelling aimed
at determining of the activities in subsequent steps;</p>
        <p>b) creation of application overview - attempt to extract essential features and
identify the threat agent;</p>
        <p>c) decomposition of application - a detailed description of the mechanics of
malicious action;
d) threats identification - threat analysis such as so called “STRIDE
Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service,
and Elevation of Privilege”, attack trees and a generic risk model;
e) vulnerabilities identification – reviewing the layers of application for
searching weaknesses related to these threats and using vulnerability categories
to focus on those areas where mistakes are most often made.</p>
        <p>To adapt the model to specific needs, the key resources identified in threat
modelling need to be updated as research progresses.
4</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Conclusions</title>
      <p>As mentioned above, a comprehensive analysis of the most up-to-date approaches
to Cyber Threat investigations has been carried out by the team in order to solve
the problem of creating criteria for selection of the most suitable Artificial
Intelligence methods for the different phases of Cyber-Defense.</p>
      <p>With the methods described above over 40 types of threats (some with
several subspecies) were examined in terms of their evolution, level of impact
and complexity, sophistication, availability, attribution, etc.</p>
      <p>
        This analysis of the threats gives opportunity to evaluate possibility for
potential attack pattern recognition and to develop models for active Cyber
Defence. The process of modelling, experiments and selection of criteria is
described on the official website of the project [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] and in published articles that
are referenced on this website. In short, the results of this choice are formulated
in the project as follows:
      </p>
      <p>a) basic criteria: maximum performance (i.e. detection efficiency coupled
with performance level) and a minimum percentage of false alarms;
b) additional criteria: flexibility for use in different environments; generic
methodology; the processing speed needed to analyze the contents of packets to
exclude lost packets.</p>
      <p>The application of these criteria led to the following choice of Artificial
Intelligence methods:</p>
      <p>a) in the case of Tactical Cyber Intelligence - a network of Self-Learning
Multi-Agent systems;</p>
      <p>b) in the case of Operational Cyber Intelligence, the Echo State Network
(ESN) method with Reservoir Computing for training;</p>
      <p>c) in the case of Incident Handling - so called Reinforcement Learning.</p>
    </sec>
    <sec id="sec-4">
      <title>Acknowledgments</title>
      <p>This research is realized under the national science program “Information and
Communication Technologies for common digital market in science, education
and security” financed by Ministry of Education and Science in Bulgaria</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>NIST</given-names>
            <surname>Special</surname>
          </string-name>
          <article-title>Publication 800-30 Revision 1 Guide for Conducting Risk Assessment September 2012</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2. ISO/IEC TR 13335
          <article-title>-1:1996 Information technology - Guidelines for the management of IT Security - Part 1: Concepts and models for IT Security</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <source>Threat Landscape Report 2016 ENISA</source>
          ,
          <year>2017</year>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <article-title>State of Cybersecurity An ISACA</article-title>
          and
          <string-name>
            <surname>RSA Conference Survey</surname>
            <given-names>ISACA</given-names>
          </string-name>
          ,
          <year>2016</year>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>TrustWave</given-names>
            <surname>Global Security Report TrustWave</surname>
          </string-name>
          ,
          <year>2016</year>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6. www.lockheedmartin.com/content/dam/lockheed/data/corporate/documents/ LM-
          <string-name>
            <surname>WhitePaper-Intel-</surname>
          </string-name>
          Driven-Defense.pdf
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <article-title>7. Gaining the Advantage Applying Cyber Kill Chain Methodology to a Network Defense Lockheed Martin Corporation, 2013</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>ENISA</given-names>
            <surname>Threat Taxonomy</surname>
          </string-name>
          <article-title>A tool for structuring threat information Version1.0 January 2016</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Duggan</surname>
            ,
            <given-names>D. P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Thomas</surname>
            ,
            <given-names>S. R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Veitch</surname>
            ,
            <given-names>C. K.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Woodard</surname>
            ,
            <given-names>L. Categorizing</given-names>
          </string-name>
          <article-title>Threat: Building and Using Generic Threat Matrix http</article-title>
          ://www.idart.sandia.gov/methodology/materials/Adversary_ Modeling/SAND2007-5791.pdf
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Shostack</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Threat</surname>
          </string-name>
          <article-title>Modelling designed for security</article-title>
          , John Wiley &amp; Sons, Inc.,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>11. Project Web site https://npict.bg/</mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Dimitrov</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <article-title>Semantics of Vulnerabilities and Intelligent Search</article-title>
          , Computer and Communications Engineering, Vol.
          <volume>13</volume>
          , No. 2/2019, pp.
          <fpage>20</fpage>
          -
          <lpage>25</lpage>
          , Workshop on Information Security
          <year>2019</year>
          , 9th Balkan Conference in Informatics,
          <volume>26</volume>
          -28
          <source>September</source>
          <year>2019</year>
          , Sofia, Bulgaria
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Kaloyanova</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <source>Exploring Cybersecurity Curricula Designation Requirements, Computer and Communications Engineering</source>
          , Vol.
          <volume>13</volume>
          , No. 2/2019, pp.
          <fpage>64</fpage>
          -
          <lpage>68</lpage>
          ,
          <source>WS on Information Security</source>
          <year>2019</year>
          , 9th Balkan Conference in Informatics,
          <volume>26</volume>
          -28
          <source>September</source>
          <year>2019</year>
          , Sofia, Bulgaria
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>