=Paper=
{{Paper
|id=Vol-2790/paper34
|storemode=property
|title=
Towards Ontology-based Cyber Threat Response
|pdfUrl=https://ceur-ws.org/Vol-2790/paper34.pdf
|volume=Vol-2790
|authors=Nikolay Kalinin
|dblpUrl=https://dblp.org/rec/conf/rcdl/Kalinin20
}}
==
Towards Ontology-based Cyber Threat Response
==
Towards Ontology-based Cyber Threat Response Nikolay Kalinin Faculty of Computational Mathematics and Cy bernetics, Lomonosov Moscow State University, 119991, GSP-1, 1-52, Leninskiye Gory, Moscow, Russia Abstract. Response to the threats of information security in conditions of modern organization with а large infrastructure is an area with emer gency loaded intensity of the data usage. For а successful exposure and the prevention of computer attacks the construction of complex models of the events is required. ln this work, the question of the applicabll ity of ontological models is examined for the description of threats. On the basis of worked out applied ontologies, the model architecture of the knowledge base is being offered, the possiЫe practical scenarios of its use are being examined. The peculiarities of this work are the usage of rea soning on the different stages of event handling and design of knowledge, not only about events but also about an information infrastructure and its safety. Thus, the examined semantic technologies can Ье а base for the complete system of response to the threats of information security. Keywords: Ontology • Reasoning • Cy ber security • Threat response 1 Introduction An area of information security today is especially relevant: the amount of threats and their destructive capacity grow with every year. Computer attacks are com plicated trigger аЫе operations in that it can involve consideraЫe amount of network nodes now. Intruders use the various techniques of conducting attacks and concealment of their activities, complicating work of defenders at the same. In such circumstances, the development of new methods that would Ье applied in composition with the automated tools of exposure of cyber threats becomes not simply an interesting scientific task, but also а valuaЫe practical result. The traditional approach for the exposure of threats is based on the use of signatures, namely search of suspicious templates in operating data. The signa ture approach is ublquitously used due to the ease and profitabllity, from the point of view of computing resources. Unfortunately, it has а range of substantial drawbacks: the signature approach requires consideraЫe efforts on maintenance of base of signatures in the actual state not being аЫе to expose new types of threats (zero-day attacks) and does not allow to line up the models of complex attacks. The most popular alternative for the signature approach is the usage of meth ods of machine learning. А search of threats, which is based on the exposure of Copyright © 2020 for this paper Ьу its authors. Use permitted under Creative Commons License Attribution 4.0 Intemational (СС ВУ 4.0). 387 anomalies, behavioral, and statistical analysis, allows us to find out substan tially more difficult attacks than the signature approach, but it is not deprived of the defects. Machine learning algorithms results are often poorly interpretaЫe thus there are difficulties in localization and threat removing. In addition, such algorithms often require fine-tuning under а correct infrastructure and skilled support for the timely account of inevitaЫe changes of external terms. То two indicated approaches we can add and approach on the basis of formal models. As noted in the work [12] ontology is already one of the fixed assets of realization of the large systems of information security because it allows us to use the experience of wide expert association for providing of transparency of work and forecast of results. Tools of exposure threat on the basis of formal models can allow not only to identify and classify threats but also to effectively produce reliaЫe and interpreted decisions for their removal. The key advantage of such tools is а higher level of the used abstractions that provides knowledge system atization, decision automation, and allows to offer to the expert the decisions with the observance of formal response procedures. One of the proЫems of conceptual models usage in dynamically developing areas is the laboriousness of knowledge base maintenance in the actual state. But the wide usage of open and community-supported standards and taxonomies, such as CVE/NVD 1 or САРЕС 2 allows to avoid the difficulties related to up dating of the knowledge base. On the one side, open and peer-reviewed sources allow where appropriate to specify the terminological base of ontology and on the other, allow to update the actual filling of the knowledge base regularly. Another unique advantage of using formal models in cybersecurity is the high development level of industrial systems for collecting information about pro tected objects. In modern organization all required information is already pre sented in inventory databases and SIEM systems 3, that consideraЬly simplifies its integration in the knowledge base. In spite of the fact that ontology а long ago and successfully used in many areas, such as genetics and Ьio-medicine, they meet rarely in enterprise solutions providing information security. The purpose of this work is а demonstration of wide possiЬilities of an ontological approach for the development of methods and tools for reacting to the security threats of the distributed information infrastruc ture. Central directions of our research are the questions related to applicaЬility and efficiency of logical reasoning and also questions related to the conceptual representation of knowledge about an information infrastructure. The brief review of accessiЫe works is given in the second part of this article, the third part contains а scheme description of the model knowledge base, on which in fourth part some possiЬilities of ontological approach are demonstrated. 1 https://cve.mitre.org 2 http://capec.mitre.org 3 SIEM (Security information and event management) - class of the systems carrying out the centralized collection and analysis of security log 388 2 Related Works The construction of ontological models in information security is conducted al ready for more than fifteen years. One of the first bright works in this area is ontology IDS 4, presented in [17]. Authors put the aim to show the utility of on tology as а model for classification of attacks in the intrusion detection system underlining their superiority above more used taxonomies due to greater flexi Ьility and the possibllity to work with heterogeneous data. Their result ontology presented as attack classification framework and described in DAML-OIL [3] (language predecessor OWL [7]) ontology plugging in more than 190 concepts and operating with the data got as а result of instrumentation of the Linux kernel. Note that one of the dignities of the built ontology authors count the un amblguity of objects distribution on classes, thus, the same high level of strictness is arrived at, as well as at reasoning based on the use of taxonomies. Possiblli ties of the use of the built model are on example SYN flood attacks and buffer overflow. The classification consists of а selection of the most correct class that would correspond to the happening event. Another classic example of the ontological model usage is presented in the article [6], in that it is suggested to use the ontology of information security for annotating functional features web of resources. Final ontology appears as seven sub ontologies and intended for description of security mechanisms such as pro tocols, algorithms, and registration data. In а difference from IDS of ontology that is intended for the use in а certain application, the ontology of submit ted authors is а general ontology of information security and can Ье used for annotating any the web of resources. Development of semantic models is directly connected with the use of in dustry standards and specifications, so in work [18] OVM ontology based on taxonomies is presented and standards of corporation MITRE 5 ( CVE, CWE, САРЕС, CVSS) and intended for description of weakness in software products. The built ontology is one of maiden attempts to Ьind the current standards of description in а more difficult and complete model. Other example of the successful use of open dictionaries is described in [5]. Ву а basic proЫem at the automated use of such data authors consider а pres ence of important information presented as text. The result of their research is framework trained for extraction of relevant content. Extracted entities intercon nection between them appears as RDF-triplets on the basis of simple ontology, complementary of IDS [17] ontology. The final system is integrated into the infrastructure of the linked open data (LOD) 6 Approach allowing to systematize not only information security but also the development of ontology process, presented in works [8] and [9]. In the first authors examine methodology of construction of ontology in cybersecurity. The construction of ontology in their opinion consists of the next stages: 4 IDS - lntrusion detection system 5 https://mitre.org 6 https://lod-cloud.net/ 389 1. Determination of the aims shown in the required queries to the knowledge base and supposed scenarios of the use. 2. Analysis of existent ontologies of the same subject domain including all valu aЫe concepts from them here. If the number of concepts is great authors recommend to include whole ontology in the complement of the developed scheme. 3. Addition of connections coming from data with that it is assumed to work and coming from necessities and existent industry standard. In authors' opinion, ontologies are usually an association of three levels, from most general, such as DOLCE, at the top level, to the applied ontology [9], this approach gets further development described as full ontology-framework CARTELO. The ontology DOLCE- SPRAY is used at the top level, at middle level ontology is presented Ьу the ontology of SECCO, plugging in itself the basic concepts of cybersecurity, the ontology of cyber-operations OSCO complements at the bottom level. Ву the natural desire of researchers, that in the total got the embodiment in а number of works, was to overcome one ontology of all traditional scenarios of the use of concepts of cybersecurity. Thus in work [2] there is an example of the complex use of ontology made in composition the system of cybersecurity. The Package-oriented ontology for the description of network traffic of РАСО is used as а kernel for extraction of knowledge from network traffic and as an instrument of classification of traffic and, together with more general top-level ontologies (CARTELO), as an interface for analyst work. ln stand experiments where efficiency of the system was compared for the exposure of attacks with the and without use of ontology advantages of ontological approach were shown. In the total authors соте to the conclusion that comblnation of high-level on tologies and low-level ontologies allows to substantially increase expressiveness of semantic model, and usage of such models together with traditional tools to become the basis for the system of decision making, the superior possibllity of analyst. In works [16] and [15] an example is made not simply constructions of ontol ogy, but also developments of the architecture of knowledge base for its use. As basic functional components of the system authors distinguish the component of incidents handling presented Ьу the bases of incidents and warnings; asset management component, presented Ьу the base of resources; and the component of accumulation of knowledge. The last includes the knowledge base of products and services, the knowledge base of risks, and the knowledge base of counter measures that contain knowledge based on the treatment of industry standards. Ontology, here, is а tool for uniform manipulation of the collected heterogeneous data. ln [4] authors note that formal representation of knowledge and integration of information from different sources allows substantially improve quality of ex posure and response. ln the article as main scenarios of the use are the search of relevant records from IDS, collection of information about software, and at tempt of determination of malicious activity on the basis of network traffic and 390 changes in the system. For the solution of these tasks, authors develop ontology of STUCO. Its notaЫe features are relative simplicity and realization Ьу means of JSON- scheme from one side, promotes its practical applicaЬility, but with other lays on substantial limitations, main from that is the impossiЬility of the logical reasoning mechanism usage The common decision of long-term proЬlem standardization of formats of cybersecurity-related knowledge lately became language STIX [1], therefore no wonder that the most complex is universal ontology of cybersecurity (UCO), presented in work [14] is based on exactly its structure. An offered ontology is implemented in OWL DL assuming an effective inference allows to extract infor mation from all popular industrial dictionaries and assumes the wide spectrum of scenarios of the use. Meantime its valuaЫe use in practice feasiЫe only after its adaptation to certain tasks Ьу means of the addition of corresponding applied ontologies. UCO is the most successful attempt to create а middle-level ontology, that from one side would possess sufficient expressiveness for the description of conceptions of any cybersecurity directions and with other abandoned space for the clarification of bottom level ontologies. In the conclusion of this review, we want to note that in spite of the fact that for the past years substantial results were oЬtained with the area of development of cybersecurity ontologies many tasks are not solved. PossiЬility of reasoning is not used even in those works where implementation allows to use them. The proЫem of extraction of knowledge from the unstructured sources is not fully resolved although work makes consideraЫe part of analysing such data. Ontolo gies do not contained concepts for description of information infrastructure in the meantime the question of cybersecurity prioritization events is continuously related to such knowledge. А possiЫe way for efficient infrastructure represen tation presented in recent work [10], but valuaЫe ontologies containing both knowledge about infrastructure and knowledge of information security are yet to Ье developed. 3 Knowledge Base Architecture То show the possiЬilities of ontological approach the model knowledge base was implemented. А terminological constituent (Т - Ьох) of knowledge base is on tology of UCO complemented applied with bottom level ontologies. An actual constituent (А- Вох) plugs operating information (events and incidents of cyber security), information about an infrastructure and also information from open dictionaries and taxonomies. 3.1 Ontological Model As said earlier UCO though and is the most complete cybersecurity ontology in pure form fits badly for practical application and requires adaptation. As such adaptation, additional ontologies for the decision of certain tasks were developed. Ontology of operating information extends and complements such concepts of 391 UCO as action and observaЫe. Its main task is to provide accordance with other objects of knowledge base and Ьу operating information. Its key concept is the event. The event is the universal observed object and parent for all other types, which represent events in the real world. ln addition, it plugs in description rules of threats exposure (signatures, anomalies, and others) and sets their accordance with industry standards, such as а matrix of АТТ&СК[lЗ]. Ontology of infor mation infrastructure is а clarification for uco - identity - local identity that allows to determine authentication for internal subjects and also essence set of infrastructure objects for description of endpoints and applications in an infras tructure (frequently Ьу the subclasses of uco - observaЫe) and their well-known and possiЫe connections. Last from ontology models is prioritization ontology. It is а model for а conclusion of environmental risk metrics CVSS. lt includes concepts from the environmental risk of CVSS. Requirements to confidentiality, availaЬility, integrity, probaЬility are causing damages that hatch on the basis of data about subject to the risk to the infrastructure. 3.2 Presentation of Operational Information ln а model knowledge base operating information appears as events of SIEM because the systems of this class are the main components of the centralized security monitoring in enterprise surroundings. From the point of data view, SIEM events are the records of compatiЫe format, extracted from different logs and security tools aggregated in а single database. The format of records is based on the СуЬох standard (http://cybox.mitre.org), plugged into SТIX. As а model data, the logs of regular subsystem of audit of OS Linux, logs generated Ьу Osquery framework (https://osquery.io), and logs of firewalls were used. 3.3 Infrastructure Presentation lnformation about an infrastructure appears in two basic types of objects: end point record and network rule. The first type contains information about а certain host, such as the installed software, security policies, criticality of the processed information etc. The second is an object for network availaЬility de scription and written down like the rules of firewalls (that make the basic filling of this part of database) with the only exception that except the standard types of Deny and Allow the type of Routine is intended for description beforehand of well-known permanent network connections. 4 Use Cases 4.1 Attack Classification We will consider the mechanism of attack classification with the example of event finding out reverse shell on the host, detected Ьу the system of traffic analysis. lnitially an event is а record of SIEM and rule of sensor associated 392 with it. The task of classification, in this case, can Ье reformulated in terms of conceptual model as а task of search of the most certain concept for this event of SIEM would satisfy description of that. The tree of specification of class for our example is brought around to Fig. 1. hasRuleGorup: Persistence hasRule: ReverseShellDetection hasParentProcess: bash hasParentProcess:WeЫogic WebLogicExplatation ProcesslUser:ValidUser ProcessUser: paren!User ValidUserActivity Fig. 1. Logical scheme of class construction for an event Thus, classification on the basis of reasoning can Ье basis not only for а decision-making Ьу а man, but also for the acceptance of the automated decision. ln our example, such solution is automatic filtration of false positive. 4.2 Risk Assessment ln our model, а risk level is estimated in accordance with the second version CVSS standard. The standard of CVSS is plugged in itself Ьу three types of met rics: base, temporal, and environmental. The first two metrics are descriptions of vulnerability presented in ontology as the property hasCVSSScore and can Ье delivered from the open-source. The third metrics group is intended for bringing 393 resulting amendments taking into account descriptions of the information envi ronment and their calculation makes the most interest. For the calculation of environmental metrics descriptions of the affected objects are used. So relation belongToSystem of class Ednpoint allows defining requirements for confidential ity availaЬility and integrity, coming from properties of the system such as а type of processed information and degree of criticism. ProbaЬility of indirect damage settles accounts coming from criticism of the constrained systems and closeness of aims on the basis of amount of hosts on that the vulneraЫe version Attack Use Vulnerabllity Name:WeЫogic Explatation cvelD: CVE-2020-2283 hasCVSSScore:9.8 Endpoint RiskScore Туре: Server EndpointlD: 1234 Affect defindeBy BelongTo EnvironmentalMetrics System �----L----� extractFrom Scope lnformationLevel: К-2 Criticality: Medium NumberO!Hosts: 15 Fig. 2. Logical scheme of risk assessment 4.3 Finding of Related Information Finding of related information in our model can Ье materialized on the basis of rules presenting as SPARQL [11] queries. So, for example, for the event of finding out а ssh-tunnel the important constrained information is: information about а source, information about а purpose, information about prohiЬitive or permitting such connection rules. Such SPARQL queries must Ье certain for every type of event at the level of the user interface. It is needed to notice that 394 information that is required for the automated treatment does not fall into а category constrained and hatches Ьу means of mechanisms of ontology. 5 Conclusions and Directions for Further Work Within the work the model of knowledge base was built to support processes of response to the threats of information security. Stand tests on the basis of model scenarios of the use showed possiЬility of deployment of ontological ap proach in the process of response to the incidents of information security. The special attention at development of ontological model was spared to description of information infrastructure as modern processes of providing information secu rity in large organizations indissoluЬly connected with the processes of network control and eventual devices. Despite the fact that the ontological model has shown its suitaЬility, there is still а long way to go for its full use. Firstly, in work we did not involve the question of possiЬility of thread data processing and, as а result, the productivity questions, including questions that are related to the choice of optimal dialect of OWL for description of model. Secondly, а fairly primitive model for descriЬing network availaЬility was used, in that the question of presence or incommunication, in fact, is taken to the presence of cor responding rule on the firewall was used. Thirdly, valuaЫe use of the system is impossiЫe without serious expansion of types of processed events and expansion of set of concepts in ontologies of application layer. Our global aim is to develop complete ontological framework for support of response to cyberthreats and this research is only the first step on а path to this aim. Aknowledgements. This work is supervised Ьу Nikolay Skvortsov, Federal Research Center Computer Science and Control of the Russian Academy of Sciences (FRC CSC RAS). References 1. Barnum, S.: Standardizing cyber threat intelligence information with the struc tured threat information expression (stix). Mitre Corporation 11, 1-22 (2012) 2. Ben-Asher, N., Oltramari, А., Erbacher, R.F., Gonzalez, С.: Ontology-based adap tive systems of cyber defense. ln: STIDS. рр. 34-41 (2015) 3. Horrocks, I., et al.: Daml+oil: А description logic for the semantic web. IEEE Data Eng. Bull. 25(1), 4-9 (2002) 4. Iannacone, М., Bohn, S., Nakamura, G., Gerth, J., Huffer, К., Bridges, R., Fer ragut, Е., Goodall, J.: Developing an ontology for cyber security knowledge graphs. In: Proceedings of the 10th Annual Cyber and Information Security Research Con ference. рр. 1-4 (2015) 5. Joshi, А., Lal, R., Finin, Т., Joshi, А.: Extracting cybersecurity related linked data from text. In: 2013 IEEE Seventh International Conference on Semantic Comput ing. рр. 252-259. ШЕЕ (2013) 6. Kim, А., Luo, J., Kang, М.: Security ontology for annotating resources. In: ОТМ Confederated International Conferences" On the Move to Meaningful Internet Sys tems". рр. 1483-1499. Springer (2005) 395 7. McGuinness, D.L., Van Harmelen, F., et al.: Owl web ontology language overview. W3C recommendation 10(10), 2004 (2004) 8. Obrst, L., Chase, Р., Markeloff, R.: Developing an ontology of the cyber security domain. In: STIDS. рр. 49-56 (2012) 9. Oltramari, А., Cranor, L.F., Walls, R.J., McDaniel, P.D.: Building an ontology of cyber security. In: STIDS. рр. 54-61. Citeseer (2014) 10. Scarpato, N., Cilia, N.D., Romano, М.: Reachabllity matrix ontology: А cyberse curity ontology. Applied Artificial Intelligence 33(7), 643-655 (2019) 11. Sirin, Е., Parsia, В.: Sparql-dl: Sparql query for owl-dl. In: OWLED. vol. 258 (2007) 12. Sokolov, I., Kupriyanovsky, V., Namiot, D., Sukhomlin, V., Pokusaev, О., Lavrov, А., Volokitin, У.: Modern eu research projects and the digital security ontology of europe. International Journal of Open Information Technologies 6(4), 72-79 (2018) 13. Strom, В.Е., Applebaum, А., Miller, D.P., Nickels, К.С., Pennington, A.G., Thomas, С.В.: Mitre att&ck: Design and philosophy. Technical report (2018) 14. Syed, Z., Padia, А., Finin, Т., Mathews, L., Joshi, А.: Uco: А unified cybersecurity ontology. In: Workshops at the Thirtieth AAAI Conference on Artificial Intelligence (2016) 15. Takahashi, Т., Kadobayashi, У.: Reference ontology for cybersecurity operational information. The Computer Journal 58(10), 2297-2312 (2015) 16. Takahashi, Т., Kadobayashi, У., Fujiwara, Н.: Ontological approach toward cyber security in cloud computing. In: Proceedings of the 3rd international conference on Security of information and networks. рр. 100-109 (2010) 17. Undercoffer, J., Joshi, А., Pinkston, J.: Modeling computer attacks: An ontology for intrusion detection. In: International Workshop on Recent Advances in Intrusion Detection. рр. 113-135. Springer (2003) 18. Wang, J.A., Guo, М.: Ovm: an ontology for vulnerabllity management. In: Proceed ings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies. рр. 1-4 (2009) 396