Title :
Machine actionable indicators of compromise
Author_Institution :
Chief Eng. Cybersecurity, Southern California Edison, Irwindale, CA, USA
Abstract :
IT departments are overwhelmed by an ever-increasing flood of Indicators of Compromise (IOC) detailing illicit activity that may occur on their networks and systems. The characterization of the threats involved varies with the source of the information and each notice requires human operators to sift through data as displayed on a Web page or in a PDF, update monitoring appliances and if detected, decide on appropriate remediation. There are initiatives to enable the IOC data to be exchanged in a common format. For example, STIX and OpenIOC, but this is only the first step in the workflow. Recently, Lawrence Livermore National Laboratory (LLNL) has led a team of researchers in the development of a system to describe the compromise in a way that it can be automatically detected if present AND include possible remediation for the exploit in the same machine-readable package. The first part of this paper details the industry ecosystem for Enterprise exploits: characterization in a standard and consistent manner, exchange of data between organizations and the limited scope of remediation. The next section of this paper describes the research being performed by LLNL and its partners to leverage the Enterprise exploit model within the ICS community. The research consists of three parts: (a) a representation of exploits to include information required for their detection on the target system, (b) a language to describe remediation specific for an exploit, and (c) processing algorithms to convert those generic proscriptions into actions for specific appliances. Finally, as this research is ongoing, this paper presents the plan of efforts going forward, the expected challenges yet to come, and some resulting items to be open-sourced for continued community involvement.
Keywords :
computer viruses; digital forensics; electronic data interchange; organisational aspects; public domain software; software packages; ICS community; IOC; IOC data exchange; IT departments; LLNL; Lawrence Livermore National Laboratory; OpenIOC; PDF; STIX; Web page; continued community involvement; enterprise exploit model; exploit representation; generic proscriptions; human operators; illicit activity; industry ecosystem; information detection; information source; machine actionable compromise indicators; machine actionable indicator-of-compromise; machine-readable package; monitoring appliance update; open-sourced items; processing algorithms; remediation specific language; specific appliance actions; target system; threat characterization; Communities; Ecosystems; Malware; Standards; Vocabulary; CybOX; ICS; IOC; M2M; Remediation; STIX; XML;
Conference_Titel :
Security Technology (ICCST), 2014 International Carnahan Conference on
Conference_Location :
Rome
Print_ISBN :
978-1-4799-3530-7
DOI :
10.1109/CCST.2014.6987016