From logs to Stories: Human-Centred Data Mining for Cyber Threat Intelligence

An average medium-sized organisation logs approx. 10 to 500 mln events per day on the system. Only less than 5% of threat alerts are being investigated by the specialised staff, leaving the security hole open for potential attacks. Insufficient information in alert message produced in machine-friend...

Full description

Bibliographic Details
Main Authors: Neda Afzaliseresht, Yuan Miao, Sandra Michalska, Qing Liu, Hua Wang
Format: Article
Language:English
Published: IEEE 2020-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8960350/
_version_ 1818874541207715840
author Neda Afzaliseresht
Yuan Miao
Sandra Michalska
Qing Liu
Hua Wang
author_facet Neda Afzaliseresht
Yuan Miao
Sandra Michalska
Qing Liu
Hua Wang
author_sort Neda Afzaliseresht
collection DOAJ
description An average medium-sized organisation logs approx. 10 to 500 mln events per day on the system. Only less than 5% of threat alerts are being investigated by the specialised staff, leaving the security hole open for potential attacks. Insufficient information in alert message produced in machine-friendly rather than human-friendly format causes cognitive overload on currently limited cybersecurity resources. In this paper, the model that generates the report in natural language by means of applying novel storytelling techniques from security logs is proposed. The solution caters for different levels of reader expertise and preference by providing adjustable templates, filled from both local and global knowledge base. The validation is performed on case study from Security Operations Centre (SOC) at educational institution. The report generated proves superior to existing approach in terms of comprehension (increased cognition) and completeness (enriched context). The evaluation demonstrates power of storytelling in potential threats interpretation in cybersecurity context.
first_indexed 2024-12-19T13:12:14Z
format Article
id doaj.art-1eb888f8aa884cf28a1b05b6abd19cd1
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-12-19T13:12:14Z
publishDate 2020-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-1eb888f8aa884cf28a1b05b6abd19cd12022-12-21T20:19:54ZengIEEEIEEE Access2169-35362020-01-018190891909910.1109/ACCESS.2020.29667608960350From logs to Stories: Human-Centred Data Mining for Cyber Threat IntelligenceNeda Afzaliseresht0https://orcid.org/0000-0001-6964-6107Yuan Miao1https://orcid.org/0000-0002-6712-3465Sandra Michalska2https://orcid.org/0000-0002-3732-1882Qing Liu3https://orcid.org/0000-0001-7895-9551Hua Wang4https://orcid.org/0000-0002-8465-0996Institute for Sustainable Industries and Liveable cities, Victoria University, Melbourne, VIC, AustraliaInstitute for Sustainable Industries and Liveable cities, Victoria University, Melbourne, VIC, AustraliaInstitute for Sustainable Industries and Liveable cities, Victoria University, Melbourne, VIC, AustraliaThe Commonwealth Scientific and Industrial Research Organization (CSIRO), Hobart, TAS, AustraliaInstitute for Sustainable Industries and Liveable cities, Victoria University, Melbourne, VIC, AustraliaAn average medium-sized organisation logs approx. 10 to 500 mln events per day on the system. Only less than 5% of threat alerts are being investigated by the specialised staff, leaving the security hole open for potential attacks. Insufficient information in alert message produced in machine-friendly rather than human-friendly format causes cognitive overload on currently limited cybersecurity resources. In this paper, the model that generates the report in natural language by means of applying novel storytelling techniques from security logs is proposed. The solution caters for different levels of reader expertise and preference by providing adjustable templates, filled from both local and global knowledge base. The validation is performed on case study from Security Operations Centre (SOC) at educational institution. The report generated proves superior to existing approach in terms of comprehension (increased cognition) and completeness (enriched context). The evaluation demonstrates power of storytelling in potential threats interpretation in cybersecurity context.https://ieeexplore.ieee.org/document/8960350/Cybersecuritystorytellingthreat intelligencehuman cognitioninformation extractionknowledge Discovery
spellingShingle Neda Afzaliseresht
Yuan Miao
Sandra Michalska
Qing Liu
Hua Wang
From logs to Stories: Human-Centred Data Mining for Cyber Threat Intelligence
IEEE Access
Cybersecurity
storytelling
threat intelligence
human cognition
information extraction
knowledge Discovery
title From logs to Stories: Human-Centred Data Mining for Cyber Threat Intelligence
title_full From logs to Stories: Human-Centred Data Mining for Cyber Threat Intelligence
title_fullStr From logs to Stories: Human-Centred Data Mining for Cyber Threat Intelligence
title_full_unstemmed From logs to Stories: Human-Centred Data Mining for Cyber Threat Intelligence
title_short From logs to Stories: Human-Centred Data Mining for Cyber Threat Intelligence
title_sort from logs to stories human centred data mining for cyber threat intelligence
topic Cybersecurity
storytelling
threat intelligence
human cognition
information extraction
knowledge Discovery
url https://ieeexplore.ieee.org/document/8960350/
work_keys_str_mv AT nedaafzaliseresht fromlogstostorieshumancentreddataminingforcyberthreatintelligence
AT yuanmiao fromlogstostorieshumancentreddataminingforcyberthreatintelligence
AT sandramichalska fromlogstostorieshumancentreddataminingforcyberthreatintelligence
AT qingliu fromlogstostorieshumancentreddataminingforcyberthreatintelligence
AT huawang fromlogstostorieshumancentreddataminingforcyberthreatintelligence