Home // SECURWARE 2020, The Fourteenth International Conference on Emerging Security Information, Systems and Technologies // View article
Automatic Mapping of Vulnerability Information to Adversary Techniques
Authors:
Otgonpurev Mendsaikhan
Hirokazu Hasegawa
Yukiko Yamaguchi
Hajime Shimada
Keywords: Multi-label classification; MITRE ATT&CK; Security Vulnerability
Abstract:
Along with the growth in the usage of software in almost every aspect of human life, the risks associated with software security vulnerabilities also increase. The number of average daily published software vulnerabilities exceeds the human ability to cope with it, hence various threat models to generalize the threat landscape has been developed. The most popular threat model MITRE ATT&CK proved to be a very useful tool for the security analyst to perform cyber threat intelligence, red and blue teaming, and so on. However, for his daily operation, the security analyst has to prioritize his defense by manually mapping the daily published software security vulnerabilities to the adversarial techniques listed in MITRE ATT&CK. In this paper, we propose a method to automatically map the software security vulnerability using a multi-label classification approach. We took the vector representation of the vulnerability description and classified it with various multi-label classification methods to evaluate in different measures and found out the LabelPowerset method with Multilayer Perceptron as base classifier performs best in our experiment.
Pages: 53 to 59
Copyright: Copyright (c) IARIA, 2020
Publication date: November 21, 2020
Published in: conference
ISSN: 2162-2116
ISBN: 978-1-61208-821-1
Location: Valencia, Spain
Dates: from November 21, 2020 to November 25, 2020