Manually Searching Advisories and Blogs for Threat Data--"Who's Got Time for That?"

Presented at ShmooCon XI (2015), Unknown date/time (Unknown duration)

Threat intelligence is generating a lot of buzz, and many vendors/industry driven initiatives are focused on addressing how enterprises can leverage threat intelligence. Despite the appearance that cyber threat intelligence is structured and well formatted, most enterprise receive threat intelligence from external sources in unstructured text format, in forms of advisories, email bulletins, chat forums etc. Threat intelligence is most relevant when it is timely and actionable. The status quo of using human analysts to process threat data and determine its relevance is inefficient and does not scale either. We have developed a solution that increases automation of extracting threat data from unstructured sources and mapping them to the various STIX data constructs, in effect converting it into a structured form. This has several benefits: 1. Allows human analyst to focus on analysis, and not spend time parsing text through a document 2. Increases machine readability by converting incoming data into structured format 3. Apply customized contextualization and prioritization filters to the extraction process We have developed this solution on OpenNLP, a natural language processing toolkit. We will demonstrate how to process a batch of threat advisories and prioritize them for analysts to review based on predefined analyst preferences.

Presenters:

  • Shimon Modi
    Elvis Hovor received a MS in information Security from the Johns Hopkins University, MD. He has worked on various research projects in his three years with Accenture's technology labs. He leads development work for threat Intelligence.
  • Elvis Hovor
    Shimon Modi has been in the information security industry for over 10 years, Shimon received his Ph.D. from Purdue University with a focus on biometrics. Prior to joining Accenture, he managed the biometrics research program at Purdue University and also has consulted on large scale identity management projects for various clients. He currently leads the threat intelligence research in the labs.

Similar Presentations: