Open Source Intelligence For Malicious Behavior Discovery and Interpretation
Open Source Intelligence For Malicious Behavior Discovery and Interpretation
2, MARCH/APRIL 2022
Abstract—Cyber threats are one of the most pressing issues in the digital age. There has been a consensus on deploying a proactive
defense to effectively detect and respond to adversary threats. The key to success is understanding the characteristics of malware,
including their activities and manipulated resources on the target machines. The MITRE ATT&CK framework (ATT&CK), a popular
source of open source intelligence (OSINT), provides rich information and knowledge about adversary lifecycles and attack behaviors.
The main challenges of this study involve knowledge collection from ATT&CK, malicious behavior identification using deep learning,
and the identification of associated API calls. A MITRE ATT&CK based Malicious Behavior Analysis system (MAMBA) for Windows
malware is proposed, which incorporates ATT&CK knowledge and considers attentions on manipulated resources and malicious
activities in the neural network model. To synchronize ATT&CK updates in a timely manner, knowledge collection can be an automatic
and incremental process. Given these features, MAMBA achieves the best performance of malicious behavior discovery among all the
compared learning-based methods and rule-based approaches on all datasets; it also yields a highly interpretable mapping from the
discovered malicious behaviors to relevant ATT&CK techniques, as well as to the related API calls.
Index Terms—Cyber threat intelligence, dynamic analysis, malware behavior analysis, MITRE ATT&CK framework
1 INTRODUCTION derive a clear picture of the attack, and take the necessary
action to stop or mitigate the attack. The strength of ATT&CK,
attacks have proliferated recently, incurring dam-
C YBER
ages that cost individuals and companies dearly. A
powerful proactive defense collects information about
one of most popular OSINTs, is its structure and openness in
collecting and sharing cyber threat intelligence. In this study,
we crawl the contents of ATT&CK to build the needed knowl-
known attacks and comprehensively understands malicious
edge about malware behavior to facilitate dynamic malware
behaviors, and further exploits this knowledge to interdict
analysis via deep learning.
and disrupt attacks or preparations for attack [1], [2]. Thus
Information about adversaries is commonly published in
it is crucial to grasp the characteristics of malicious behavior
cyber threat intelligence (CTI) reports presented with seman-
and the resources used therein. Open source intelligence
tic descriptions and lists of manipulated resources. Compre-
(OSINT) assimilates experience and knowledge from the
hension of CTI is a large-scale data-driven process that
cybersecurity community to form a common knowledge
involves systematic analysis of observations, including mal-
base for cyber threat studies that best supports a proactive
ware, suspicious events, and other rapidly evolving cyberse-
defense [3].
curity data. To facilitate CTI usage, many studies [7], [8], [9],
The attack development life cycle, such as Lockheed
[10], [11] focus on collecting, analyzing, and extracting evi-
Martin’s cyber kill chain [4], the MITRE ATT&CK (Adversar-
dence such as indicators of compromise (IoCs) in CTI reports.
ial Tactics, Techniques and Common Knowledge) framework
Dealing with increasingly sophisticated cyber threats and
(hereafter referred to as ATT&CK) [5], and Mandiant’s adver-
obtaining a overall picture of the fast-evolving attack scenario
sary life cycle [6], describes the adversary process at each
from OSINT CTI helps cybersecurity analysts handle poten-
stage of the attack. Take for example ATT&CK: the frame-
tial attacks as they are unveiled.
work is designed to describe the attacker intent and malicious
Holmes [12] and RapSheet [13] are state-of-the-art sys-
behavior at each tactic stage. Once all malicious behaviors are
tems that apply manually crafted expert rules to discover
compiled, the cybersecurity analyst can correlate them to
advanced persistent threats or tactics, techniques, and pro-
cedures (TTPs) to detect potential attacks on their host sys-
Yi-Ting Huang, Kai-Chieh Lo, and Meng Chang Chen are with the tems. In this paper, instead of investigating a computer’s
Academia Sinica, Taipei 115024, Taiwan. E-mail: {ythuang, sage66730, system log, we focus on analyzing the dynamic behavior of
mcc}@iis.sinica.edu.tw. malware using the knowledge from ATT&CK and neural
Chi Yu Lin, Ying-Ren Guo, and Yeali S. Sun are with the National Taiwan networks.
University, Taipei 10617, Taiwan. E-mail: {r07946012, r09921a01,
sunny}@ntu.edu.tw. To analyze malware activity, dynamic analysis tools such
Manuscript received 28 Dec. 2020; revised 23 July 2021; accepted 26 Sept. 2021.
as Cuckoo Sandbox [14], CWSandbox [15], and APIf [16]
Date of publication 11 Oct. 2021; date of current version 14 Mar. 2022. record execution steps in detail to generate execution traces.
This work was supported in part by CITI, Academia Sinica, and by MOST Cuckoo Sandbox further applies ATT&CK with rules contrib-
under Grants 110-2218-E-001-001-MBK and 109-2221-E-001-010-MY3. uted by volunteers to detect malicious behavior. However,
(Corresponding author: Yi-Ting Huang.)
Recommended for acceptance by Special Issue on XAI-CTI. due to the crowd-sourced nature of Cuckoo Sandbox, the
Digital Object Identifier no. 10.1109/TDSC.2021.3119008 completeness and timeliness of the contributed rules (called
1545-5971 © 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See ht_tps://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: Dalian University of Technology. Downloaded on October 28,2023 at 15:39:05 UTC from IEEE Xplore. Restrictions apply.
HUANG ET AL.: OPEN SOURCE INTELLIGENCE FOR MALICIOUS BEHAVIOR DISCOVERY AND INTERPRETATION 777
TABLE 1
Regular Expressions for Resource Categories
y
Abbreviations C, F, L, R, P, and N represent category, file, library, registry, process, and network, respectively.
z
fd = directory, fn = filename, fe = extension, le = library extension, rk = root key, sk = subkey path, CLSID = class id, cmd = command, domain = domain name.
Authorized licensed use limited to: Dalian University of Technology. Downloaded on October 28,2023 at 15:39:05 UTC from IEEE Xplore. Restrictions apply.
780 IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 19, NO. 2, MARCH/APRIL 2022
TABLE 3
Comparison of Various Methods for TTP Discovery
y
p <0.05, z p <0.01, ? p <0.001.
Mann–Whitney U test is applied to compare the performance of MAMBA against that of each compared method.
an execution trace and used PCA (principle component as it ignores the semantics and structure of malware. To
analysis) [44] to reduce the dimensions of the execution sum up, MAMBA yields superior performance due to the
trace. For the traditional machine learning methods, the resource attention and group attention mechanisms as well
reduced API call sequences and associated TTPs were used as ATT&CK knowledge and resource embeddings.
as input, whereas for the conventional deep learning mod- For the second and third set of comparisons, first, the
els, MAMBA’s API call embeddings and associated TTPs agreement (Krippendorff’s a ¼ 0:120) [46] between
were used as input. Cuckoo Signatures and RegExp is low, which demonstrates
Evaluation 1 has 3 sets of comparisons using ATT&CK, the subjective nature of rule-based systems. Conventional
Cuckoo Signatures, and RegExp labels sequentially as rule-based approaches exhibit limited performance on TTP
ground truth for comparisons; the first set is used with the discovery, as shown in Table 3. Moreover, given sufficient
ATT&CK dataset, and the other two are used with the Big training data, learning-based approaches learn from latent
dataset. Table 3 compares various methods for TTP discov- information in the data, and yield better predictions using
ery in terms of precision (P), recall (R), F1 score, false positive the Big dataset than when using the ATT&CK dataset.
rate (FPR), and false negative rate (FNR), including the statis- When using these two labeling methods MAMBA achieves
tical significance level as per the Mann–Whitney U test [45] around 90% in terms of precision, recall, and F1 score, and
in comparison to MAMBA. MAMBA has significant perfor- produces a 0.6% false positive rate and a 6% false negative
mance differences with most of the compared methods. Both rate, which is the best performance of all the methods.
Cuckoo Signatures and RegExp perform poorly as the TTPs From Table 3, MAMBA outperforms in terms of preci-
cover only part of ATT&CK labels on the ATT&CK dataset; sion, recall, and F1 at 0.667, 0.569, and 0.591 respectively. To
as a result, they achieve F1 scores of 0.049 and 0.099 and false answer Q1, the result shows the ATT&CK labeling and
negative rates of 0.858 and 0.659. The five traditional dataset does provide useful knowledge to extract TTPs
machine learning methods perform slightly better than the from execution traces, but due to the limited number of mal-
rule-based approaches, with F1 scores ranging from 0.389 to ware samples and TTP labels, the resultant performance is
0.260, as they learn the relationship between API calls and moderate. For question Q2, we conclude that: 1) MAMBA
TTPs. The conventional neural networks learn from the accurately identifies TTPs compared to rule-based and other
embeddings of API calls, yielding high precision, i.e., 0.556, learning-based approaches on the Big dataset using both
0.461 and 0.552 for MLP, RNN, and LSTM, and relatively labeling methods. 2) Comparing the results on the ATT&CK
low false positive rates, i.e., 0.010, 0.009, and 0.006. Com- dataset against those on the Big dataset, given sufficient
pared to the deep learning models, MAMBA demonstrates samples and labels, MAMBA achieves high precision, recall,
significant improvements due to its preservation of resource and F1, attesting the efficacy of the MAMBA neural network
and group dependencies in the attention mechanism and its model.
utilization of resource and binding embeddings.
Take JCry as an example: as shown in Section 2.1, JCry is 4.4 Evaluation 2: Ablation Test
identified with six malicious behaviors: T1547.001, T1486, MAMBA includes knowledge from ATT&CK (binding
T1490, T1059.001, T1059.003, and T1059.005. Whereas the embeddings), group dependencies (group attention), and
MLP model correctly labels T1547.001 only, MAMBA addi- API calls (resource attention). We conducted an ablation
tionally identifies T1059.001 and T1059.003 because it makes study to understand the contributions of each component to
use of ATT&CK resource knowledge such as “powershell”, TTP identification using the RegExp labels on the Big dataset.
“-WindowStyle Hidden” and “cmd.exe” (see Section 4.6.2 for Table 4 shows that after the removal of one or two compo-
details). For the LSTM model, although it handles sequen- nents, MAMBA still performs well, and indeed demonstrates
tial data, it fails to identify any of JCry’s malicious behavior statistically significant improvements by the Mann–Whitney
Authorized licensed use limited to: Dalian University of Technology. Downloaded on October 28,2023 at 15:39:05 UTC from IEEE Xplore. Restrictions apply.
784 IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 19, NO. 2, MARCH/APRIL 2022
TABLE 4
Ablation Test Results on Big Dataset
P R F1
MAMBA 0.945 0.954 0.949
? ? ?
– group attention 0:942 0:935 0:938
– resource attention 0.911 0:920y 0:915y
?
– binding embedding 0:940 0.933 0.936
0:949z
? ?
– (resource + group attention) 0:925 0:936
? ? ?
– (binding embedding + group attention) 0:886 0:932 0:908
? ? ?
– (binding embedding + resource attention) 0:934 0:912 0:919
y
p <0.05, z p <0.01, ? p <0.001. Mann–Whitney U test is applied to compare
the performance of MAMBA against that of each compared method.
associated TTPs, but the concept of our approach is not lim- [3] R. Azevedo, I. Medeiros, and A. Bessani, “PURE: Generating qual-
ity threat intelligence by clustering and correlating OSINT,” in
ited to certain operating systems since malicious behaviors Proc. 18th IEEE Int. Conf. Trust Secur. Privacy Comput. Commun/
could be discovered by aligning the manipulated resources 13th IEEE Int. Conf. Big Data Sci. Eng., 2019, pp. 483–490.
to ATT&CK knowledge. [4] Lockheed Martin Corporation, “Gaining the advantage: Applying
When an adversary with knowledge of MAMBA regular cyber kill chain methodology to network defense,” 2015.
[Online]. Available: https://www.lockheedmartin.com/content/
expressions creates new malware variants to avoid TTP dis-
dam/lockheed-martin/rms/documents/cyber/Gaining_the_Ad-
covery, there are two ways that MAMBA could still recog- vantage_Cyber_Kill_Chain.pdf
nize the technique. First, besides extracting knowledge [5] B. E. Strom, A. Applebaum, D. P. Miller, K. C. Nickels, A. G. Pen-
directly from ATT&CK, MAMBA can learn malicious nington, and C. B. Thomas, “MITRE ATT&CK: Design and phil-
osophy,” 2018. [Online]. Available: https://www.mitre.org/sites/
behaviors from malware execution traces. For example, the
default/files/publications/pr-18-0944-11-mitre-attack-design-
TTP T1070.004 File Deletion contains ten resources, including and-philosophy.pdf
the command “rm -rf”, on ATT&CK. Malware sample [6] A. Mandiant, “Exposing one of China’s cyber espionage uni-
MD5 cd1c95aa6f45101735d444aeb447225c does not use ts,” 2013. Accessed: Aug. 24, 2020. [Online]. Available: http://
intelreport.mandiant.com/Mandiant_APT1_Report.pdf
any extracted resource appearing on ATT&CK such as “rm [7] G. Husari, E. Al-Shaer, M. Ahmed, B. Chu, and X. Niu,
-rf”, but implements the technique with an API call, “TTPDRILL: Automatic and accurate extraction of threat actions
“DeleteFileW”. In this case MAMBA still identifies the TTP from unstructured text of CTI sources,” in Proc. 33rd Annu. Com-
T1070.004 File Deletion by learning the association between put. Secur. Appl. Conf., 2017, pp. 103–115.
[8] G. Husari, X. Niu, B. Chu, and E. Al-Shaer , “Using entropy and
“rm -rf” and “DeleteFileW” from data. This shows MAMBA
mutual information to extract threat actions from cyber threat
can learn the relationship between TTPs and API calls from intelligence,” in Proc. IEEE Int. Conf. Intell. Secur. Inform., 2018,
execution traces. Second, we leverage the fact that open- pp. 1–6.
source intelligence reports are constantly updated. When an [9] S. Zhou, Z. Long, L. Tan, and H. Guo, “Automatic identification of
indicators of compromise using neural-based sequence labelling,”
additional resource is used to implement a technique,
in Proc. 32nd Pacific Asia Conf. Lang. Inf. Comput., 2018.
OSINT knowledge (e.g., ATT&CK) may be updated accord- [10] Z. Zhu and T. Dumitras, “ChainSmith: Automatically learning
ingly. For example, resource powershell.exe -windowstyle hid- the semantics of malicious campaigns by mining threat intelli-
den -exec bypass -file ”%appdata%\onedrive.ps1” used to gence reports,” in Proc. IEEE Eur. Symp. Secur. Privacy, 2018,
implement TTP T1059.001 Command and Scripting Interpreter: pp. 458–472.
[11] Y. Gao, X. LI, H. PENG, B. Fang, and P. Yu, “HinCTI: A Cyber
PowerShell is not available in version 61 but is in version 72. threat intelligence modeling and identification system based on
Given the latest version of ATT&CK, MAMBA can keep up heterogeneous information network,” IEEE Trans. Knowl. Data
with the behavior of JCry. To summarize, MAMBA can still Eng., 2020, doi: 10.1109/TKDE.2020.2987019.
[12] S. M. Milajerdi, R. Gjomemo, B. Eshete, R. Sekar, and V. N. Venka-
discover malicious behavior of new malware variants by takrishnan, “HOLMES: Real-time APT detection through correla-
not only learning from data but also from the up-to-date tion of suspicious information flows,” in Proc. IEEE Symp. Secur.
CTI knowledge. Detecting adversarial examples in malware Privacy, 2019, pp. 1137–1152.
analysis, such as [64] and [65], remains an active research [13] W. U. Hassan, A. Bates, and D. Marino, “Tactical provenance
analysis for endpoint detection and response systems,” in Proc.
area in which MAMBA has room to improve. IEEE Symp. Secur. Privacy, 2020, pp. 1172–1189.
This is the first attempt to leverage the knowledge col- [14] Cuckoo Sandbox. [Online]. Available: https://cuckoosandbox.org/
lected from OSINTs in deep learning analysis of malicious [15] The Sandbox. [Online]. Available: https://cwsandbox.org/
[16] S.-W. Hsiao, Y. S. Sun, and M. C. Chen, “Hardware-assisted MMU
behavior. Still, MAMBA has several drawbacks. For instance, redirection for in-guest monitoring and API profiling,” IEEE
some discovered TTPs cannot be explained and some TTPs Trans. Inf. Forensics Security, vol. 15, pp. 2402–2416, Jan. 2020.
cannot be found. One reason for these limitations is insuffi- [17] Q. Wang et al., “You are what you do: Hunting stealthy malware
cient or imbalanced annotated resources on the MITRE web- via data provenance analysis,” in Proc. Symp. Netw. Distrib. Syst.
Secur., 2020, doi: 10.14722/ndss.2020.24167.
site [62]. In future work, we plan to enrich the knowledge [18] J. Xu, Y. Li, R. Deng, and K. Xu, “SDAC: A slow-aging solution for
associated with TTPs via data augmentation or by adopting android malware detection using semantic distance based API
more OSINTs. On the other hand, we observed that the clustering,” IEEE Trans. Dependable Secure Comput., 2020, doi:
results on the attention distribution in our case study indi- 10.1109/TDSC.2020.3005088}.
[19] M. Mimura and H. Tanaka, “Heavy log reader: Learning the con-
cate only a human-understandable explanation and do not text of cyber attacks automatically with paragraph vector,” in
reflect the model’s actual reasoning process for the model’s Proc. Int. Conf. Inf. Syst. Secur., 2017, pp. 146–163.
outcome [66]. Another direction of future work is to improve [20] Y. Shen and G. Stringhini, “ATTACK2VEC: Leveraging temporal
word embeddings to understand the evolution of cyberattacks,”
the faithfulness of attention-based explanations for mali- in Proc. 28th USENIX Conf. Secur. Symp., 2019, pp. 905–921.
cious behavior discovery, such as in [67]. [21] R. Guidotti, A. Monreale, S. Ruggieri, F. Turini, F. Giannotti, and
D. Pedreschi, “A survey of methods for explaining black box mod-
els,” ACM Comput. Surv., vol. 51, no. 5, pp. 1–42, 2018.
REFERENCES [22] K. Xu et al.“Show, attend and tell: Neural image caption genera-
[1] Executive Office of the President, “Artificial Intelligence, Automa- tion with visual attention,” in Proc. Int. Conf. Mach. Learn., 2015,
tion, and the Economy,” 2016. [Online]. Available: https://oba- pp. 2048–2057.
mawhitehouse.archives.gov/sites/whitehouse.gov/files/docu- [23] J. Li, W. Monroe, and D. Jurafsky, “Understanding neural net-
ments/Artificial-Intelligence-Automation-Economy.PDF works through representation erasure,” 2017, arXiv:1612.08220.
[2] N. Kaloudi and J. Li, “The AI-based cyber threat landscape: A [24] E. Choi, M. T. Bahadori, J. A. Kulas, A. Schuetz, W. F. Stewart, and
survey,” ACM Comput. Surv., vol. 53, no. 1, pp. 1–34, 2020. J. Sun, “RETAIN: An interpretable predictive model for healthcare
using reverse time attention mechanism,” in Proc. 30th Int. Conf.
Neural Inf. Process. Syst., 2016, pp. 3512–3520.
[25] K. Rieck, T. Holz, C. Willems, P. D€ ussel, and P. Laskov,
“Learning and classification of malware behavior,” in Proc. Int.
1. https://attack.mitre.org/versions/v6/techniques/T1086/ Conf. Detection Intrusions Malware Vulnerability Assessment, 2008,
2. https://attack.mitre.org/versions/v7/techniques/T1059/001/ pp. 108–125.
Authorized licensed use limited to: Dalian University of Technology. Downloaded on October 28,2023 at 15:39:05 UTC from IEEE Xplore. Restrictions apply.
788 IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 19, NO. 2, MARCH/APRIL 2022
[26] U. Bayer, P. M. Comparetti, C. Hlauschek, C. Kruegel, and E. Kirda, [53] W. Tounsi and H. Rais, “A survey on technical threat intelligence
“Scalable, behavior-based malware clustering,” in Proc. Netw. Dis- in the age of sophisticated cyber attacks,” Comput. Secur., vol. 72,
trib. Syst. Secur. Symp., 2009, pp. 8–11. no. C, pp. 212–233, 2018.
[27] T. W€ uchner, A. Cis»ak, M. Ochoa, and A. Pretschner, “Leveraging [54] S. Qamar, Z. Anwar, M. A. Rahman, E. Al-Shaer, and B.-T. Chu,
compression-based graph mining for behavior-based malware “Data-driven analytics for cyber-threat intelligence and informa-
detection,” IEEE Trans. Dependable Secure Comput., vol. 16, no. 1, tion sharing,” Comput. Secur., vol. 100, no. 67, pp. 35–58, 2017.
pp. 99–112, Jan./Feb. 2017. [55] T. D. Wagner, K. Mahbub, E. Palomar, and A. E. Abdallah, “Cyber
[28] JCry. [Online]. Available: https://attack.mitre.org/software/S0389/ threat intelligence sharing: Survey and research directions,” Com-
[29] S. L. Lee, “CB TAU threat intelligence notification: JCry ransom- put. Secur., vol. 87, 2019, Art. no. 101589.
ware pretends to be adobe flash player update installer.” [Online]. [56] I. Vacas, I. Medeiros, and N. Neves, “Detecting network threats
Available: https://www.carbonblack.com/blog/cb-tau-threat- using OSINT knowledge-based IDS,” in Proc. 14th Eur. Dependable
intelligence-notification-jcry-ransomware-pretends- to-be-adobe- Comput. Conf., 2018, pp. 128–135.
flash-player-update-installer/ [57] Y. Li, W. Dai, J. Bai, X. Gan, J. Wang, and X. Wang, “An intelli-
[30] K. Oosthoek and C. Doerr, “SoK: ATT&CK techniques and trends gence-driven security-aware defense mechanism for advanced
in windows malware,” in Proc. Int. Conf. Secur. Privacy Commun. persistent threats,” IEEE Trans. Inf. Forensics Security, vol. 14, no. 3,
Syst., 2019, pp. 406–425. pp. 646–661, Mar. 2019.
[31] A. J. Viera et al., “Understanding interobserver agreement: The [58] A. Saracino, D. Sgandurra, G. Dini, and F. Martinelli, “MADAM:
kappa statistic,” Family Med., vol. 37, no. 5, pp. 360–363, 2005. Effective and efficient behavior-based android malware detection
[32] B. S. Everitt, The Analysis of Contingency Tables. London, U.K./Boca and prevention,” IEEE Trans. Dependable Secure Comput., vol. 15,
Raton, FL, USA: Chapman and Hall/CRC, 2019. no. 1, pp. 83–97, Jan./Feb. 2018.
[33] Q. Le and T. Mikolov, “Distributed representations of sentences and [59] M. Christodorescu, S. Jha, and C. Kruegel, “Mining specifications
documents,” in Proc. Int. Conf. Mach. Learn., 2014, pp. 1188–1196. of malicious behavior,” in Proc. 6th Joint Meeting Eur. Softw. Eng.
[34] J. Chung, C. Gulcehre, K. Cho, and Y. Bengio, “Empirical evalua- Conf. ACM Symp. Found. Softw. Eng., 2007, pp. 5–14.
tion of gated recurrent neural networks on sequence modeling,” [60] M. Fredrikson, S. Jha, M. Christodorescu, R. Sailer, and X. Yan,
in Proc. NIPS Workshop Deep Learn., 2014. “Synthesizing near-optimal malware specifications from suspicious
[35] B. Athiwaratkun and J. W. Stokes, “Malware classification with behaviors,” in Proc. IEEE Symp. Secur. Privacy, 2010, pp. 45–60.
LSTM and GRU language models and a character-level CNN,” in [61] S. Palahan, D. Babic, S. Chaudhuri, and D. Kifer, “Extraction of
Proc. IEEE Int. Conf. Acoust. Speech Signal Process., 2017, pp. 2482–2486. statistically significant malware behaviors,” in Proc. 29th Annu.
[36] H. Zhou, X. Yang, H. Pan, and W. Guo, “An android malware Comput. Secur. Appl. Conf., 2013, pp. 69–78.
detection approach based on SIMGRU,” IEEE Access, vol. 8, [62] V. Legoy, M. Caselli, C. Seifert, and A. Peter, “Automated
pp. 148404–148410, 2020. retrieval of ATT&CK tactics and techniques for cyber threat
[37] MalShare. [Online]. Available: https://malshare.com/ reports,” 2020, arXiv:2004.14322.
[38] VirusTotal. [Online]. Available: https://www.virustotal.com/ [63] R. Al-Shaer, J. M. Spring, and E. Christou, “Learning the associations
[39] GenSim. Doc2vec paragraph embeddings. [Online]. Available: of MITRE ATT&CK adversarial techniques,” in Proc. IEEE Conf. Com-
https://radimrehurek.com/gensim/models/doc2vec.html mun. Netw. Sec., 2020, pp. 1–9, doi: 10.1109/CNS48642.2020.9162207.
[40] F. Pedregosa et al.“Scikit-learn: Machine learning in Python,” J. [64] A. Al-Dujaili, A. Huang, E. Hemberg, and U.-M. OReilly ,
Mach. Learn. Res., vol. 12, pp. 2825–2830, 2011. “Adversarial deep learning for robust detection of binary encoded
[41] G. E. Dahl, J. W. Stokes, L. Deng, and D. Yu, “Large-scale mal- malware,” in Proc. IEEE Secur. Privacy Workshops, 2018, pp. 76–82.
ware classification using random projections and neural [65] H. Li, S. Zhou, W. Yuan, X. Luo, C. Gao, and S. Chen, “Robust
networks,” in Proc. IEEE Int. Conf. Acoust. Speech Signal Process., android malware detection against adversarial example attacks,”
2013, pp. 3422–3426. in Proc. Web Conf., 2021, pp. 3603–3612.
[42] R. Pascanu, J. W. Stokes, H. Sanossian, M. Marinescu, and A. [66] S. Wiegreffe and Y. Pinter, “Attention is not not explanation,” in
Thomas, “Malware classification with recurrent networks,” in Proc. Proc. Conf. Empir. Methods Natural Lang. Process. 9th Int. Joint Conf.
IEEE Int. Conf. Acoust. Speech Signal Process., 2015, pp. 1916–1920. Natural Lang. Process., 2019, pp. 11–20.
[43] K. Sethi, R. Kumar, L. Sethi, P. Bera, and P. K. Patra, “A novel [67] G. Chrysostomou and N. Aletras, “Improving the faithfulness of
machine learning based malware detection and classification attention-based explanations with task-specific information for
framework,” in Proc. Int. Conf. Cyber Secur. Protection Digit. Serv- text classification,” in Proc. 59th Ann. Meeting Assoc. Comput. Lin-
ices, 2019, pp. 1–4. guistics 11th Int. Joint Conf. Natural Language Process. (Volume 1:
[44] I. Jolliffe, “Principal component analysis,” Technometrics, vol. 45, Long Papers, 2021, pp. 477–488. [Online]. Available: https://aclan-
no. 3, 2003, Art. no. 276. thology.org/2021.acl-long.40, doi: 10.18653/v1/2021.acl-long.40.
[45] H. B. Mann and D. R. Whitney, “On a test of whether one of two
random variables is stochastically larger than the other,” Ann.
Math. Statist., vol. 18, no. 1, pp. 50–60, 1947. Yi-Ting Huang received the PhD degree in
[46] K. Krippendorff, “Reliability in content analysis: Some common information management from National Taiwan
misconceptions and recommendations,” Hum. Commun. Res., University, Taipei, Taiwan, in 2015, and is now a
vol. 30, no. 3, pp. 411–433, 2004.
postdoctoral fellow with the Institute of Informa-
[47] APT29 Group. [Online]. Available: https://attack.mitre.org/ tion Science, Academia Sinica. Her research
groups/G0016/ interests include malware analysis, deep learn-
[48] APT29 Emulation - Enterprise Evaluation, 2019. [Online]. Available: ing, and natural language processing in educa-
https://attackevals.mitre-engenuity.org/APT29/ tional applications.
[49] F-Secure Labs., “The Dukes: 7 years of Russian cyberespionage,”
Retrieved Aug., 2015. [Online]. Available: https://blog-assets.f-
secure.com/wp-content/uploads/2020/03/18122307/F-Secure_-
Dukes_Whitepaper.pdf
[50] S. Adair, “PowerDuke: widespread post-election spear phishing
campaigns targeting think tanks and NGOs.” 2016. [Online]. Chi Yu Lin is currently working toward the mas-
Available: https://www.volexity.com/blog/2016/11/09/ ter’s degree in the Data Science Degree Program,
powerduke-post-election-spear-phishing-campaigns-targeting- National Taiwan University, Taipei, Taiwan, and
think-tanks-and-ngos/ Academia Sinica, Taipei, Taiwan, devoted to res-
[51] M. Faou, M. Tartare, and T. Dupuy, “ESET research White earch methods in data mining, deep learning, and
papers: Operation ghost. The Dukes aren’t back – they never cybersecurity.
left.” 2019. [Online]. Available: https://www.welivesecurity.com/
wp-content/uploads/2019/10/ESET_Operation_Ghost_Dukes.pdf
[52] J. Pastor-Galindo, P. Nespoli, F. G. Marmol, and G. M. Perez, “The
not yet exploited goldmine of OSINT: Opportunities, open chal-
lenges and future trends,” IEEE Access, vol. 8, pp. 10282–10304, 2020.
Authorized licensed use limited to: Dalian University of Technology. Downloaded on October 28,2023 at 15:39:05 UTC from IEEE Xplore. Restrictions apply.
HUANG ET AL.: OPEN SOURCE INTELLIGENCE FOR MALICIOUS BEHAVIOR DISCOVERY AND INTERPRETATION 789
Ying-Ren Guo is currently working toward the Yeali S. Sun received the BS degree from the
master’s degree in the Department of Electrical Computer Science and Information Engineering
Engineering: Master Program of Cybersecurity, Department, National Taiwan University, Taipei,
National Taiwan University, Taipei, Taiwan. His Taiwan, and the MS and PhD degrees in com-
research interests include malware reverse engi- puter science from the University of California,
neering and analysis, and cybersecurity. Los Angeles (UCLA), Los Angeles, California, in
1984 and 1988, respectively. From 1988 to 1993,
she was with Bell Communications Research Inc.
In August 1993, she jointed National Taiwan Uni-
versity and is currently a professor with the
Department of Information Management. Her
research interests include Internet security and forensics, quality of ser-
Kai-Chieh Lo received the graduate (MS pro- vice (QoS), cloud computing and services, and performance modeling
gram) degree in computer science from the and evaluation.
National Tsing Hua University, Hsinchu, Taiwan,
in 2019. He is currently a research assistant with
Academia Sinica. His research interests include Meng Chang Chen received the PhD degree
image processing and information security with in computer science from the University of
deep learning. California, Los Angeles, California, in 1989. He
was with AT&T Bell Labs and currently he is a
research fellow/professor with the Institute of
Information Science, Academia Sinica, Taiwan.
His research interests include computer and net-
work security, wireless network, deep learning for
complicated applications, data and knowledge
engineering.
Authorized licensed use limited to: Dalian University of Technology. Downloaded on October 28,2023 at 15:39:05 UTC from IEEE Xplore. Restrictions apply.