ESE: A Tool for Enhanced STIX Elevation

Tianqiao Zhao, Bryan Beckman, Meng Yue, Rita Foster
{"title":"ESE: A Tool for Enhanced STIX Elevation","authors":"Tianqiao Zhao, Bryan Beckman, Meng Yue, Rita Foster","doi":"10.1109/RWS55399.2022.9984039","DOIUrl":null,"url":null,"abstract":"Structured Threat Information eXpression (STIX) language has been widely used to automate the sharing of cyber threat information (CTI) across s intelligence communities. There are different versions, i.e., STIX 1.x and 2.x., while STIX 2.x is gaining more popularity. There is a strong need to convert the existing, well-developed STIX 1.x (in XML format) files to STIX 2.x (in JSON format) files using, e.g., tools such as cti-stix-elevator. Despite the success and usefulness of such STIX elevation tools, one of the major issues is that the many objects and relationships defined in XML serializations are not converted properly. This has been a major barrier to information sharing based on the well-developed XML files. The manual effort, a tedious and time-consuming process, is the only option for fixing the missing relationships in the converted JSON files. To facilitate information sharing, we propose to design an automated tool to enhance the elevation by fixing the missing objects and relationship/sighting objects during the conversion process. This automated tool is developed by taking advantage of two open-source tools, namely Python-STIX and Python-STIX2, which provide a set of APIs to work with XML and JSON files. The tool, enhanced STIX elevation or ESE, is implemented by detecting the missing relationship/sighting objects in JSON files and extracting relationship information directly from XML files for creating the missing relationship/sighting objects in JSON. The performance of the ESE is demonstrated via case studies of two malware cases.","PeriodicalId":170769,"journal":{"name":"2022 Resilience Week (RWS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 Resilience Week (RWS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RWS55399.2022.9984039","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Structured Threat Information eXpression (STIX) language has been widely used to automate the sharing of cyber threat information (CTI) across s intelligence communities. There are different versions, i.e., STIX 1.x and 2.x., while STIX 2.x is gaining more popularity. There is a strong need to convert the existing, well-developed STIX 1.x (in XML format) files to STIX 2.x (in JSON format) files using, e.g., tools such as cti-stix-elevator. Despite the success and usefulness of such STIX elevation tools, one of the major issues is that the many objects and relationships defined in XML serializations are not converted properly. This has been a major barrier to information sharing based on the well-developed XML files. The manual effort, a tedious and time-consuming process, is the only option for fixing the missing relationships in the converted JSON files. To facilitate information sharing, we propose to design an automated tool to enhance the elevation by fixing the missing objects and relationship/sighting objects during the conversion process. This automated tool is developed by taking advantage of two open-source tools, namely Python-STIX and Python-STIX2, which provide a set of APIs to work with XML and JSON files. The tool, enhanced STIX elevation or ESE, is implemented by detecting the missing relationship/sighting objects in JSON files and extracting relationship information directly from XML files for creating the missing relationship/sighting objects in JSON. The performance of the ESE is demonstrated via case studies of two malware cases.
ESE:一个增强STIX标高的工具
结构化威胁信息表达(STIX)语言被广泛用于网络威胁信息的自动化共享。有不同的版本,例如STIX 1。X和2。,而STIX 2。X越来越受欢迎。迫切需要改造现有的、发展良好的STIX - 1。x (XML格式)文件到stix2。使用诸如cgi -stix-elevator. x (JSON格式)之类的工具。尽管此类STIX提升工具取得了成功,也很有用,但主要问题之一是XML序列化中定义的许多对象和关系没有得到正确转换。这是基于开发良好的XML文件共享信息的主要障碍。手工工作是一个冗长而耗时的过程,是修复转换后的JSON文件中缺失关系的唯一选择。为了便于信息共享,我们建议设计一个自动化的工具,通过在转换过程中固定缺失的物体和关系/瞄准物体来增强高程。这个自动化工具是利用两个开源工具开发的,即Python-STIX和Python-STIX2,它们提供了一组用于处理XML和JSON文件的api。该工具是增强的STIX elevation或ESE,通过检测JSON文件中缺失的关系/观察对象,并直接从XML文件中提取关系信息,以在JSON中创建缺失的关系/观察对象来实现。通过两个恶意软件案例的案例研究证明了ESE的性能。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信