LLMCloudHunter: Harnessing LLMs for Automated Extraction of Detection Rules from Cloud-Based CTI

Read original: arXiv:2407.05194 - Published 7/9/2024 by Yuval Schwartz, Lavi Benshimol, Dudu Mimran, Yuval Elovici, Asaf Shabtai
Total Score

0

LLMCloudHunter: Harnessing LLMs for Automated Extraction of Detection Rules from Cloud-Based CTI

Sign in to get full access

or

If you already have an account, we'll log you in

Overview

• This paper presents LLMCloudHunter, a system that uses large language models (LLMs) to automate the extraction of detection rules from cloud-based cyber threat intelligence (CTI).

• The system aims to address the challenge of manually curating and maintaining detection rules, which can be time-consuming and error-prone.

Plain English Explanation

LLMCloudHunter is a tool that uses advanced AI models, called large language models (LLMs), to automatically extract valuable information from data about cyber threats. The goal is to make it easier and faster for security teams to create rules that can detect and prevent these threats.

Cyber threat intelligence (CTI) is information about the latest cyber threats, such as hacking techniques or malware. This information is often scattered across different sources, like security blogs or government reports. Actionable Cyber Threat Intelligence Using Knowledge Graphs and X-Lifecycle: Learning Cloud Incident Management Using have explored ways to make this CTI more useful.

However, turning this raw CTI data into practical security rules that can be deployed in a company's systems is still a manual and time-consuming process. LLMCloudHunter aims to automate this task by using powerful LLMs to read through the CTI data, identify key information, and generate the appropriate security rules. This could save security teams a lot of effort and help them keep up with the constantly evolving cyber threat landscape.

Technical Explanation

The LLMCloudHunter system leverages large language models (LLMs) to automate the extraction of detection rules from cloud-based cyber threat intelligence (CTI) sources. LLMs are AI models that are trained on vast amounts of text data, allowing them to understand and generate human-like language.

The key components of the LLMCloudHunter system include:

  1. CTI Data Aggregation: The system collects CTI data from various cloud-based sources, such as security blogs, threat intelligence platforms, and government reports.

  2. LLM-based Rule Extraction: An LLM model is used to analyze the CTI data and identify relevant indicators, techniques, and mitigation strategies. The LLM then generates draft detection rules based on this information.

  3. Rule Refinement and Deployment: The extracted detection rules are further refined, tested, and packaged for deployment in the organization's security infrastructure.

The researchers evaluate the performance of LLMCloudHunter on a benchmark dataset, CTIBench, and compare it to human-curated detection rules. The results demonstrate the effectiveness of the LLM-based approach in automating the extraction of high-quality detection rules.

Critical Analysis

The LLMCloudHunter system addresses an important challenge in the field of cybersecurity - the need to efficiently curate and maintain detection rules based on the ever-evolving cyber threat landscape. By leveraging the power of large language models, the system automates a task that has traditionally been labor-intensive and error-prone when done manually.

One potential limitation of the approach is the reliance on the quality and coverage of the CTI data sources. If the input data is incomplete or biased, the generated detection rules may not be fully comprehensive. Additionally, while the researchers demonstrate the effectiveness of the LLM-based approach, there may be some edge cases or complex situations where human expertise is still necessary to refine the detection rules.

Further research could explore ways to improve the robustness and adaptability of the LLM-based rule extraction, such as incorporating techniques from Evaluation of LLM Chatbots for OSINT-based Cyber Threat or Automated Clinical Data Extraction with Knowledge-Conditioned LLMs. Additionally, the system could be enhanced to provide more contextual information and justifications for the generated detection rules, improving the trust and understanding of security teams.

Conclusion

The LLMCloudHunter system represents a promising approach to addressing the challenge of manually curating and maintaining detection rules for cloud-based cyber threats. By harnessing the power of large language models, the system can automate a time-consuming and error-prone task, freeing up security teams to focus on other critical aspects of their work.

As the cybersecurity landscape continues to evolve, tools like LLMCloudHunter will be essential for helping organizations stay ahead of the curve and protect their systems and data from emerging threats. The research presented in this paper lays the groundwork for further advancements in this area, with the potential to significantly improve the efficiency and effectiveness of cybersecurity operations.



This summary was produced with help from an AI and may contain inaccuracies - check out the links to read the original source documents!

Follow @aimodelsfyi on 𝕏 →

Related Papers

LLMCloudHunter: Harnessing LLMs for Automated Extraction of Detection Rules from Cloud-Based CTI
Total Score

0

LLMCloudHunter: Harnessing LLMs for Automated Extraction of Detection Rules from Cloud-Based CTI

Yuval Schwartz, Lavi Benshimol, Dudu Mimran, Yuval Elovici, Asaf Shabtai

As the number and sophistication of cyber attacks have increased, threat hunting has become a critical aspect of active security, enabling proactive detection and mitigation of threats before they cause significant harm. Open-source cyber threat intelligence (OS-CTI) is a valuable resource for threat hunters, however, it often comes in unstructured formats that require further manual analysis. Previous studies aimed at automating OSCTI analysis are limited since (1) they failed to provide actionable outputs, (2) they did not take advantage of images present in OSCTI sources, and (3) they focused on on-premises environments, overlooking the growing importance of cloud environments. To address these gaps, we propose LLMCloudHunter, a novel framework that leverages large language models (LLMs) to automatically generate generic-signature detection rule candidates from textual and visual OSCTI data. We evaluated the quality of the rules generated by the proposed framework using 12 annotated real-world cloud threat reports. The results show that our framework achieved a precision of 92% and recall of 98% for the task of accurately extracting API calls made by the threat actor and a precision of 99% with a recall of 98% for IoCs. Additionally, 99.18% of the generated detection rule candidates were successfully compiled and converted into Splunk queries.

Read more

7/9/2024

Actionable Cyber Threat Intelligence using Knowledge Graphs and Large Language Models
Total Score

0

Actionable Cyber Threat Intelligence using Knowledge Graphs and Large Language Models

Romy Fieblinger, Md Tanvirul Alam, Nidhi Rastogi

Cyber threats are constantly evolving. Extracting actionable insights from unstructured Cyber Threat Intelligence (CTI) data is essential to guide cybersecurity decisions. Increasingly, organizations like Microsoft, Trend Micro, and CrowdStrike are using generative AI to facilitate CTI extraction. This paper addresses the challenge of automating the extraction of actionable CTI using advancements in Large Language Models (LLMs) and Knowledge Graphs (KGs). We explore the application of state-of-the-art open-source LLMs, including the Llama 2 series, Mistral 7B Instruct, and Zephyr for extracting meaningful triples from CTI texts. Our methodology evaluates techniques such as prompt engineering, the guidance framework, and fine-tuning to optimize information extraction and structuring. The extracted data is then utilized to construct a KG, offering a structured and queryable representation of threat intelligence. Experimental results demonstrate the effectiveness of our approach in extracting relevant information, with guidance and fine-tuning showing superior performance over prompt engineering. However, while our methods prove effective in small-scale tests, applying LLMs to large-scale data for KG construction and Link Prediction presents ongoing challenges.

Read more

7/4/2024

💬

Total Score

0

The Use of Large Language Models (LLM) for Cyber Threat Intelligence (CTI) in Cybercrime Forums

Vanessa Clairoux-Trepanier, Isa-May Beauchamp, Estelle Ruellan, Masarah Paquet-Clouston, Serge-Olivier Paquette, Eric Clay

Large language models (LLMs) can be used to analyze cyber threat intelligence (CTI) data from cybercrime forums, which contain extensive information and key discussions about emerging cyber threats. However, to date, the level of accuracy and efficiency of LLMs for such critical tasks has yet to be thoroughly evaluated. Hence, this study assesses the accuracy of an LLM system built on the OpenAI GPT-3.5-turbo model [7] to extract CTI information. To do so, a random sample of 500 daily conversations from three cybercrime forums, XSS, Exploit_in, and RAMP, was extracted, and the LLM system was instructed to summarize the conversations and code 10 key CTI variables, such as whether a large organization and/or a critical infrastructure is being targeted. Then, two coders reviewed each conversation and evaluated whether the information extracted by the LLM was accurate. The LLM system performed strikingly well, with an average accuracy score of 98%. Various ways to enhance the model were uncovered, such as the need to help the LLM distinguish between stories and past events, as well as being careful with verb tenses in prompts. Nevertheless, the results of this study highlight the efficiency and relevance of using LLMs for cyber threat intelligence.

Read more

8/9/2024

X-lifecycle Learning for Cloud Incident Management using LLMs
Total Score

0

X-lifecycle Learning for Cloud Incident Management using LLMs

Drishti Goel, Fiza Husain, Aditya Singh, Supriyo Ghosh, Anjaly Parayil, Chetan Bansal, Xuchao Zhang, Saravan Rajmohan

Incident management for large cloud services is a complex and tedious process and requires significant amount of manual efforts from on-call engineers (OCEs). OCEs typically leverage data from different stages of the software development lifecycle [SDLC] (e.g., codes, configuration, monitor data, service properties, service dependencies, trouble-shooting documents, etc.) to generate insights for detection, root causing and mitigating of incidents. Recent advancements in large language models [LLMs] (e.g., ChatGPT, GPT-4, Gemini) created opportunities to automatically generate contextual recommendations to the OCEs assisting them to quickly identify and mitigate critical issues. However, existing research typically takes a silo-ed view for solving a certain task in incident management by leveraging data from a single stage of SDLC. In this paper, we demonstrate that augmenting additional contextual data from different stages of SDLC improves the performance of two critically important and practically challenging tasks: (1) automatically generating root cause recommendations for dependency failure related incidents, and (2) identifying ontology of service monitors used for automatically detecting incidents. By leveraging 353 incident and 260 monitor dataset from Microsoft, we demonstrate that augmenting contextual information from different stages of the SDLC improves the performance over State-of-The-Art methods.

Read more

4/8/2024