3.8 Proceedings Paper

Generating Fake Cyber Threat Intelligence Using Transformer-Based Models

出版社

IEEE
DOI: 10.1109/IJCNN52387.2021.9534192

关键词

Cybersecurity; Cyber Threat Intelligence; Artificial Intelligence; Data Poisoning Attack

资金

  1. U.S. Department of Defense
  2. National Science Foundation [2025685]
  3. Directorate for STEM Education
  4. Division Of Graduate Education [2025685] Funding Source: National Science Foundation

向作者/读者索取更多资源

This paper demonstrates the automatic generation of fake CTI text descriptions using transformers for data poisoning attacks. The attacks result in negative impacts such as incorrect reasoning outputs and disruption of AI-based cyber defense systems.
Cyber-defense systems are being developed to automatically ingest Cyber Threat Intelligence (CTI) that contains semi-structured data and/or text to populate knowledge graphs. A potential risk is that fake CTI can be generated and spread through Open-Source Intelligence (OSINT) communities or on the Web to effect a data poisoning attack on these systems. Adversaries can use fake CTI examples as training input to subvert cyber defense systems, forcing their models to learn incorrect inputs to serve the attackers' malicious needs. In this paper, we show how to automatically generate fake CTI text descriptions using transformers. Given an initial prompt sentence, a public language model like GPT-2 with fine-tuning can generate plausible CTI text that can mislead cyber-defense systems. We use the generated fake CTI text to perform a data poisoning attack on a Cybersecurity Knowledge Graph (CKG) and a cybersecurity corpus. The attack introduced adverse impacts such as returning incorrect reasoning outputs, representation poisoning, and corruption of other dependent AI-based cyber defense systems. We evaluate with traditional approaches and conduct a human evaluation study with cyber-security professionals and threat hunters. Based on the study, professional threat hunters were equally likely to consider our fake generated CTI and authentic CTI as true.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

3.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据