2023
DOI: 10.1016/j.future.2023.02.012
|View full text |Cite
|
Sign up to set email alerts
|

The Rise of GoodFATR: A Novel Accuracy Comparison Methodology for Indicator Extraction Tools

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
3
0
2

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 16 publications
0
3
0
2
Order By: Relevance
“…Around 39,139 SM posts were web scrapped from January 2018 till March 2021. The data was extracted using the scrapping library of Python named, Selenium and Beautiful Soup (Caballero et al ., 2023). We were able to access public data from the official Facebook pages of the identified firms.…”
Section: Methodsmentioning
confidence: 99%
“…Around 39,139 SM posts were web scrapped from January 2018 till March 2021. The data was extracted using the scrapping library of Python named, Selenium and Beautiful Soup (Caballero et al ., 2023). We were able to access public data from the official Facebook pages of the identified firms.…”
Section: Methodsmentioning
confidence: 99%
“…Os resultados foram positivos, porém os autores relataram vários desafios relacionados ao rastreamento e extrac ¸ão de ToIs relevantes. [Caballero et al 2023], apresentaram uma plataforma para extrair IoCs de seis diferentes fontes: Blogs RSS, Twitter e Telegram, bem como Malpedia, APTnotes e ChainSmith, que são repositórios de projetos relacionados à seguranc ¸a cibernética. Além de terem desenvolvido a ferramenta de extrac ¸ão de IoCs, os autores relataram que fizeram uma análise para avaliar a precisão de outras 7 ferramentas de extrac ¸ão de IoCs.…”
Section: Trabalhos Relacionadosunclassified
“…Com relac ¸ão à análise e extrac ¸ão de IoCs, [Niakanlahiji et al 2019] investigam a existência de IoCs no Twitter, enquanto que [Zhang et al 2019] extraem IoCs realizando buscas na Surface Web, usando como entrada indicadores como domínios e enderec ¸os IP que tenham sido considerados suspeitos de acordo com informac ¸ões de ameac ¸as de código aberto. Por sua vez, [Caballero et al 2023] direcionam seus esforc ¸os para extrair IoCs de seis diferentes fontes: Blogs RSS, Twitter e Telegram, bem como Malpedia, APTnotes e ChainSmith, que são repositórios de projetos relacionados à seguranc ¸a cibernética. No entanto, nenhuma dessas investigac ¸ões sobre IoCs foram conduzidas na Dark Web.…”
Section: Introduc ¸ãOunclassified
“…However, these regular expressions alone are not sufficient for security reports. We found, by examining a small sample set of 50 security reports that 13 of them included so-called defanged IoCs [48]. By defanging an IoC, writers of security texts try to prevent signature-based security solutions from detecting reports themselves as malicious.…”
Section: Tokenizationmentioning
confidence: 99%
“…However, this also means that to detect IoCs, we must deal with defanged IoCs as well. We use the fangs identified by Good-FATR [48]: encapsulating the ". ", ":", and "@" by different brackets [({})] and/or replacing it with the words dot/at in IPv4, IPv6, URLs, emails and filenames, and replacing the scheme or backslash in URLs (e.g., hxxp:// instead of http://).…”
Section: Tokenizationmentioning
confidence: 99%