SoK: Automated TTP Extraction from CTI Reports – Are We There Yet?

Marvin Büchel, Tommaso Paladini, Stefano Longari, Michele Carminati, Stefano Zanero, Hodaya Binyamini, Gal Engelberg, Dan Klein, Giancarlo Guizzardi, Marco Caselli, Andrea Continella, Maarten van Steen, Andreas Peter, Thijs van Ede

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Downloads (Pure)

Abstract

Cyber Threat Intelligence (CTI) plays a critical role in sharing knowledge about new and evolving threats. With the increased prevalence and sophistication of threat actors, intelligence has expanded from simple indicators of compromise to extensive CTI reports describing high-level attack steps known as Tactics, Techniques and Procedures (TTPs). Such TTPs, often classified into the ontology of the MITRE ATT&CK framework, make CTI significantly more valuable, but also harder to interpret and automatically process. Natural Language Processing (NLP) makes it possible to automate large parts of the knowledge extraction from CTI reports; over 40 papers discuss approaches, ranging from named entity recognition over embedder models to generative large language models. Unfortunately, existing solutions are largely incomparable as they consider decisively different and constrained settings, rely on custom TTP ontologies, and use a multitude of custom, inaccessible CTI datasets. We take stock, systematize the knowledge in the field, and empirically evaluate existing approaches in a unified setting for fair comparisons. We gain several fundamental insights, including (1) the finding of a kind of performance limit that existing approaches seemingly cannot overcome as of yet, (2) that traditional NLP approaches (possibly counterintuitively) outperform modern embedder-based and generative approaches in realistic settings, and (3) that further research on understanding inherent ambiguities in TTP ontologies and on the creation of qualitative datasets is key to take a leap in the field.
Original languageEnglish
Title of host publicationProceedings of the USENIX Security Symposium
Subtitle of host publicationAugust 13–15, 2025 • Seattle, WA, USA
PublisherUSENIX Association
Pages4621-4641
ISBN (Print)978-1-939133-52-6
Publication statusPublished - 1 Aug 2025
Event34th USENIX Security Symposium, USENIX Security 2025 - Seattle, United States
Duration: 13 Aug 202515 Aug 2025
Conference number: 34

Conference

Conference34th USENIX Security Symposium, USENIX Security 2025
Abbreviated titleUSENIX Security 2025
Country/TerritoryUnited States
CitySeattle
Period13/08/2515/08/25

Keywords

  • Cybersecurity

Fingerprint

Dive into the research topics of 'SoK: Automated TTP Extraction from CTI Reports – Are We There Yet?'. Together they form a unique fingerprint.

Cite this