Security Smells in Ansible and Chef Scripts
- A. RahmanMd Rayhanur RahmanChris ParninL. Williams
- 16 July 2019
Computer Science
This article identifies two security smells not reported in prior work: missing default in case statement and no integrity check and recommends practitioners to rigorously inspect the presence of the identified security smells in Ansible and Chef scripts using code review, and static analysis tools.
From Threat Reports to Continuous Threat Intelligence: A Comparison of Attack Technique Extraction Methods from Textual Artifacts
- Md Rayhanur RahmanLaurie A. Williams
- 5 October 2022
Computer Science
This work identifies ten existing TTP extraction studies from the literature and implements five methods, finding two methods, based on Term Frequency-Inverse Document Frequency and Latent Semantic Indexing, outperform the other three methods with a F1 score of 84\% and 83\%, respectively.
What Are the Attackers Doing Now? Automating Cyberthreat Intelligence Extraction from Text on Pace with the Changing Threat Landscape: A Survey
- Md Rayhanur RahmanRezvan Mahdavi HezavehLaurie A. Williams
- 14 September 2021
Computer Science
The goal of this article is to aid cybersecurity researchers in understanding the current techniques used for cyberthreat intelligence extraction from text through a survey of relevant studies in the literature, finding 11 types of extraction purposes and 7 types of textual sources for CTI extraction.
Share, But be Aware: Security Smells in Python Gists
- Md Rayhanur RahmanA. RahmanL. Williams
- 1 September 2019
Computer Science
This paper finds 13 types of security smells with 4,403 occurrences in 5,822 publicly-available Python Gists and finds no significance relation between the presence of these security smells and the reputation of the Gist author.
Investigating co-occurrences of MITRE ATT\&CK Techniques
- Md Rayhanur RahmanLaurie A. Williams
- 11 November 2022
Computer Science
This study approximates how adversaries leverage techniques based on publicly reported documents and advocates organizations investigate adversarial techniques in their environment and make the findings available for a more precise and actionable understanding.
An investigation of security controls and MITRE ATT&CK techniques
- Md Rayhanur RahmanLaurie A. Williams
- 11 November 2022
Computer Science
The extent of mitigation of 298 NIST SP800-53 controls over 188 adversarial techniques used in 669 cybercrime groups and malware cataloged in the MITRE ATT\&CK framework is investigated based upon an existing mapping between the controls and techniques.
Inferring Bug Patterns for Detecting Bugs in JavaScript By Analyzing Abstract Syntax Tree
- Afsana TasnimMd Rayhanur Rahman
- 1 June 2018
Computer Science
This paper has proposed six algorithms to generate six types of bug patterns from JavaScript source code and found out 73 bug patterns by analyzing the commit log messages of 7 GitHub projects.
A Literature Review on Mining Cyberthreat Intelligence from Unstructured Texts
- Md Rayhanur RahmanRezvan Mahdavi-HezavehL. Williams
- 1 November 2020
Computer Science
2020 International Conference on Data Mining…
It is found that the most prominent sources of unstructured threat data are the threat reports, Twitter feeds, and posts from hackers and security experts, and natural language processing (NLP) based approaches: topic classification; keyword identification; and semantic relationship extraction among the keywords are mostly availed in the selected studies to mine CTI information from un Structured threat sources.
Mining temporal attack patterns from cyberthreat intelligence reports
- Md Rayhanur RahmanBrandon WroblewskiQuinn MatthewsBrantley MorganTim MenziesLaurie A. Williams
- 3 January 2024
Computer Science
The goal of this paper is to aid security practitioners in proactive defense against attacks by automatic information extraction of temporal relations among attack actions from cyberthreat intelligence reports by proposing ChronoCTI, an automated pipeline for extracting temporal relations among attack actions from CTI reports.
Assessment of natural regeneration status: the case of Durgapur hill forest, Netrokona, Bangladesh
- Md Rayhanur RahmanMd. Mizanur RahmanMd. Arif Chowdhury
- 2 April 2020
Environmental Science
ABSTRACT Enumeration of regeneration status is an authentic tool to know the actual condition of forest ecosystem. The study was conducted to assess the regeneration status of Durgapur hill forest…
...
...