Coordinator – French Alternative Energies and Atomic Energy Commission (CEA)
Participants – VIC, VMU, IMT.
The goal of WP5 is twofold:
The following tasks are set:
1) identification and collection of relevant raw hardware data from embedded systems (HPC, syscalls, etc.);
2) structuration of raw data using existing tools to obtain table-like structured data;
3) construction of relevant graphs;
4) AI/ML models on graph and heterogeneous data to assess link or node threat level. Several data sources (e.g.process,system, network) may be initially processed separately.
1) How to convert a detected threat from 5.1 to an IDMEFv2 message describing the threat, possibly including additional information generated by AI/ML. Several messages may also be used if multiple stages are involved;
2) How to use incoming IDMEFv2 messages to identify possibly related events in a separate data source or at another SOC. A preliminary step will be to use the IDMEFv2 message to identify the threat and the related events in the original data source (log, message, channel) from the SOC emitting the IDMEFv2 alert. An underlying goal of the task is to provide feedback regarding what data to include in the IDMEFv2 format to get the most out of the AI/ML tools, while making sure that the shared data respect ethics and do not cause unintended harm. This implies being responsible about respecting the privacy of users and not disclosing sensitive information.
Deliverables: