Analysis of Data Exchange Systems about Information Security Threats

被引:0
作者
E. Yu. Pavlenko [1 ]
N. V. Polosukhin [1 ]
机构
[1] Peter the Great St. Petersburg Polytechnic University, St. Petersburg
关键词
communication protocols; CTI level; cyber threat intelligence; information security threats;
D O I
10.3103/S0146411624701037
中图分类号
学科分类号
摘要
Abstract: The modern approaches and protocols for communication concerning information security threats are analyzed. A classification of information about the threats is given, and the area of applicability of these classes is estimated. A classification of protocols and standards for communication concerning the threats is presented, and the classes of information about the threats and protocols describing such threats are compared. For each class of protocols and standards, the area of applicability for describing each level of information about the threats is estimated. The main conclusion is as follows: the further study of the standards in this domain will allow determining the necessary set of requirements on the process of exchanging information about the threats that enables more efficiently responding to them and reducing potential risks. © Allerton Press, Inc. 2024.
引用
收藏
页码:1365 / 1372
页数:7
相关论文
共 10 条
  • [1] Information Security Threats Analysis for E-Learning
    Alwi, Najwa Hayaati Mohd
    Fan, Ip-Shing
    TECHNOLOGY ENHANCED LEARNING: QUALITY OF TEACHING AND EDUCATIONAL REFORM, 2010, 73 : 285 - 291
  • [2] An Exploration of Risk Characteristics of Information Security Threats and Related Public Information Search Behavior
    Wang, Jingguo
    Xiao, Nan
    Rao, H. Raghav
    INFORMATION SYSTEMS RESEARCH, 2015, 26 (03) : 619 - 633
  • [3] Teachers' Knowledge Levels About Virtual Information Security
    Karabatak, Songul
    Karabatak, Murat
    2018 6TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSIC AND SECURITY (ISDFS), 2018, : 91 - 95
  • [4] From Hodl to Heist: Analysis of Cyber Security Threats to Bitcoin Exchanges
    Oosthoek, Kris
    Doerr, Christian
    2020 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN AND CRYPTOCURRENCY (IEEE ICBC), 2020,
  • [5] Establishing evolutionary game models for CYBer security information EXchange (CYBEX)
    Tosh, Deepak
    Sengupta, Shamik
    Kamhoua, Charles A.
    Kwiat, Kevin A.
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2018, 98 : 27 - 52
  • [6] The influence of information security on the adoption of web-based integrated information systems: an e-government study in Peru
    Joo, Jaehun
    Hovav, Anat
    INFORMATION TECHNOLOGY FOR DEVELOPMENT, 2016, 22 (01) : 94 - 116
  • [7] Peculiarities of Solving the Problem of Controlling Information Security Risks in the Development of Protection Methods against Covert (Steganographic) Information Exchange in Public Internet Resources
    Fedosenko, M. Yu.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2024, 58 (08) : 1169 - 1179
  • [8] A review on security analysis of cyber physical systems using Machine learning
    Ahmed Jamal A.
    Mustafa Majid A.-A.
    Konev A.
    Kosachenko T.
    Shelupanov A.
    Materials Today: Proceedings, 2023, 80 : 2302 - 2306
  • [9] ANALYSIS OF THE DATA TRANSMISSION IN THE INDUSTRIAL AUTOMATION SYSTEMS
    Borangiu, Theodor
    Croitoru, Marian
    UNIVERSITY POLITEHNICA OF BUCHAREST SCIENTIFIC BULLETIN SERIES C-ELECTRICAL ENGINEERING AND COMPUTER SCIENCE, 2010, 72 (03): : 15 - 28
  • [10] A Novel Approach for Cyber Threat Analysis Systems Using BERT Model from Cyber Threat Intelligence Data
    Demirol, Doygun
    Das, Resul
    Hanbay, Davut
    SYMMETRY-BASEL, 2025, 17 (04):