Analysis of Cyber-Intelligence Frameworks for AI Data Processing

被引:2
作者
del Monte, Alberto Sanchez [1 ]
Hernandez-Alvarez, Luis [2 ]
机构
[1] Univ Salamanca, Doctoral Sch Studii Salamantini, Comp Engn, Salamanca 37008, Spain
[2] CSIC, Inst Phys & Informat Technol ITEFI, Madrid 28006, Spain
来源
APPLIED SCIENCES-BASEL | 2023年 / 13卷 / 16期
关键词
artificial intelligence; Cyberkill Chain; cyber intelligence; Diamond Model; indicators of compromise; machine learning; Mitre Att & ck; tactics; techniques and procedures;
D O I
10.3390/app13169328
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
This paper deals with the concept of cyber intelligence and its components as a fundamental tool for the protection of information today. After that, the main cyber-intelligence frameworks that are currently applied worldwide (Diamond Model, Cyberkill Chain, and Mitre Att & ck) are described to subsequently analyse them through their practical application in a real critical cyber incident, as well as analyse the strengths and weaknesses of each one of them according to the comparison of seventeen variables of interest. From this analysis and considering the two actions mentioned, it is concluded that Mitre Att & ck is the most suitable framework due to its flexibility, permanent updating, and the existence of a powerful database. Finally, an explanation is given for how Mitre Att & ck can be integrated with the research and application of artificial intelligence in the achievement of the objectives set and the development of tools that can serve as support for the detection of the patterns and authorship of cyberattacks.
引用
收藏
页数:20
相关论文
共 53 条
  • [1] A Cyber Kill Chain Approach for Detecting Advanced Persistent Threats
    Ahmed, Yussuf
    Asyhari, A. Taufiq
    Rahman, Md Arafatur
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 67 (02): : 2497 - 2513
  • [2] Cyber-Attack Modeling Analysis Techniques: An Overview
    AL-Mohannadi, Hamad
    Mirza, Qublai
    Namanya, Anitta
    Awan, Irfan
    Cullen, Andrea
    Disso, Jules
    [J]. 2016 IEEE 4TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD WORKSHOPS (FICLOUDW), 2016, : 69 - 76
  • [3] Al-Shaer R, 2020, Arxiv, DOI arXiv:2005.01654
  • [4] Alavizadeh H., 2021, ARXIV
  • [5] Aljamal I, 2019, 2019 IEEE/ACIS 17TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH, MANAGEMENT AND APPLICATIONS (SERA), P84, DOI [10.1109/sera.2019.8886794, 10.1109/SERA.2019.8886794]
  • [6] [Anonymous], 2013, CYBER INTELLIGENCE T
  • [7] [Anonymous], 2012, Guide for conducting risk assessments, DOI DOI 10.6028/NIST.SP.800-30R1
  • [8] [Anonymous], 2005, NIST SP, DOI [10.6028/NIST.SP.800-40ver2, DOI 10.6028/NIST.SP.800-40VER2]
  • [9] [Anonymous], 2006, INFORM SCI STAT
  • [10] [Anonymous], 2021, VULNERABILITY MANAGE