A Methodology to Evaluate Standards and Platforms within Cyber Threat Intelligence

被引:33
|
作者
de Melo e Silva, Alessandra [1 ]
Costa Gondim, Joao Jose [1 ,2 ]
Albuquerque, Robson de Oliveira [1 ,3 ]
Garcia Villalba, Luis Javier [3 ]
机构
[1] Univ Brasilia, Dept Elect Engn, Post Grad Elect Engn PPEE, BR-70910900 Brasilia, DF, Brazil
[2] Univ Brasilia UnB, Dept Comp Sci CIC, BR-70910900 Brasilia, DF, Brazil
[3] Univ Complutense Madrid UCM, Fac Comp Sci & Engn, Dept Software Engn & Artificial Intelligence DISI, Grp Anal Secur & Syst GASS, Off 431,Calle Prof Jose Garcia Santesmases 9, Madrid 28040, Spain
来源
FUTURE INTERNET | 2020年 / 12卷 / 06期
关键词
cyber security; cyber threat intelligence; threat intelligence platform; threat intelligence standard;
D O I
10.3390/fi12060108
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The cyber security landscape is fundamentally changing over the past years. While technology is evolving and new sophisticated applications are being developed, a new threat scenario is emerging in alarming proportions. Sophisticated threats with multi-vectored, multi-staged and polymorphic characteristics are performing complex attacks, making the processes of detection and mitigation far more complicated. Thus, organizations were encouraged to change their traditional defense models and to use and to develop new systems with a proactive approach. Such changes are necessary because the old approaches are not effective anymore to detect advanced attacks. Also, the organizations are encouraged to develop the ability to respond to incidents in real-time using complex threat intelligence platforms. However, since the field is growing rapidly, today Cyber Threat Intelligence concept lacks a consistent definition and a heterogeneous market has emerged, including diverse systems and tools, with different capabilities and goals. This work aims to provide a comprehensive evaluation methodology of threat intelligence standards and cyber threat intelligence platforms. The proposed methodology is based on the selection of the most relevant candidates to establish the evaluation criteria. In addition, this work studies the Cyber Threat Intelligence ecosystem and Threat Intelligence standards and platforms existing in state-of-the-art.
引用
收藏
页数:23
相关论文
共 50 条
  • [21] Risk Assessment of Sharing Cyber Threat Intelligence
    Albakri, Adham
    Boiten, Eerke
    Smith, Richard
    COMPUTER SECURITY, ESORICS 2020 INTERNATIONAL WORKSHOPS, 2020, 12580 : 92 - 113
  • [22] Cyber threat intelligence for critical infrastructure security
    Osliak, Oleksii
    Saracino, Andrea
    Martinelli, Fabio
    Mori, Paolo
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (23)
  • [23] On the dissemination of Cyber Threat Intelligence through Hyperledger
    Moubarak, Joanna
    Bassil, Carole
    Antoun, Joe
    2021 17TH INTERNATIONAL CONFERENCE ON THE DESIGN OF RELIABLE COMMUNICATION NETWORKS (DRCN), 2021,
  • [24] Measuring and visualizing cyber threat intelligence quality
    Schlette, Daniel
    Boehm, Fabian
    Caselli, Marco
    Pernul, Guenther
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2021, 20 (01) : 21 - 38
  • [25] CTIoT: A Cyber Threat Intelligence Tool for IoT
    El Jaouhari, Saad
    Ahmed, Shaikh
    20TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC 2024, 2024, : 1483 - 1489
  • [26] Relation Extraction Techniques in Cyber Threat Intelligence
    Arikkat, Dincy R.
    Vinod, P.
    Rehiman, Rafidha K. A.
    Nicolazzo, Serena
    Nocera, Antonino
    Conti, Mauro
    NATURAL LANGUAGE PROCESSING AND INFORMATION SYSTEMS, PT I, NLDB 2024, 2024, 14762 : 348 - 363
  • [27] Measuring and visualizing cyber threat intelligence quality
    Daniel Schlette
    Fabian Böhm
    Marco Caselli
    Günther Pernul
    International Journal of Information Security, 2021, 20 : 21 - 38
  • [28] Tactics And Techniques Classification In Cyber Threat Intelligence
    Yu, Zhongkun
    Wang, JunFeng
    Tang, BinHui
    Lu, Li
    COMPUTER JOURNAL, 2023, 66 (08) : 1870 - 1881
  • [29] Cyber Security Decision Making Informed by Cyber Threat Intelligence (CYDETI)
    Aliyu, Aliyu
    He, Ying
    Yevseyeva, Iryna
    Luo, Cunjin
    2020 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2020,
  • [30] Cyber Threat Intelligence for Improving Cybersecurity and Risk Management in Critical Infrastructure
    Kure, Halima Ibrahim
    Islam, Shareeful
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2019, 25 (11) : 1478 - 1502