A Methodology to Evaluate Standards and Platforms within Cyber Threat Intelligence

被引:33
|
作者
de Melo e Silva, Alessandra [1 ]
Costa Gondim, Joao Jose [1 ,2 ]
Albuquerque, Robson de Oliveira [1 ,3 ]
Garcia Villalba, Luis Javier [3 ]
机构
[1] Univ Brasilia, Dept Elect Engn, Post Grad Elect Engn PPEE, BR-70910900 Brasilia, DF, Brazil
[2] Univ Brasilia UnB, Dept Comp Sci CIC, BR-70910900 Brasilia, DF, Brazil
[3] Univ Complutense Madrid UCM, Fac Comp Sci & Engn, Dept Software Engn & Artificial Intelligence DISI, Grp Anal Secur & Syst GASS, Off 431,Calle Prof Jose Garcia Santesmases 9, Madrid 28040, Spain
来源
FUTURE INTERNET | 2020年 / 12卷 / 06期
关键词
cyber security; cyber threat intelligence; threat intelligence platform; threat intelligence standard;
D O I
10.3390/fi12060108
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The cyber security landscape is fundamentally changing over the past years. While technology is evolving and new sophisticated applications are being developed, a new threat scenario is emerging in alarming proportions. Sophisticated threats with multi-vectored, multi-staged and polymorphic characteristics are performing complex attacks, making the processes of detection and mitigation far more complicated. Thus, organizations were encouraged to change their traditional defense models and to use and to develop new systems with a proactive approach. Such changes are necessary because the old approaches are not effective anymore to detect advanced attacks. Also, the organizations are encouraged to develop the ability to respond to incidents in real-time using complex threat intelligence platforms. However, since the field is growing rapidly, today Cyber Threat Intelligence concept lacks a consistent definition and a heterogeneous market has emerged, including diverse systems and tools, with different capabilities and goals. This work aims to provide a comprehensive evaluation methodology of threat intelligence standards and cyber threat intelligence platforms. The proposed methodology is based on the selection of the most relevant candidates to establish the evaluation criteria. In addition, this work studies the Cyber Threat Intelligence ecosystem and Threat Intelligence standards and platforms existing in state-of-the-art.
引用
收藏
页数:23
相关论文
共 50 条
  • [31] A Systematic Literature Review on Cyber Threat Intelligence for Organizational Cybersecurity Resilience
    Saeed, Saqib
    Suayyid, Sarah A.
    Al-Ghamdi, Manal S.
    Al-Muhaisen, Hayfa
    Almuhaideb, Abdullah M.
    SENSORS, 2023, 23 (16)
  • [32] Incorporating Cyber Threat Intelligence into Complex Cyber-Physical Systems: A STIX Model for Active Buildings
    Czekster, Ricardo M.
    Metere, Roberto
    Morisset, Charles
    APPLIED SCIENCES-BASEL, 2022, 12 (10):
  • [33] Automated Cyber Threat Intelligence Reports Classification for Early Warning of Cyber Attacks in Next Generation SOC
    Yang, Wenzhuo
    Lam, Kwok-Yan
    INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019), 2020, 11999 : 145 - 164
  • [34] A survey on cyber threat intelligence sharing based on Blockchain
    Ahmed El-Kosairy
    Nashwa Abdelbaki
    Heba Aslan
    Advances in Computational Intelligence, 2023, 3 (3):
  • [35] Coordinating uncertainty in the political economy of cyber threat intelligence
    Slayton, Rebecca
    Muller, Lilly
    SOCIAL STUDIES OF SCIENCE, 2025,
  • [36] Leveraging cyber threat intelligence for a dynamic risk framework
    Riesco, R.
    Villagra, V. A.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2019, 18 (06) : 715 - 739
  • [37] A Reference Model for Cyber Threat Intelligence (CTI) Systems
    Sakellariou, Georgios
    Fouliras, Panagiotis
    Mavridis, Ioannis
    Sarigiannidis, Panagiotis
    ELECTRONICS, 2022, 11 (09)
  • [38] Factors Amplifying or Inhibiting Cyber Threat Intelligence Sharing
    Nainna, Muhammad A.
    Bass, Julian M.
    Speakman, Lee
    INFORMATION SYSTEMS, PT 2, EMCIS 2023, 2024, 502 : 204 - 214
  • [39] Exploring Open Source Information for Cyber Threat Intelligence
    Adewopo, Victor
    Gonen, Bilal
    Adewopo, Festus
    2020 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2020, : 2232 - 2241
  • [40] Rationality constraints in cyber defense: Incident handling, attribution and cyber threat intelligence
    Hettema, Hinne
    COMPUTERS & SECURITY, 2021, 109