A Methodology to Evaluate Standards and Platforms within Cyber Threat Intelligence

被引:33
|
作者
de Melo e Silva, Alessandra [1 ]
Costa Gondim, Joao Jose [1 ,2 ]
Albuquerque, Robson de Oliveira [1 ,3 ]
Garcia Villalba, Luis Javier [3 ]
机构
[1] Univ Brasilia, Dept Elect Engn, Post Grad Elect Engn PPEE, BR-70910900 Brasilia, DF, Brazil
[2] Univ Brasilia UnB, Dept Comp Sci CIC, BR-70910900 Brasilia, DF, Brazil
[3] Univ Complutense Madrid UCM, Fac Comp Sci & Engn, Dept Software Engn & Artificial Intelligence DISI, Grp Anal Secur & Syst GASS, Off 431,Calle Prof Jose Garcia Santesmases 9, Madrid 28040, Spain
来源
FUTURE INTERNET | 2020年 / 12卷 / 06期
关键词
cyber security; cyber threat intelligence; threat intelligence platform; threat intelligence standard;
D O I
10.3390/fi12060108
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The cyber security landscape is fundamentally changing over the past years. While technology is evolving and new sophisticated applications are being developed, a new threat scenario is emerging in alarming proportions. Sophisticated threats with multi-vectored, multi-staged and polymorphic characteristics are performing complex attacks, making the processes of detection and mitigation far more complicated. Thus, organizations were encouraged to change their traditional defense models and to use and to develop new systems with a proactive approach. Such changes are necessary because the old approaches are not effective anymore to detect advanced attacks. Also, the organizations are encouraged to develop the ability to respond to incidents in real-time using complex threat intelligence platforms. However, since the field is growing rapidly, today Cyber Threat Intelligence concept lacks a consistent definition and a heterogeneous market has emerged, including diverse systems and tools, with different capabilities and goals. This work aims to provide a comprehensive evaluation methodology of threat intelligence standards and cyber threat intelligence platforms. The proposed methodology is based on the selection of the most relevant candidates to establish the evaluation criteria. In addition, this work studies the Cyber Threat Intelligence ecosystem and Threat Intelligence standards and platforms existing in state-of-the-art.
引用
收藏
页数:23
相关论文
共 50 条
  • [41] Ontology-based Cyber Risk Monitoring Using Cyber Threat Intelligence
    Merah, Yazid
    Kenaza, Tayeb
    ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,
  • [42] Generating Quality Threat Intelligence Leveraging OSINT and a Cyber Threat Unified Taxonomy
    Martins, Claudio
    Medeiros, Iberia
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2022, 25 (03)
  • [43] Cyber threat intelligence sharing: Survey and research directions
    Wagner, Thomas D.
    Mahbub, Khaled
    Palomar, Esther
    Abdallah, Ali E.
    COMPUTERS & SECURITY, 2019, 87
  • [44] Towards Collaborative Cyber Threat Intelligence for Security Management
    Osliak, Oleksii
    Saracino, Andrea
    Martinelli, Fabio
    Dimitrakos, Theo
    ICISSP: PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2021, : 339 - 346
  • [45] A Novel Approach for Cyber Threat Analysis Systems Using BERT Model from Cyber Threat Intelligence Data
    Demirol, Doygun
    Das, Resul
    Hanbay, Davut
    SYMMETRY-BASEL, 2025, 17 (04):
  • [46] Combating Fake Cyber Threat Intelligence using Provenance in Cybersecurity Knowledge Graphs
    Mitra, Shaswata
    Piplai, Aritran
    Mittal, Sudip
    Joshi, Anupam
    2021 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2021, : 3316 - 3323
  • [47] Maximizing the benefits from sharing cyber threat intelligence by government agencies and departments
    Dykstra, Josiah
    Gordon, Lawrence A.
    Loeb, Martin P.
    Zhou, Lei
    JOURNAL OF CYBERSECURITY, 2023, 9 (01):
  • [48] Vulcan: Automatic extraction and analysis of cyber threat intelligence from unstructured text
    Jo, Hyeonseong
    Lee, Yongjae
    Shin, Seungwon
    COMPUTERS & SECURITY, 2022, 120
  • [49] Generating Fake Cyber Threat Intelligence Using Transformer-Based Models
    Ranade, Priyanka
    Piplai, Aritran
    Mittal, Sudip
    Joshi, Anupam
    Finin, Tim
    2021 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2021,
  • [50] Surveying Cyber Threat Intelligence and Collaboration: A Concise Analysis of Current Landscape and Trends
    Radoglou-Grammatikis, Panagiotis
    Kioseoglou, Elisavet
    Asimopoulos, Dimitrios
    Siavvas, Miltiadis
    Nanos, Ioannis
    Lagkas, Thomas
    Argyriou, Vasileios
    Psannis, Konstantinos E.
    Goudos, Sotirios
    Sarigiannidis, Panagiotis
    2023 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE, CLOUDCOM 2023, 2023, : 309 - 314