CYBER THREAT MODELING FRAMEWORK

被引:0
|
作者
Raposo de Melo, Renato Carvalho [1 ]
Albuquerque, Robson de Oliveira [1 ]
Lopes de Mendonca, Fabio Lficio [1 ]
机构
[1] Univ Brasilia UnB, Fac Technol, Elect Engn Dept, Profess Postgrad Program Elect Engn PPEE, BR-70910900 Brasilia, DF, Brazil
来源
2022 17TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI) | 2022年
基金
欧盟地平线“2020”;
关键词
Cyber Security; Cyber Threats; Threat Assessment; Cyber Threat Intelligence; Risk Assessment; Advanced Persistent Threats;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Cyberspace has reshaped the boundaries of the dispute fields used by organizations and governments. Organizational security doctrines and strategies have been adapted to face the ever-growing complexity of cyber threats. Part of the success in surviving in that environment depends on the ability one has to understand the nature of the threats aiming the systems to be protected. In this work, we propose a framework to map high complex cyber threats to help technical and management personnel with the task of generating useful knowledge, both in corporate and government cyber security sectors.
引用
收藏
页数:7
相关论文
共 50 条
  • [31] Ontology-based Cyber Risk Monitoring Using Cyber Threat Intelligence
    Merah, Yazid
    Kenaza, Tayeb
    ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,
  • [32] INTIME: A Machine Learning-Based Framework for Gathering and Leveraging Web Data to Cyber-Threat Intelligence
    Koloveas, Paris
    Chantzios, Thanasis
    Alevizopoulou, Sofia
    Skiadopoulos, Spiros
    Tryfonopoulos, Christos
    ELECTRONICS, 2021, 10 (07)
  • [33] DLTIF: Deep Learning-Driven Cyber Threat Intelligence Modeling and Identification Framework in IoT-Enabled Maritime Transportation Systems
    Kumar, Prabhat
    Gupta, Govind P.
    Tripathi, Rakesh
    Garg, Sahil
    Hassan, Mohammad Mehedi
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2023, 24 (02) : 2472 - 2481
  • [34] Cyber security threat modeling in the AEC industry: An example for the commissioning of the built environment
    Mantha, Bharadwaj
    de Soto, Borja Garcia
    Karri, Ramesh
    SUSTAINABLE CITIES AND SOCIETY, 2021, 66
  • [35] Using Entropy and Mutual Information to Extract Threat Actions from Cyber Threat Intelligence
    Husari, Ghaith
    Niu, Xi
    Chu, Bill
    Al-Shaer, Ehab
    2018 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2018, : 1 - 6
  • [36] GraphCH: A Deep Framework for Assessing Cyber-Human Aspects in Insider Threat Detection
    Roy, Krishna Chandra
    Chen, Guenevere
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (05) : 4495 - 4509
  • [37] Cyber Threat Intelligence on Blockchain: A Systematic Literature Review
    Chatziamanetoglou, Dimitrios
    Rantos, Konstantinos
    COMPUTERS, 2024, 13 (03)
  • [38] Towards Selecting Informative Content for Cyber Threat Intelligence
    Panagiotou, Panos
    Iliou, Christos
    Apostolou, Konstantinos
    Tsikrika, Theodora
    Vrochidis, Stefanos
    Chatzimisios, Periklis
    Kompatsiaris, Ioannis
    PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2021, : 354 - 359
  • [39] Study of cyber threat intelligence, risk management and methods
    Singh, Pardeep
    Kumar, Mahesh
    Sharma, Neetu
    Kumar, Pramod
    Shweta
    JOURNAL OF INFORMATION & OPTIMIZATION SCIENCES, 2025, 46 (01) : 65 - 74
  • [40] General Requirements of a Hybrid-Modeling Framework for Cyber Security
    Oltramari, Alessandro
    Ben-Asher, Noam
    Cranor, Lorrie
    Bauer, Lujo
    Christin, Nicolas
    2014 IEEE MILITARY COMMUNICATIONS CONFERENCE: AFFORDABLE MISSION SUCCESS: MEETING THE CHALLENGE (MILCOM 2014), 2014, : 129 - 135