Cyber threat intelligence challenges: Leveraging blockchain intelligence with possible solution

被引:18
作者
Saxena, Rashi [1 ]
Gayathri, E. [1 ]
机构
[1] KL Univ, Dept Comp Sci & Engn, Hyderabad, Telangana, India
关键词
Cybersecurity; Cyber Threat Intelligence; COVID-19; Phishing; Deepfakes; VPN Attacks; SECURITY;
D O I
10.1016/j.matpr.2021.06.204
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Technology of cyber threat intelligence (CTI) is a proof-based defense framework that proactively reacts by monitoring and exchanging security-related information of advanced cyber threats among different industries. The efficiency of CTI systems may be considerably impeded by developing and disseminating inappropriate protection policies. Although global attention is on the health and the economic challenges raised by COVID-19, this epidemic is certainly being exploited by cybercriminals across the globe. The attackers use the COVID-19 to embellish brands in a way that causes workers and consumers to make mistakes, spam, and ransomware attacks are at peak. In this article, we discuss many current and new cyber threat challenges and examine the latest case analysis. Finally, we have proposed a new system on Collaborative Cyber Threat Information Exchange (CCTI) underlining a wider group's capacity to help to recognize faults via an artificial intelligence computing essence focused on blockchain. (c) 2021 Elsevier Ltd. All rights reserved. Selection and peer-review under responsibility of the scientific committee of the 1st International Conference on Computations in Materials and Applied Engineering - 2021.
引用
收藏
页码:682 / 689
页数:8
相关论文
共 17 条
[1]   A Survey on Advanced Persistent Threats: Techniques, Solutions, Challenges, and Research Opportunities [J].
Alshamrani, Adel ;
Myneni, Sowmya ;
Chowdhary, Ankur ;
Huang, Dijiang .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (02) :1851-1877
[2]  
Babukarthik Raju Govindaraj, 2018, BIOSCI BIOTECH RES C
[3]  
Cole E, 2013, ADVANCED PERSISTENT THREAT: UNDERSTANDING THE DANGER AND HOW TO PROTECT YOUR ORGANIZATION, P77, DOI 10.1016/B978-1-59-749949-1.00004-8
[4]  
Dhote B.L, 2019, TRUST SECURITY SHARE, DOI [10.1007/978-981-13-2673.8_14, DOI 10.1007/978-981-13-2673.8_14]
[5]  
Ingram J.B., 2017, TEMPORAL CYBER ATTAC, DOI [10.2172/1409921, DOI 10.2172/1409921]
[6]  
Kim Y.S., 2014, Mobile, ubiquitous, and intelligent computing, P489
[7]  
Lage O., 2020, Computer Security Threats, DOI [10.5772/intechopen.90061, DOI 10.5772/INTECHOPEN.90061]
[8]  
Meghana A., 2019, INT J INNOVATIVE TEC, V8, P874
[9]  
Prasad G.S., 2019, INT J INNOV TECHNOL, V8, P679
[10]  
Prasanthi M. Sai, 2019, INT J INNOV TECHNOL, V8, P147