Analysis of adversary activities using cloud-based web services to enhance cyber threat intelligence

被引:15
作者
Al-Mohannadi, Hamad [1 ]
Awan, Irfan [1 ]
Al Hamar, Jassim [2 ]
机构
[1] Univ Bradford, Sch Elect Engn & Comp Sci, Bradford, W Yorkshire, England
[2] Minist Interior, Doha, State Of Qatar, Qatar
关键词
Threat intelligence; Cyber threat; Honeypots; Cloud services; Log analysis; Elastic Stack;
D O I
10.1007/s11761-019-00285-7
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The understanding of cyber threats to a network is challenging yet rewarding as it allows an organisation to prevent a potential attack. Numerous efforts have been made to predict cyber threat before they occur. To build a threat intelligence framework, an organisation must understand attack data collected from the network events and analyse them to identify the cyber attack artefacts such as IP address, domain name, tools and techniques, username and password, and geographic location of the attacker, which could be used to understand the nature of attack to a system or network. However, it is very difficult or dangerous to collect and analyse live data from a production system. Honeypot technology is well known for mimicking the real system while collecting actual data that can be in near real time in order to monitor the activities on the network. This paper proposes a threat intelligence approach analysing attack data collected using cloud-based web service in order to support the active threat intelligence.
引用
收藏
页码:175 / 187
页数:13
相关论文
共 37 条
[31]  
Shackleford D., 2015, Who's Using Cyberthreat Intelligence and How
[32]  
Sochor T, 2014, STUDY INTERNET THREA, P118
[33]  
Sokol P, 2015, P SEC PROT INF U DEF
[34]  
United States. Joint Chiefs of Staff, 2000, JOINT TACT TECHN PRO
[35]  
van der Lelie-jop J, 2012, VISUAL ANAL APPROACH
[36]   Honeypots for distributed Denial of Service Attacks [J].
Weiler, N .
WET ICE 2002: ELEVENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2002, :109-114
[37]  
Xiaoli Lin, 2009, 2009 International Conference on Computational Science and Engineering (CSE), P486, DOI 10.1109/CSE.2009.372