A Comparative Study on Cyber Threat Intelligence: The Security Incident Response Perspective

被引:61
作者
Schlette, Daniel [1 ]
Caselli, Marco [2 ]
Pernul, Gunther [1 ]
机构
[1] Univ Regensburg, Chair Informat Syst, D-93053 Regensburg, Germany
[2] Siemens AG, Dept Cybersecur Technol, D-81739 Munich, Germany
基金
欧盟地平线“2020”;
关键词
Cyber threat intelligence; incident response; standardization; playbook format; INFORMATION;
D O I
10.1109/COMST.2021.3117338
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber Threat Intelligence (CTI) is threat information intended for security purposes. However, use for incident response demands standardization. This study examines the broader security incident response perspective. Introducing 18 core concepts, we assist efforts to establish and assess current standardization approaches. We further provide the reader with a detailed analysis of 6 incident response formats. While we synthesize structural elements, we point to characteristics and show format deficiencies. Also, we describe how core concepts can be used to determine a suitable format for a given use case. Our surveys' findings indicate a consistent focus on incident response actions within all formats. Besides, playbooks are used to represent procedures. Different use cases suggest that organizations can leverage and combine multiple formats. Finally, we discuss open research challenges to fully realize incident response potentials.
引用
收藏
页码:2525 / 2556
页数:32
相关论文
共 79 条
[1]   A survey of information security incident handling in the cloud [J].
Ab Rahman, Nurul Hidayah ;
Choo, Kim-Kwang Raymond .
COMPUTERS & SECURITY, 2015, 49 :45-69
[2]  
Adegardstuen F., 2020, SHUFFLE SOAR
[3]  
Alberts Chris, 2004, Technical Report CMU/SEI-2004-TR-015
[4]   Playbook Oriented Cyber Response [J].
Applebaum, Andy ;
Johnson, Shawn ;
Limiero, Michael ;
Smith, Michael J. .
2018 NATIONAL CYBER SUMMIT: RESEARCH TRACK (NCS 2018), 2018, :8-15
[5]  
Baker D. W., 1999, P REC ADV INTR DET, V7, P9
[6]  
Barnum S, 2014, REP
[7]  
Bartock M., 2016, 800184 NIST SP
[8]  
Bauer S, 2020, PROCEEDINGS OF THE 53RD ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, P1947
[9]  
Berndt A., 2020, INFORM SECURITY ED I, P96, DOI [10.1007/978-3-030-59291-2_7, DOI 10.1007/978-3-030-59291-2_7]
[10]  
Bhatt G. D., 2001, Journal of Knowledge Management, V5, P68, DOI 10.1108/13673270110384419