A Systematic Mapping Study on Cyber Security Indicator Data

被引:5
作者
Meland, Per Hakon [1 ]
Tokas, Shukun [2 ]
Erdogan, Gencer [2 ]
Bernsmed, Karin [1 ]
Omerovic, Aida [3 ]
机构
[1] SINTEF Digital, Strindvegen 4, NO-7465 Trondheim, Norway
[2] SINTEF Digital, Forskningsveien 1, NO-0314 Oslo, Norway
[3] Norwegian Comp Ctr, Gaustadalleen 23a, NO-0373 Oslo, Norway
关键词
threat intelligence; data-driven decision making; risk management; data sources; trends; THREAT INTELLIGENCE;
D O I
10.3390/electronics10091092
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A security indicator is a sign that shows us what something is like or how a situation is changing and can aid us in making informed estimations on cyber risks. There are many different breeds of security indicators, but, unfortunately, they are not always easy to apply due to a lack of available or credible sources of data. This paper undertakes a systematic mapping study on the academic literature related to cyber security indicator data. We identified 117 primary studies from the past five years as relevant to answer our research questions. They were classified according to a set of categories related to research type, domain, data openness, usage, source, type and content. Our results show a linear growth of publications per year, where most indicators are based on free or internal technical data that are domain independent. While these indicators can give valuable information about the contemporary cyber risk, the increasing usage of unconventional data sources and threat intelligence feeds of more strategic and tactical nature represent a more forward-looking trend. In addition, there is a need to take methods and techniques developed by the research community from the conceptual plane and make them practical enough for real-world application.
引用
收藏
页数:26
相关论文
共 45 条
  • [1] [Anonymous], SECURITY EC INTERNAL
  • [2] [Anonymous], 2007, Complete guide to security and privacy metrics: measuring regulatory compliance, operational resilience, and ROI
  • [3] Barnum S., 2012, Standardizing Cyber Threat Intelligence Information with the Structured Threat Information Expression (stix), V11, P1
  • [4] Bradbery J., 2021, Oxford Advanced Learner's Dictionary.
  • [5] Lessons from applying the systematic literature review process within the software engineering domain
    Brereton, Pearl
    Kitchenham, Barbara A.
    Budgen, David
    Turner, Mark
    Khalil, Mohamed
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2007, 80 (04) : 571 - 583
  • [6] Investigating Sharing of Cyber Threat Intelligence and Proposing A New Data Model for Enabling Automation in Knowledge Representation and Exchange
    Bromander, Siri
    Swimmer, Morton
    Muller, Lilly Pijnenburg
    Josang, Audun
    Eian, Martin
    Skjotskift, Geir
    Borg, Fredrik
    [J]. DIGITAL THREATS: RESEARCH AND PRACTICE, 2022, 3 (01):
  • [7] Brown S., 2015, WISCS 15, P43
  • [8] Metrics and Indicators of Information Security Incident Management: A Systematic Mapping Study
    Cadena, Alyssa
    Gualoto, Franklin
    Fuertes, Walter
    Tello-Oquendo, Luis
    Andrade, Roberto
    Tapia, Freddy
    Torres, Jenny
    [J]. DEVELOPMENTS AND ADVANCES IN DEFENSE AND SECURITY, 2020, 152 : 507 - 519
  • [9] Chismon David., Threat Intelligence: Collecting, Analysing, Evaluating
  • [10] Bayesian Network Models in Cyber Security: A Systematic Review
    Chockalingam, Sabarathinam
    Pieters, Wolter
    Teixeira, Andre
    van Gelder, Pieter
    [J]. SECURE IT SYSTEMS, NORDSEC 2017, 2017, 10674 : 105 - 122