2021
DOI: 10.1109/comst.2021.3117338
|View full text |Cite
|
Sign up to set email alerts
|

A Comparative Study on Cyber Threat Intelligence: The Security Incident Response Perspective

Abstract: IEEE Communications Surveys & Tutorials IEEE COMMUNICATIONS SURVEYS & TUTORIALS 2 followed by Detection & Analysis, Containment, Eradication & Recovery and concludes with Post-Incident Activity. It is worth mentioning that between the four phases feedback loops exist. Other incident handling process models (e.g., CERT/CC [24], ITIL [25], [26], [27]) are in line with the NIST incident response life cycle. Nevertheless, often incident response is narrowed down to only the Containment, Eradication & Recovery acti… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
22
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 60 publications
(22 citation statements)
references
References 50 publications
0
22
0
Order By: Relevance
“…Frequent industrial control security incidents have attracted extensive attention from home and abroad. China and European and American countries have included the industrial control system in their national strategies [1][2][3].…”
Section: Introductionmentioning
confidence: 99%
“…Frequent industrial control security incidents have attracted extensive attention from home and abroad. China and European and American countries have included the industrial control system in their national strategies [1][2][3].…”
Section: Introductionmentioning
confidence: 99%
“…The term cyber relates to all aspects of computing, including storing data, protecting data, accessing data, processing data, transmitting data and connecting data. Also, cyber can defined as the space for data and information sharing towards the communities without the time and nation barrier [17].…”
Section: Cybermentioning
confidence: 99%
“…The reconstruction of this kind of attack is possible thanks to the collected logs exploitation. Then, in order to identify techniques performed by the attacker, we used a tool 9 that allows us to extract Events of Interest (EoI) [27] from the dataset. In the following, we detail actions performed by the participant #12, denoted P12.…”
Section: Pwnjutsu P12 Attack Campaignmentioning
confidence: 99%
“…As stated in [9], the Cyber Threat Intelligence experts need formalization at every stage of attacks to understand manipulated tools and data as well as to produce relevant, entirely usable, and comparable datasets.…”
mentioning
confidence: 99%