2019
DOI: 10.1016/j.future.2019.02.013
|View full text |Cite
|
Sign up to set email alerts
|

A machine learning-based FinTech cyber threat attribution framework using high-level indicators of compromise

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
77
0
3

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 122 publications
(81 citation statements)
references
References 8 publications
1
77
0
3
Order By: Relevance
“…In the fintech domain, Noor et al [21] used Indicator of Compromise (IoC) as input, the feed which produces by cyberthreat intelligence teams, and Natural Language Processing Based on deep neural network engine to attribute a FinTech attack to its actor. They obtained over 98% accuracy to attribute an attack which had IoCs to its actor.…”
Section: Related Workmentioning
confidence: 99%
“…In the fintech domain, Noor et al [21] used Indicator of Compromise (IoC) as input, the feed which produces by cyberthreat intelligence teams, and Natural Language Processing Based on deep neural network engine to attribute a FinTech attack to its actor. They obtained over 98% accuracy to attribute an attack which had IoCs to its actor.…”
Section: Related Workmentioning
confidence: 99%
“…[ 70 ] and Noor U. et al. [ 50 , 71 ]confirm that the TTP's of the attacker remains consistent over a period of time. This allows greater confidence in the predictability of the lower level indicators of attack.…”
Section: Threat Modellingmentioning
confidence: 95%
“…utilised this pyramid and believes that the low-level IOCs can only useful for a limited time period, as the attacker can vary their indicators by using alternate service providers, IP addresses, attack servers and domain names etc. [ 50 ].…”
Section: Cyber Threat Intelligencementioning
confidence: 99%
“…In recent days , due to enormous available of accessing resources and evolution of innovating technologies, anyone who are interested in any type of hacking can involve themselves in exploring the TTP's used by the hacker communities can acquire their knowledge through forums, IRC, carding shops etc., [21].On day today basis, the exploits are increasing and made as commercialization [22]and become lively for hacker community. [24]Cyber-attacks affect the global economy of many billion dollar in preventing from [18] execution of malicious tools like trojans, zeus, ransomware and keyloggers, SQL injections, and DDoS from United States, Russia, and China. To prevent the cyber-attacks the vendors like FireEye, Cyveillance, Symantec, McAfee, Trend Micro, Sophos, and Kaspersky involved in the generation of Cyber Threat Intelligence (CTI) reports.…”
Section: Online Forums and Cti Reportsmentioning
confidence: 99%