2017 3rd IEEE International Conference on Cybernetics (CYBCONF) 2017
DOI: 10.1109/cybconf.2017.7985754
|View full text |Cite
|
Sign up to set email alerts
|

Acquiring Cyber Threat Intelligence through Security Information Correlation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 23 publications
(11 citation statements)
references
References 12 publications
0
11
0
Order By: Relevance
“…Data Collection [37], [47], [80], [103], [104], [107], [111], [127]- [132] Analysis & Detection [13], [35], [41], [43], [55], [56], [84], [133]- [157] Presentation [9], [12], [13], [80], [97], [99], [112], [127], [158]- [170] V-B2). As the interface between people and machines, the presentation of data and analysis results is of particular interest in a SOC context.…”
Section: Technology Referencesmentioning
confidence: 99%
See 1 more Smart Citation
“…Data Collection [37], [47], [80], [103], [104], [107], [111], [127]- [132] Analysis & Detection [13], [35], [41], [43], [55], [56], [84], [133]- [157] Presentation [9], [12], [13], [80], [97], [99], [112], [127], [158]- [170] V-B2). As the interface between people and machines, the presentation of data and analysis results is of particular interest in a SOC context.…”
Section: Technology Referencesmentioning
confidence: 99%
“…DeCusatis [80] describes an attack visualization based on force diagrams and hive plots. Settani et al [158] shows how a map and dashboard-based visualization of incidents and a mobile visualization enables on-site personnel to make qualified decisions. Besides, Erola et al [159] present an approach that combines machine learning and information from business processes with visual analytics to guide SOC employees through the decision-making process.…”
Section: ) Presentationmentioning
confidence: 99%
“…A commonly known malicious worm Stuxnet is an example of APT attack that targets production systems. The developers of these sophisticated attacks are skilled and well funded since they are tailor-made to the target networks and systems [1][2][3][4][5] -the cyber security risk at the targeted side is very high.…”
Section: Apt Attackmentioning
confidence: 99%
“…The attack can also use more than one attack vectors simultaneously. [1][2][3][4][5][6][7][8][9][10] Another weakness that help attackers is the fact that 100% secure systems does not exist. Even well designed and protected systems and networks have their weak spots [8].…”
Section: Apt Attackmentioning
confidence: 99%
See 1 more Smart Citation