Proceedings of the 2nd ACM Workshop on Information Sharing and Collaborative Security 2015
DOI: 10.1145/2808128.2808131
|View full text |Cite
|
Sign up to set email alerts
|

An Actionable Threat Intelligence system using a Publish-Subscribe communications model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(12 citation statements)
references
References 5 publications
0
12
0
Order By: Relevance
“…Literature provides different standards for the structured representation of indicators, such as CybOX 1 or openIoC 2 . These data structures are commonly referred to as Indicators of Compromise (IoC) as they depict a set of observations associated with a threat (Appala et al 2015). These basic incident data can furthermore be enriched using intelligenceand attribution data, such as information about attackers, utilized attack patterns or attackers' objectives as shown by Burger et al (2014).…”
Section: A Structured Representation For Threat Intelligence Reportedmentioning
confidence: 99%
“…Literature provides different standards for the structured representation of indicators, such as CybOX 1 or openIoC 2 . These data structures are commonly referred to as Indicators of Compromise (IoC) as they depict a set of observations associated with a threat (Appala et al 2015). These basic incident data can furthermore be enriched using intelligenceand attribution data, such as information about attackers, utilized attack patterns or attackers' objectives as shown by Burger et al (2014).…”
Section: A Structured Representation For Threat Intelligence Reportedmentioning
confidence: 99%
“…On the one hand, it makes the user aware of what security threat they may have, on the other hand, actionable threat intelligence indicates an agent who may breach the security can create a menace to the users. With the advanced sentiment analysis algorithm and development of the affective computing, the various users' personality traits can be predicted [3], [4], [25]- [27]. Thus, the users' online behaviour over social network sites leaves an impression which can suggest someone about their behaviour, thinking and maybe there future actions, which can lead to threat for them.…”
Section: Threat Intelligencementioning
confidence: 99%
“…Promising and widely accepted protocols in the community developed by the US Government and Mitre are the Structured Threat Information Expression (STIX) 3 and the Trusted Automated eXchange of Indicator Information (TAXII) 4 . It addresses structured cyber security needs such as, analyzing cyber threats, specifying indicator patterns, managing response activities, and sharing of cyber threat information [16]. The European Telecommunications Standards Institute (ETSI) follows up on the European Union Agency for Network and Information Security (ENISA) recommendation 5 for European Union member states to implement the globally accepted CTI sharing standards STIX/TAXII [17].…”
Section: Automated Sharing Of Ctimentioning
confidence: 99%
“…According to [14], interoperability is becoming important but not necessary the desired default state because it gives developers the diversity in data formats. The Mitre group developed the STIX format to render CTI exchange interoperable [34,16]. It has become the most widely accepted standard for threat intelligence sharing.…”
Section: Data Interoperabilitymentioning
confidence: 99%