2019
DOI: 10.1155/2019/6268476
|View full text |Cite
|
Sign up to set email alerts
|

Automated Dataset Generation System for Collaborative Research of Cyber Threat Analysis

Abstract: The objectives of cyberattacks are becoming sophisticated, and attackers are concealing their identity by masquerading as other attackers. Cyber threat intelligence (CTI) is gaining attention as a way to collect meaningful knowledge to better understand the intention of an attacker and eventually predict future attacks. A systemic threat analysis based on data acquired from actual cyber incidents is a useful approach to generating intelligence for such an objective. Developing an analysis technique requires a … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(4 citation statements)
references
References 9 publications
0
4
0
Order By: Relevance
“…Due to the rapidly changing nature of cyber risks, it is often impossible to obtain all information on them. Kim and Kim (2019) proposed an automated dataset generation system called CTIMiner that collects threat data from publicly available security reports and malware repositories. They released a dataset to the public containing about 640,000 records from 612 security reports published between January 2008 and 2019.…”
Section: Case Datasetsmentioning
confidence: 99%
“…Due to the rapidly changing nature of cyber risks, it is often impossible to obtain all information on them. Kim and Kim (2019) proposed an automated dataset generation system called CTIMiner that collects threat data from publicly available security reports and malware repositories. They released a dataset to the public containing about 640,000 records from 612 security reports published between January 2008 and 2019.…”
Section: Case Datasetsmentioning
confidence: 99%
“…The authors define in [4] CTI as a means of gathering knowledge to understand what the attacker wants and predict future attacks. CTI is used to achieve appropriate awareness of conditions and cyber threats can be countered by including CTI in defense systems.…”
Section: Introductionmentioning
confidence: 99%
“…The need for datasets and their generation are recurrent topics related to several research fields. Thus, there are published works in research areas as varied as radio signal processing [29], vehicular technology [30,31], vehicle-to-vehicle and vehicle-to-infrastructure wireless communication [32], computer vision [33] and pattern recognition [34], cyber threat intelligence [35], host intrusion detection [36], network intrusion detection system [37,38], smart grids [39], and software vulnerabilities [40][41][42][43][44][45], among many others.…”
Section: Introductionmentioning
confidence: 99%
“…Current approaches point in that direction. For instance, Daegeon et al's research [35] proposes a system for collecting threat data gathered from security reports and publicly available malware repositories.…”
Section: Introductionmentioning
confidence: 99%