2018
DOI: 10.1007/978-3-319-73951-9_1
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Threat Intelligence: Challenges and Opportunities

Abstract: The ever increasing number of cyber attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyberthreats in almost real-time. In practice, timely dealing with such a large number of attacks is not possible without deeply perusing the attack features and taking corresponding intelligent defensive actions -this in essence defines cyberthreat intelligence notion. However, such an intelligence would not be possible without the aid of artificial intelligence, machine l… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
52
0
1

Year Published

2018
2018
2020
2020

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 101 publications
(53 citation statements)
references
References 14 publications
0
52
0
1
Order By: Relevance
“…After that, attackers take intrusive actions to bring about great loss to benign users. As widely accepted, cyber kill-chain is a multistage segmental type intrusive model proposed by Lockheed Martin cooperation [3] and now has been widely accepted. It describes the common intrusive behavioral pattern with two stages.…”
Section: Typical Offensive and Defensivementioning
confidence: 99%
“…After that, attackers take intrusive actions to bring about great loss to benign users. As widely accepted, cyber kill-chain is a multistage segmental type intrusive model proposed by Lockheed Martin cooperation [3] and now has been widely accepted. It describes the common intrusive behavioral pattern with two stages.…”
Section: Typical Offensive and Defensivementioning
confidence: 99%
“…As a consequence, botnet and IDS data analysis has attracted alternative areas of research, for instance, ML-based solutions. Prominent ML approaches facilitated the disclosure of underlying patterns of traffic flows, pointing out the importance of feature engineering (feature extraction and selection) and evaluating malicious traces with different assessments to reach higher accuracy in real implementations [19]. The authors in [20] addressed botnet and IDS detection relying on two notable ML ramifications, Supervised (SL) and Unsupervised Learning (UL).…”
Section: Related Workmentioning
confidence: 99%
“…Viime vuosien aikana kyberhyökkäykset ovat lisääntyneet ja monimutkaistuneet, jonka vuoksi niiden havaitsemiseen, analysointiin ja suojaukseen tarvitaan yhä enemmän reaaliaikaista tietoa (Conti, Dargahi & Dehghantanha, 2018). Samaan aikaan kerätyn tiedon määrä jatkaa kasvamistaan.…”
Section: Johdantounclassified