2022
DOI: 10.1016/j.matpr.2021.06.204
|View full text |Cite
|
Sign up to set email alerts
|

Cyber threat intelligence challenges: Leveraging blockchain intelligence with possible solution

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 23 publications
(9 citation statements)
references
References 8 publications
0
9
0
Order By: Relevance
“…Finally, Saxena et al [11] presented CTI challenges in a relationship with blockchain and presented a conceptual and abstract proposal for a blockchain-based CTI sharing model. However, their study, while insightful, does not comprehensively capture the entire landscape in the subject area of our research.…”
Section: Related Workmentioning
confidence: 99%
“…Finally, Saxena et al [11] presented CTI challenges in a relationship with blockchain and presented a conceptual and abstract proposal for a blockchain-based CTI sharing model. However, their study, while insightful, does not comprehensively capture the entire landscape in the subject area of our research.…”
Section: Related Workmentioning
confidence: 99%
“…In addition to incident pattern identification, threat intelligence methods also aim to gather information on the attacker intentions, trends, and procedures, enabling the organization to better protect its informational assets [24]. However, the effective implementation of threat intelligence faces some challenges, such as the complexity of the threat landscape, the big data scenario, and the lack of transparency and visibility [25].…”
Section: Literature Reviewmentioning
confidence: 99%
“…An attack on the computer devices, network or system performed by person who has authorization access is known as an insider attack. An attack that originates exposures from outside the organization and attempt to exploit IT equipment are known as external attacks [1]. Cyber threat is possibility to successful cyber-attack that aims to harm computer system or network, steal sensitive data and gain unauthorized access.…”
Section: A Cyber Threatsmentioning
confidence: 99%
“…The term cyber generally, defines computer devices, network, internet and information technology. [1] Cyber threat is a possibility to successful cyber-attack that aims to harm computer system or network, steal sensitive data and gain unauthorized access. However, the IoT are vulnerable in terms of security; cybercriminals use malware attacks such as DDoS, ransomware, and IoT botnet attack to disable systems and networks.…”
Section: Introductionmentioning
confidence: 99%