2022
DOI: 10.17694/bajece.1090145
|View full text |Cite
|
Sign up to set email alerts
|

Graph Visualization of Cyber Threat Intelligence Data for Analysis of Cyber Attacks

Abstract: Threat intelligence enables us to make faster, more informed, data-backed security decisions and change their behavior from reactive to proactive in the fight against threat actors. Cyber threat intelligence sources include open-source intelligence, social media intelligence, human intelligence, technical intelligence, device log files, forensically acquired data or intelligence from the internet traffic, and data derived for the deep and dark web. In this study, graph visualization is discussed for the intell… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…In most places with big data, visualization is used to understand the data [12,13]. Bachechi et al used information visualization techniques to analyze urban traffic data and the effect of traffic emissions on urban air quality.…”
Section: B Related Workmentioning
confidence: 99%
“…In most places with big data, visualization is used to understand the data [12,13]. Bachechi et al used information visualization techniques to analyze urban traffic data and the effect of traffic emissions on urban air quality.…”
Section: B Related Workmentioning
confidence: 99%
“…Because attackers are getting smarter and more stubborn, standard cybersecurity methods don't always work to stop constantly changing threats. Because of this, we need new methods that can provide effective and thorough threat intelligence research right away to protect ourselves from online dangers [1]. In answer to this need, this study suggests a new approach that uses graph theory and machine learning together to improve the assessment of cyber threats.…”
Section: Introductionmentioning
confidence: 99%