2019
DOI: 10.1007/s10207-019-00433-2
|View full text |Cite
|
Sign up to set email alerts
|

Leveraging cyber threat intelligence for a dynamic risk framework

Abstract: One of the most important goals in an organization is to have risks under an acceptance level along the time. All organizations are exposed to real-time security threats that could have an impact on their risk exposure levels harming the entire organization, their customers and their reputation. New emerging techniques, tactics and procedures (TTP) which remain undetected, the complexity and decentralization of organization assets, the great number of vulnerabilities proportional to the number of new type of d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
33
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 49 publications
(34 citation statements)
references
References 12 publications
0
33
0
1
Order By: Relevance
“…It uses semantic variables in an OWL 2 version of STIX™v2 format, to support complex representations with more expressivity. Rules are provided in the format of semantic rule language rules (SWRL 3 ), as proposed by Riesco et al [9]. The use of ontologies, by definition, enables the interoperability and unambiguity of concepts.…”
Section: Approach and Resultsmentioning
confidence: 99%
“…It uses semantic variables in an OWL 2 version of STIX™v2 format, to support complex representations with more expressivity. Rules are provided in the format of semantic rule language rules (SWRL 3 ), as proposed by Riesco et al [9]. The use of ontologies, by definition, enables the interoperability and unambiguity of concepts.…”
Section: Approach and Resultsmentioning
confidence: 99%
“…1, we can think of a power plant operating a state-of-the-art security operations center (SOC). At some point in time, the alerting mechanisms 2 https://www.json.org/. of the plant's intrusion detection systems (IDS) indicate an ongoing attack affecting various critical systems.…”
Section: Motivational Examplementioning
confidence: 99%
“…The last years have seen the emergence of sharing information about threats, cyber attacks, and incidents by organizations. The urge to join forces in the fight against cyber criminals originates from an ever-increasing number of attacks and the related risks for organizations [1,2]. Not only the number but also the complexity of attacks has increased over the years resulting in successful intrusions with more severe forms of security breaches.…”
Section: Introductionmentioning
confidence: 99%
“…Analyzing and sharing information obtained through TI in an effective manner requires common representation, standards, and exchange protocols. Again, the use of ontologies arises as an interesting approach to address this problem, and therefore, several authors have carried out studies and developments in this sense [12][13][14][15][16].…”
Section: Related Workmentioning
confidence: 99%
“…as a very interesting contribution, for example, to the verification of the impact of supplier change. Most recently, Riesco R. et al proposed in [15] a new dynamic risk management and threat intelligence methodology for generating inference rules to be used in different application domains. The feasibility of this research was addressed in [16], where the authors proposed blockchain and Smart contracts as a solution for fostering cyber threat and risk intelligence exchange of information.…”
Section: Related Workmentioning
confidence: 99%