2018
DOI: 10.1587/transinf.2017icp0015
|View full text |Cite
|
Sign up to set email alerts
|

Modeling Attack Activity for Integrated Analysis of Threat Information

Abstract: Cyber attacks targeting specific victims use multiple intrusion routes and various attack methods. In order to combat such diversified cyber attacks, Threat Intelligence is attracting attention. Attack activities, vulnerability information and other threat information are gathered, analyzed and organized in threat intelligence and it enables organizations to understand their risks. Integrated analysis of the threat information is needed to compose the threat intelligence. Threat information can be found in inc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…Three models which are widely used by threat hunters are the Diamond model of intrusion analysis, cyber kill chain and MITRE ATT&CK Matrix [3,5,6,7]. While there are a few papers published in threat hunting in ICS networks [44,45], they did not investigate how Diamond models and MITRE ATT&CK Matrix can be deployed in threat hunting in ICS networks.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Three models which are widely used by threat hunters are the Diamond model of intrusion analysis, cyber kill chain and MITRE ATT&CK Matrix [3,5,6,7]. While there are a few papers published in threat hunting in ICS networks [44,45], they did not investigate how Diamond models and MITRE ATT&CK Matrix can be deployed in threat hunting in ICS networks.…”
Section: Related Workmentioning
confidence: 99%
“…A Diamond model also uses meta-features to be able to model further details of an intrusion event. In a Diamond model created for a single intrusion event, each core feature is given a corresponding confidence value showing that how confident the analyst is that the feature is correct [3,6,7,22,23].…”
Section: B Diamond Modelmentioning
confidence: 99%
See 1 more Smart Citation