Proceedings of the 16th International Conference on Availability, Reliability and Security 2021
DOI: 10.1145/3465481.3470024
|View full text |Cite
|
Sign up to set email alerts
|

Ontology-based Cyber Risk Monitoring Using Cyber Threat Intelligence

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(4 citation statements)
references
References 14 publications
0
1
0
Order By: Relevance
“…For example, Syam et al [5] propose a trusted response management ecosystem where STIX serves as a unified language for threat intelligence providers to seamlessly use CTIs for defensive actions. STIX also plays a crucial role in formalizing ontology for CTI, enabling connections between security events and CTIs, and allowing the inference of new knowledge about potential threats [40]. Prominent entities in the cybersecurity sector, such as SANS [31] and Intel [30], incorporate STIX indicators into their threat-hunting methodologies.…”
Section: Why Do We Focus On Stix?mentioning
confidence: 99%
“…For example, Syam et al [5] propose a trusted response management ecosystem where STIX serves as a unified language for threat intelligence providers to seamlessly use CTIs for defensive actions. STIX also plays a crucial role in formalizing ontology for CTI, enabling connections between security events and CTIs, and allowing the inference of new knowledge about potential threats [40]. Prominent entities in the cybersecurity sector, such as SANS [31] and Intel [30], incorporate STIX indicators into their threat-hunting methodologies.…”
Section: Why Do We Focus On Stix?mentioning
confidence: 99%
“…Gao et al [77] introduced the use of open-source cyber threat intelligence (OSCTI) to analyze APT attacks, which not only helped detect and deal with APT attacks but also improved the understanding and analysis capabilities of threat intelligence to protect network security. In [78,79], structured threat information expression (STIXTM) was used to achieve network threat intelligence and information sharing, addressing the hidden dangers of using a large amount of complex network security information today. The authors [80] used STRIDE to analyze and evaluate security threats faced by systems or applications, helping developers identify and mitigate potential security risks at the design stage and improving the security of systems or applications.…”
Section: Threat Intelligence Modelmentioning
confidence: 99%
“…By using this ontology to create a malware knowledge map and extract the hidden information from it, Rastogi et al (2020) created a malware ontology called MALONT. A security ontology for risk monitoring was proposed by Merah et al (2021) using Cyber Threat Intelligence (CTI), highlighting the interdependence of risk concepts that could expand the use of Structured Threat Information Expression (STIX). Zhang et al (2021) proposed a RIoTSCO Internet of Things security ontology integrating multi-source heterogeneous data.…”
Section: Related Workmentioning
confidence: 99%
“…The ontology for ICS asset threat in this section is inspired by multiple ontologies Li et al, 2021;Rastogi et al, 2020;Merah et al, 2021). After being combined with some concepts and adjusted by a number of details, the ontology here is more suitable for the description of assets and their environment in ICS.…”
Section: Ics Asset Threat Ontology and Reasoningmentioning
confidence: 99%