2021 International Conference on Recent Advances in Mathematics and Informatics (ICRAMI) 2021
DOI: 10.1109/icrami52622.2021.9585984
|View full text |Cite
|
Sign up to set email alerts
|

Proactive Ontology-based Cyber Threat Intelligence Analytic

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 10 publications
0
2
0
Order By: Relevance
“…The goal of CTO considers the extraction of relevant attack instances and threat information from data to ensure consistency and accuracy in the cybersecurity concepts for knowledge reuse in the threat intelligence domain [24]. The work of Ulicny et al [25] is considered among the first in this field and has taken an important step forward. The authors have manually constructed a cyber threat intelligence (CTI) ontology based on structured threat information expression (STIX) to support cybersecurity operators in their cyber threat hunting tasks.…”
Section: Threat Ontology Constructionmentioning
confidence: 99%
See 1 more Smart Citation
“…The goal of CTO considers the extraction of relevant attack instances and threat information from data to ensure consistency and accuracy in the cybersecurity concepts for knowledge reuse in the threat intelligence domain [24]. The work of Ulicny et al [25] is considered among the first in this field and has taken an important step forward. The authors have manually constructed a cyber threat intelligence (CTI) ontology based on structured threat information expression (STIX) to support cybersecurity operators in their cyber threat hunting tasks.…”
Section: Threat Ontology Constructionmentioning
confidence: 99%
“…The authors have manually constructed a cyber threat intelligence (CTI) ontology based on structured threat information expression (STIX) to support cybersecurity operators in their cyber threat hunting tasks. Unfortunately, the authors have overlooked the vocabulary overlapping problem [25]. Unified Cybersecurity Ontology (UCO) was proposed by Syed et al [26] in 2016.…”
Section: Threat Ontology Constructionmentioning
confidence: 99%