2016 25th International Conference on Computer Communication and Networks (ICCCN) 2016
DOI: 10.1109/icccn.2016.7568578
|View full text |Cite
|
Sign up to set email alerts
|

Strategic Cyber Threat Intelligence Sharing: A Case Study of IDS Logs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 2 publications
0
7
0
Order By: Relevance
“…Some community-driven efforts attempt to detect and prevent botnets by providing databases with known spam bots such as the The Spamhaus Project [218] and IBM X-Force exchange [219], where IT researchers can report suspected IP addresses and see a list of IP addresses along with a % indicator of how likely the IP is used for C&C. Furthermore Structured Threat Information eXpression (STIX) is used for exchanging cyber threat intelligence (CTI) as described in [220]. Dog et al [221] examined the value of sharing IDS logs between enterprises and not just sharing IP addresses, domains and specific attacks. The study shows that intelligence sharing can provide good strategic threat information for enterprises.…”
Section: Community Driven Tools Against Botnetsmentioning
confidence: 99%
“…Some community-driven efforts attempt to detect and prevent botnets by providing databases with known spam bots such as the The Spamhaus Project [218] and IBM X-Force exchange [219], where IT researchers can report suspected IP addresses and see a list of IP addresses along with a % indicator of how likely the IP is used for C&C. Furthermore Structured Threat Information eXpression (STIX) is used for exchanging cyber threat intelligence (CTI) as described in [220]. Dog et al [221] examined the value of sharing IDS logs between enterprises and not just sharing IP addresses, domains and specific attacks. The study shows that intelligence sharing can provide good strategic threat information for enterprises.…”
Section: Community Driven Tools Against Botnetsmentioning
confidence: 99%
“…That are Strategic Threat Intelligence, Tactical Threat Intelligence, Technical Threat Intelligence and Operational Threat Intelligence. Strategic Threat Intelligence offer the overview of the threat status of the organization (Dog et al, 2016;Tounsi & Rais, 2018). It is designed to provide information for high-level decisions made by managers and other decision makers in the organization.…”
Section: Strategic Threat Intelligencementioning
confidence: 99%
“…Before selecting the strategic of the threat intelligence, it is important to decide the organization's potential uses cases (Dog et al, 2016). Instead of select a strategic of the threat intelligence and try to accord and implement in the organization use cases to the strengths of the strategic.…”
Section: Implementation Of Strategic Threat Intelligencementioning
confidence: 99%
“…Nevertheless, strategic intelligence is rarely shared because it could reveal information about the stakeholders strategic plans [21]. The researchers in [39] presented a use case for strategic CTI sharing from Intrusion Detection System (IDS) logs. The data was collected from sources such as, honeypots, incident reports, and logs.…”
Section: Industry Sector Sharingmentioning
confidence: 99%