Graph-based visual analytics for cyber threat intelligence

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Data-driven analytics for cyber-threat intelligence and information sharing

particular individual or entity. Although the speaker and content authors endeavor to provide accurate and timely information, there can be no guarantee that such information is accurate as of the date it is received or that it will continue to be accurate in the future. No one should act upon such information without appropriate professional advice after a thorough examination of the particula...

متن کامل

Security Intelligence for Broadcast : Threat Analytics

This work presents an Adaptively Secure Broadcast Mechanism (ASBM) based on threats analytics and case based reasoning. It defines the security intelligence of a broadcast system comprehensively with a novel concept of collective intelligence. The algorithmic mechanism is analyzed from the perspectives of security intelligence, communication complexity, computational intelligence and business i...

متن کامل

Adaptively Secure Broadcast: Threat Analytics & Security Intelligence

This work presents an Adaptively Secure Broadcast Mechanism (ASBM) based on threats analytics. It defines the security intelligence of a broadcast system comprehensively with a novel concept of collective intelligence. The algorithmic mechanism is analyzed from the perspectives of security intelligence, communication complexity and computational intelligence. The security intelligence of ASBM i...

متن کامل

Graph-theoretic characterization of cyber-threat infrastructures

In this paper, we investigate cyber-threats and the underlying infrastructures. More precisely, we detect and analyze cyber-threat infrastructures for the purpose of unveiling key players (owners, domains, IPs, organizations, malware families, etc.) and the relationships between these players. To this end, we propose metrics to measure the badness of different infrastructure elements using grap...

متن کامل

Provenance for Intelligence Analysis using Visual Analytics

In this paper we discuss various aspects in intelligence analysis relating to provenance and the new requirements resulting from the changed nature of terrorist activities. We propose a three-layer provenance model which relates the scope of provenance to the intelligence workflow and the idea of a ’provenance reasoning workspace’ for integrating provenance information into visual analytic tools.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Cybersecurity

سال: 2018

ISSN: 2523-3246

DOI: 10.1186/s42400-018-0017-4