Graph-based visual analytics for cyber threat intelligence
نویسندگان
چکیده
منابع مشابه
Data-driven analytics for cyber-threat intelligence and information sharing
particular individual or entity. Although the speaker and content authors endeavor to provide accurate and timely information, there can be no guarantee that such information is accurate as of the date it is received or that it will continue to be accurate in the future. No one should act upon such information without appropriate professional advice after a thorough examination of the particula...
متن کاملSecurity Intelligence for Broadcast : Threat Analytics
This work presents an Adaptively Secure Broadcast Mechanism (ASBM) based on threats analytics and case based reasoning. It defines the security intelligence of a broadcast system comprehensively with a novel concept of collective intelligence. The algorithmic mechanism is analyzed from the perspectives of security intelligence, communication complexity, computational intelligence and business i...
متن کاملAdaptively Secure Broadcast: Threat Analytics & Security Intelligence
This work presents an Adaptively Secure Broadcast Mechanism (ASBM) based on threats analytics. It defines the security intelligence of a broadcast system comprehensively with a novel concept of collective intelligence. The algorithmic mechanism is analyzed from the perspectives of security intelligence, communication complexity and computational intelligence. The security intelligence of ASBM i...
متن کاملGraph-theoretic characterization of cyber-threat infrastructures
In this paper, we investigate cyber-threats and the underlying infrastructures. More precisely, we detect and analyze cyber-threat infrastructures for the purpose of unveiling key players (owners, domains, IPs, organizations, malware families, etc.) and the relationships between these players. To this end, we propose metrics to measure the badness of different infrastructure elements using grap...
متن کاملProvenance for Intelligence Analysis using Visual Analytics
In this paper we discuss various aspects in intelligence analysis relating to provenance and the new requirements resulting from the changed nature of terrorist activities. We propose a three-layer provenance model which relates the scope of provenance to the intelligence workflow and the idea of a ’provenance reasoning workspace’ for integrating provenance information into visual analytic tools.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Cybersecurity
سال: 2018
ISSN: 2523-3246
DOI: 10.1186/s42400-018-0017-4