Methodological Framework to Collect, Process, Analyze and Visualize Cyber Threat Intelligence Data

نویسندگان

چکیده

Cyber attacks have increased in frequency recent years, affecting small, medium and large companies, creating an urgent need for tools capable of helping the mitigation such threats. Thus, with increasing number cyber attacks, we a amount threat data from heterogeneous sources that needs to be ingested, processed analyzed order obtain useful insights their mitigation. This study proposes methodological framework collect, organize, filter, share visualize cyber-threat mitigate fix vulnerabilities, based on eight-step intelligence model timeline visualization threats information analytic insights. We developed tool address which security analyst can insert data, analyze them create better contextualization threat. Results show facilitation understanding context are inserted, rendering vulnerabilities more effective.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Data-driven analytics for cyber-threat intelligence and information sharing

particular individual or entity. Although the speaker and content authors endeavor to provide accurate and timely information, there can be no guarantee that such information is accurate as of the date it is received or that it will continue to be accurate in the future. No one should act upon such information without appropriate professional advice after a thorough examination of the particula...

متن کامل

Cert Data to Analyze International Cyber Security

With the increasing interconnection of computer networks and sophistication of cyber attacks, it is important to understand the dynamics of such situations, especially in regards to cyber international relations. The Explorations in Cyber International Relations (ECIR) Data Dashboard Project is an initiative to gather worldwide cybersecurity data publicly provided by nation-level Computer Emerg...

متن کامل

Using Web3d Technologies to Visualize and Analyze Caesar Data

The CAESAR (Civilian American and European Surface Anthropometry Resource) project completed in 2002 has collected 3D scans of over 5000 subjects. We have created several 3D visualization tools, utilizing the Virtual Reality Modeling Language (VRML) to provide 3D access via the Web. In addition to simply viewing the 3D scans we have augmented the display of the body with interactive anthropomet...

متن کامل

MethTools--a toolbox to visualize and analyze DNA methylation data.

The Bisulfite Genomic Sequencing technique has found wide acceptance for the generation of DNA-methylation maps with single-base resolution. The method is based on the selective deamination of cytosine to uracil (and subsequent conversion to thymine via PCR), whereas 5-methylcytosine residues remain unchanged. Methylation maps are created by the comparison of bisulfite converted sequences with ...

متن کامل

IntelFlow: Towards adding Cyber Threat Intelligence to Software Defined Networks

Security is a major concern in computer networking, which faces increasing threats as the commercial Internet and related economies continue to grow. Our work aims to explore advances in Cyber Threat Intelligence (CTI) in the context of Software Defined Networking (SDN). More specifically, we propose IntelFlow, an intelligence detection system for Software Defined Networking (SDN) that follows ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Applied sciences

سال: 2022

ISSN: ['2076-3417']

DOI: https://doi.org/10.3390/app12031205