Methodological Framework to Collect, Process, Analyze and Visualize Cyber Threat Intelligence Data
نویسندگان
چکیده
Cyber attacks have increased in frequency recent years, affecting small, medium and large companies, creating an urgent need for tools capable of helping the mitigation such threats. Thus, with increasing number cyber attacks, we a amount threat data from heterogeneous sources that needs to be ingested, processed analyzed order obtain useful insights their mitigation. This study proposes methodological framework collect, organize, filter, share visualize cyber-threat mitigate fix vulnerabilities, based on eight-step intelligence model timeline visualization threats information analytic insights. We developed tool address which security analyst can insert data, analyze them create better contextualization threat. Results show facilitation understanding context are inserted, rendering vulnerabilities more effective.
منابع مشابه
Data-driven analytics for cyber-threat intelligence and information sharing
particular individual or entity. Although the speaker and content authors endeavor to provide accurate and timely information, there can be no guarantee that such information is accurate as of the date it is received or that it will continue to be accurate in the future. No one should act upon such information without appropriate professional advice after a thorough examination of the particula...
متن کاملCert Data to Analyze International Cyber Security
With the increasing interconnection of computer networks and sophistication of cyber attacks, it is important to understand the dynamics of such situations, especially in regards to cyber international relations. The Explorations in Cyber International Relations (ECIR) Data Dashboard Project is an initiative to gather worldwide cybersecurity data publicly provided by nation-level Computer Emerg...
متن کاملUsing Web3d Technologies to Visualize and Analyze Caesar Data
The CAESAR (Civilian American and European Surface Anthropometry Resource) project completed in 2002 has collected 3D scans of over 5000 subjects. We have created several 3D visualization tools, utilizing the Virtual Reality Modeling Language (VRML) to provide 3D access via the Web. In addition to simply viewing the 3D scans we have augmented the display of the body with interactive anthropomet...
متن کاملMethTools--a toolbox to visualize and analyze DNA methylation data.
The Bisulfite Genomic Sequencing technique has found wide acceptance for the generation of DNA-methylation maps with single-base resolution. The method is based on the selective deamination of cytosine to uracil (and subsequent conversion to thymine via PCR), whereas 5-methylcytosine residues remain unchanged. Methylation maps are created by the comparison of bisulfite converted sequences with ...
متن کاملIntelFlow: Towards adding Cyber Threat Intelligence to Software Defined Networks
Security is a major concern in computer networking, which faces increasing threats as the commercial Internet and related economies continue to grow. Our work aims to explore advances in Cyber Threat Intelligence (CTI) in the context of Software Defined Networking (SDN). More specifically, we propose IntelFlow, an intelligence detection system for Software Defined Networking (SDN) that follows ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Applied sciences
سال: 2022
ISSN: ['2076-3417']
DOI: https://doi.org/10.3390/app12031205