Cyber Threat Intelligence Model: An Evaluation of Taxonomies and Sharing Platforms

To defend assets, data, and information against state-of-the-art and increasing number of cyber threats, cyber defenders should be one step ahead of these cybercriminals. This phase is possible if and only if the cyber defender gathers enough information about threats, risks, vulnerabilities, attack...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Hadi, Hassan Jalil, Riaz, Muhammad Adeen, Abbas, Zaheer, Nisa, Khaleeq Un
Format: Buchkapitel
Sprache:eng
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 33
container_issue
container_start_page 3
container_title
container_volume
creator Hadi, Hassan Jalil
Riaz, Muhammad Adeen
Abbas, Zaheer
Nisa, Khaleeq Un
description To defend assets, data, and information against state-of-the-art and increasing number of cyber threats, cyber defenders should be one step ahead of these cybercriminals. This phase is possible if and only if the cyber defender gathers enough information about threats, risks, vulnerabilities, attacks, and countermeasures on time or before an incident is going to happen. Cyberse- curity staff collects cyber threat information from multiple sources, extending from inter-organizations to publicly available sources, threat intelligence sharing platforms such as mailing lists or expert blogs, etc. Intelligence provides evidence-based knowledge regarding potential or existing threats. The advantages of threat intelligence are the effectiveness of security opera- tions and better efficiency in detection and prevention abilities. Good threat intelligence for cyber domains requires a knowledge base containing threat 4information and an effective way to present this knowledge. For this purpose, taxonomies, ontologies, and sharing platforms are used. The proposed cyber threat intelligence model enables cybersecurity experts to investigate their capabilities for threat intelligence and comprehend their position against the continuously changing landscape of cyber threats. Moreover, this model is used for analyzing and evaluating numerous existing sharing platform taxonomies, ontologies, and sharing platforms related to cyber threat intel- ligence. The results indicate a need for an ontology that covers the whole spectrum of CTI in the community of cybersecurity. Cybersecurity staff collects cyber threat information from multiple sources, extending from inter-organizations to publicly available sources, threat intelligence sharing platforms such as mailing lists or expert blogs, etc. Intelligence provides evidence-based knowledge regarding potential or existing threats. There has been very little research on public "information security" data sources and the sharing of threats. This chapter address gaps by analyzing publicly available threat intelligence sharing platforms. A consequence of this is the unavailability of public data security sources and their dependencies are not systematically or comprehensively reviewed by research and practice. Advanced persistent threats (APT) and the fast-changing cyberattack landscape mutual exchange of relevant cyber threats information. Mostly, exploiting weaknesses exists in multiple systems, products, or networks rather than la
doi_str_mv 10.1201/9781003373384-2
format Book Chapter
fullrecord <record><control><sourceid>proquest_infor</sourceid><recordid>TN_cdi_proquest_ebookcentralchapters_7215899_13_34</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>EBC7215899_13_34</sourcerecordid><originalsourceid>FETCH-LOGICAL-i177t-f874604734b234f653397e98fd4276b9ab61561678f98b7d92478ccf2fb61a8e3</originalsourceid><addsrcrecordid>eNpVkMtOwzAQRY0QiFfXbP0DBb-SsdlVFY9KRSAoa8tJbBpw7WKb19-TUjasRjNX92h0EDql5IwyQs8VSEoI58C5FGO2g0b_Lru_uwQgjAFIso-OKB9yVQOtD9Ao5xdCCJMVUE4O0cP0u7EJL5bJmoJnoVjv-2cbWotvY2f9BZ4EfPlh_LspfQw4OrwwXzHEVW8zNqHDj0uT-vCM770pLqZVPkF7zvhsR3_zGD1dXS6mN-P53fVsOpmPewpQxk6CqIkALhrGhasrzhVYJV0nGNSNMk1Nq5rWIJ2SDXSKCZBt65gbAiMtP0Zsy12n-PZuc9G2ifG1taEk49ulWRebsgZGK6mUplxzMZSut6U-bJ41nzH5Thfz7WNyyYS2zxtI1pTojW79T65m-mNgDiIY_wGie3Li</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>book_chapter</recordtype><pqid>EBC7215899_13_34</pqid></control><display><type>book_chapter</type><title>Cyber Threat Intelligence Model: An Evaluation of Taxonomies and Sharing Platforms</title><source>Ebook Central Perpetual and DDA</source><creator>Hadi, Hassan Jalil ; Riaz, Muhammad Adeen ; Abbas, Zaheer ; Nisa, Khaleeq Un</creator><contributor>Tawalbeh, Loai ; Maleh, Yassine ; Romdhani, Imed ; Alazab, Mamoun ; Tawalbeh, Loai ; Maleh, Yassine ; Romdhani, Imed ; Alazab, Mamoun</contributor><creatorcontrib>Hadi, Hassan Jalil ; Riaz, Muhammad Adeen ; Abbas, Zaheer ; Nisa, Khaleeq Un ; Tawalbeh, Loai ; Maleh, Yassine ; Romdhani, Imed ; Alazab, Mamoun ; Tawalbeh, Loai ; Maleh, Yassine ; Romdhani, Imed ; Alazab, Mamoun</creatorcontrib><description>To defend assets, data, and information against state-of-the-art and increasing number of cyber threats, cyber defenders should be one step ahead of these cybercriminals. This phase is possible if and only if the cyber defender gathers enough information about threats, risks, vulnerabilities, attacks, and countermeasures on time or before an incident is going to happen. Cyberse- curity staff collects cyber threat information from multiple sources, extending from inter-organizations to publicly available sources, threat intelligence sharing platforms such as mailing lists or expert blogs, etc. Intelligence provides evidence-based knowledge regarding potential or existing threats. The advantages of threat intelligence are the effectiveness of security opera- tions and better efficiency in detection and prevention abilities. Good threat intelligence for cyber domains requires a knowledge base containing threat 4information and an effective way to present this knowledge. For this purpose, taxonomies, ontologies, and sharing platforms are used. The proposed cyber threat intelligence model enables cybersecurity experts to investigate their capabilities for threat intelligence and comprehend their position against the continuously changing landscape of cyber threats. Moreover, this model is used for analyzing and evaluating numerous existing sharing platform taxonomies, ontologies, and sharing platforms related to cyber threat intel- ligence. The results indicate a need for an ontology that covers the whole spectrum of CTI in the community of cybersecurity. Cybersecurity staff collects cyber threat information from multiple sources, extending from inter-organizations to publicly available sources, threat intelligence sharing platforms such as mailing lists or expert blogs, etc. Intelligence provides evidence-based knowledge regarding potential or existing threats. There has been very little research on public "information security" data sources and the sharing of threats. This chapter address gaps by analyzing publicly available threat intelligence sharing platforms. A consequence of this is the unavailability of public data security sources and their dependencies are not systematically or comprehensively reviewed by research and practice. Advanced persistent threats (APT) and the fast-changing cyberattack landscape mutual exchange of relevant cyber threats information. Mostly, exploiting weaknesses exists in multiple systems, products, or networks rather than launching attacks on a single target. Trusted relationships raise confidence in the stakeholders that provide information that will be used as planned for trust linkages amongst sharing stakeholders are imperative to exchange cyber intelligence threats.</description><edition>1</edition><identifier>ISBN: 9788770227780</identifier><identifier>ISBN: 8770227780</identifier><identifier>EISBN: 9781003373384</identifier><identifier>EISBN: 1003373380</identifier><identifier>EISBN: 9781000846713</identifier><identifier>EISBN: 1000846695</identifier><identifier>EISBN: 9781000846690</identifier><identifier>EISBN: 1000846717</identifier><identifier>DOI: 10.1201/9781003373384-2</identifier><identifier>OCLC: 1381096716</identifier><identifier>LCCallNum: Q335 .B54 2022</identifier><language>eng</language><publisher>United Kingdom: River Publishers</publisher><ispartof>Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence, 2022, p.3-33</ispartof><rights>2022 River Publishers.</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttps://ebookcentral.proquest.com/covers/7215899-l.jpg</thumbnail><link.rule.ids>779,780,784,793,27925</link.rule.ids></links><search><contributor>Tawalbeh, Loai</contributor><contributor>Maleh, Yassine</contributor><contributor>Romdhani, Imed</contributor><contributor>Alazab, Mamoun</contributor><contributor>Tawalbeh, Loai</contributor><contributor>Maleh, Yassine</contributor><contributor>Romdhani, Imed</contributor><contributor>Alazab, Mamoun</contributor><creatorcontrib>Hadi, Hassan Jalil</creatorcontrib><creatorcontrib>Riaz, Muhammad Adeen</creatorcontrib><creatorcontrib>Abbas, Zaheer</creatorcontrib><creatorcontrib>Nisa, Khaleeq Un</creatorcontrib><title>Cyber Threat Intelligence Model: An Evaluation of Taxonomies and Sharing Platforms</title><title>Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence</title><description>To defend assets, data, and information against state-of-the-art and increasing number of cyber threats, cyber defenders should be one step ahead of these cybercriminals. This phase is possible if and only if the cyber defender gathers enough information about threats, risks, vulnerabilities, attacks, and countermeasures on time or before an incident is going to happen. Cyberse- curity staff collects cyber threat information from multiple sources, extending from inter-organizations to publicly available sources, threat intelligence sharing platforms such as mailing lists or expert blogs, etc. Intelligence provides evidence-based knowledge regarding potential or existing threats. The advantages of threat intelligence are the effectiveness of security opera- tions and better efficiency in detection and prevention abilities. Good threat intelligence for cyber domains requires a knowledge base containing threat 4information and an effective way to present this knowledge. For this purpose, taxonomies, ontologies, and sharing platforms are used. The proposed cyber threat intelligence model enables cybersecurity experts to investigate their capabilities for threat intelligence and comprehend their position against the continuously changing landscape of cyber threats. Moreover, this model is used for analyzing and evaluating numerous existing sharing platform taxonomies, ontologies, and sharing platforms related to cyber threat intel- ligence. The results indicate a need for an ontology that covers the whole spectrum of CTI in the community of cybersecurity. Cybersecurity staff collects cyber threat information from multiple sources, extending from inter-organizations to publicly available sources, threat intelligence sharing platforms such as mailing lists or expert blogs, etc. Intelligence provides evidence-based knowledge regarding potential or existing threats. There has been very little research on public "information security" data sources and the sharing of threats. This chapter address gaps by analyzing publicly available threat intelligence sharing platforms. A consequence of this is the unavailability of public data security sources and their dependencies are not systematically or comprehensively reviewed by research and practice. Advanced persistent threats (APT) and the fast-changing cyberattack landscape mutual exchange of relevant cyber threats information. Mostly, exploiting weaknesses exists in multiple systems, products, or networks rather than launching attacks on a single target. Trusted relationships raise confidence in the stakeholders that provide information that will be used as planned for trust linkages amongst sharing stakeholders are imperative to exchange cyber intelligence threats.</description><isbn>9788770227780</isbn><isbn>8770227780</isbn><isbn>9781003373384</isbn><isbn>1003373380</isbn><isbn>9781000846713</isbn><isbn>1000846695</isbn><isbn>9781000846690</isbn><isbn>1000846717</isbn><fulltext>true</fulltext><rsrctype>book_chapter</rsrctype><creationdate>2022</creationdate><recordtype>book_chapter</recordtype><recordid>eNpVkMtOwzAQRY0QiFfXbP0DBb-SsdlVFY9KRSAoa8tJbBpw7WKb19-TUjasRjNX92h0EDql5IwyQs8VSEoI58C5FGO2g0b_Lru_uwQgjAFIso-OKB9yVQOtD9Ao5xdCCJMVUE4O0cP0u7EJL5bJmoJnoVjv-2cbWotvY2f9BZ4EfPlh_LspfQw4OrwwXzHEVW8zNqHDj0uT-vCM770pLqZVPkF7zvhsR3_zGD1dXS6mN-P53fVsOpmPewpQxk6CqIkALhrGhasrzhVYJV0nGNSNMk1Nq5rWIJ2SDXSKCZBt65gbAiMtP0Zsy12n-PZuc9G2ifG1taEk49ulWRebsgZGK6mUplxzMZSut6U-bJ41nzH5Thfz7WNyyYS2zxtI1pTojW79T65m-mNgDiIY_wGie3Li</recordid><startdate>2022</startdate><enddate>2022</enddate><creator>Hadi, Hassan Jalil</creator><creator>Riaz, Muhammad Adeen</creator><creator>Abbas, Zaheer</creator><creator>Nisa, Khaleeq Un</creator><general>River Publishers</general><scope>FFUUA</scope></search><sort><creationdate>2022</creationdate><title>Cyber Threat Intelligence Model: An Evaluation of Taxonomies and Sharing Platforms</title><author>Hadi, Hassan Jalil ; Riaz, Muhammad Adeen ; Abbas, Zaheer ; Nisa, Khaleeq Un</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i177t-f874604734b234f653397e98fd4276b9ab61561678f98b7d92478ccf2fb61a8e3</frbrgroupid><rsrctype>book_chapters</rsrctype><prefilter>book_chapters</prefilter><language>eng</language><creationdate>2022</creationdate><toplevel>online_resources</toplevel><creatorcontrib>Hadi, Hassan Jalil</creatorcontrib><creatorcontrib>Riaz, Muhammad Adeen</creatorcontrib><creatorcontrib>Abbas, Zaheer</creatorcontrib><creatorcontrib>Nisa, Khaleeq Un</creatorcontrib><collection>ProQuest Ebook Central - Book Chapters - Demo use only</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Hadi, Hassan Jalil</au><au>Riaz, Muhammad Adeen</au><au>Abbas, Zaheer</au><au>Nisa, Khaleeq Un</au><au>Tawalbeh, Loai</au><au>Maleh, Yassine</au><au>Romdhani, Imed</au><au>Alazab, Mamoun</au><au>Tawalbeh, Loai</au><au>Maleh, Yassine</au><au>Romdhani, Imed</au><au>Alazab, Mamoun</au><format>book</format><genre>bookitem</genre><ristype>CHAP</ristype><atitle>Cyber Threat Intelligence Model: An Evaluation of Taxonomies and Sharing Platforms</atitle><btitle>Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence</btitle><date>2022</date><risdate>2022</risdate><spage>3</spage><epage>33</epage><pages>3-33</pages><isbn>9788770227780</isbn><isbn>8770227780</isbn><eisbn>9781003373384</eisbn><eisbn>1003373380</eisbn><eisbn>9781000846713</eisbn><eisbn>1000846695</eisbn><eisbn>9781000846690</eisbn><eisbn>1000846717</eisbn><abstract>To defend assets, data, and information against state-of-the-art and increasing number of cyber threats, cyber defenders should be one step ahead of these cybercriminals. This phase is possible if and only if the cyber defender gathers enough information about threats, risks, vulnerabilities, attacks, and countermeasures on time or before an incident is going to happen. Cyberse- curity staff collects cyber threat information from multiple sources, extending from inter-organizations to publicly available sources, threat intelligence sharing platforms such as mailing lists or expert blogs, etc. Intelligence provides evidence-based knowledge regarding potential or existing threats. The advantages of threat intelligence are the effectiveness of security opera- tions and better efficiency in detection and prevention abilities. Good threat intelligence for cyber domains requires a knowledge base containing threat 4information and an effective way to present this knowledge. For this purpose, taxonomies, ontologies, and sharing platforms are used. The proposed cyber threat intelligence model enables cybersecurity experts to investigate their capabilities for threat intelligence and comprehend their position against the continuously changing landscape of cyber threats. Moreover, this model is used for analyzing and evaluating numerous existing sharing platform taxonomies, ontologies, and sharing platforms related to cyber threat intel- ligence. The results indicate a need for an ontology that covers the whole spectrum of CTI in the community of cybersecurity. Cybersecurity staff collects cyber threat information from multiple sources, extending from inter-organizations to publicly available sources, threat intelligence sharing platforms such as mailing lists or expert blogs, etc. Intelligence provides evidence-based knowledge regarding potential or existing threats. There has been very little research on public "information security" data sources and the sharing of threats. This chapter address gaps by analyzing publicly available threat intelligence sharing platforms. A consequence of this is the unavailability of public data security sources and their dependencies are not systematically or comprehensively reviewed by research and practice. Advanced persistent threats (APT) and the fast-changing cyberattack landscape mutual exchange of relevant cyber threats information. Mostly, exploiting weaknesses exists in multiple systems, products, or networks rather than launching attacks on a single target. Trusted relationships raise confidence in the stakeholders that provide information that will be used as planned for trust linkages amongst sharing stakeholders are imperative to exchange cyber intelligence threats.</abstract><cop>United Kingdom</cop><pub>River Publishers</pub><doi>10.1201/9781003373384-2</doi><oclcid>1381096716</oclcid><tpages>31</tpages><edition>1</edition></addata></record>
fulltext fulltext
identifier ISBN: 9788770227780
ispartof Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence, 2022, p.3-33
issn
language eng
recordid cdi_proquest_ebookcentralchapters_7215899_13_34
source Ebook Central Perpetual and DDA
title Cyber Threat Intelligence Model: An Evaluation of Taxonomies and Sharing Platforms
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-04T15%3A37%3A49IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_infor&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=bookitem&rft.atitle=Cyber%20Threat%20Intelligence%20Model:%20An%20Evaluation%20of%20Taxonomies%20and%20Sharing%20Platforms&rft.btitle=Big%20Data%20Analytics%20and%20Intelligent%20Systems%20for%20Cyber%20Threat%20Intelligence&rft.au=Hadi,%20Hassan%20Jalil&rft.date=2022&rft.spage=3&rft.epage=33&rft.pages=3-33&rft.isbn=9788770227780&rft.isbn_list=8770227780&rft_id=info:doi/10.1201/9781003373384-2&rft_dat=%3Cproquest_infor%3EEBC7215899_13_34%3C/proquest_infor%3E%3Curl%3E%3C/url%3E&rft.eisbn=9781003373384&rft.eisbn_list=1003373380&rft.eisbn_list=9781000846713&rft.eisbn_list=1000846695&rft.eisbn_list=9781000846690&rft.eisbn_list=1000846717&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=EBC7215899_13_34&rft_id=info:pmid/&rfr_iscdi=true