2018
DOI: 10.1016/j.cose.2017.09.001
|View full text |Cite
|
Sign up to set email alerts
|

A survey on technical threat intelligence in the age of sophisticated cyber attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
230
0
26

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 311 publications
(256 citation statements)
references
References 14 publications
0
230
0
26
Order By: Relevance
“…These sources can include data generated outside of an organization such as governmental projects, open source, and publiclyavailable databases, as well as commercial providers [21]. However, data for a security threat intelligence program can also be generated internally within an organization [10,12,21]. For example, network monitors, host-based indicators, and an organization's security incident response team [10,12,21].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…These sources can include data generated outside of an organization such as governmental projects, open source, and publiclyavailable databases, as well as commercial providers [21]. However, data for a security threat intelligence program can also be generated internally within an organization [10,12,21]. For example, network monitors, host-based indicators, and an organization's security incident response team [10,12,21].…”
Section: Related Workmentioning
confidence: 99%
“…However, data for a security threat intelligence program can also be generated internally within an organization [10,12,21]. For example, network monitors, host-based indicators, and an organization's security incident response team [10,12,21]. The purpose of this team is to minimize the effects of an incident and manage an organization's return to an acceptable security posture [14].…”
Section: Related Workmentioning
confidence: 99%
“…Attacks have changed visibly with respect to their target, function, range, and form. Modern, advanced threats are multivectored and multistaged as they utilize various attack vectors, including email, portable media, or vulnerable web protocols, and are conducted in several stages, often extending over a longer time ( advanced persistent threats or APTs ) . Next to classical, general attacks that affect large numbers of arbitrary computer systems, highly targeted and specialized cyberthreats have been introduced ( targeted attacks ) .…”
Section: Introductionmentioning
confidence: 99%
“…Such attacks are not any longer conducted by malevolent individuals. Large, organized groups of specialists that aim at gaining real financial profits or political benefits stay behind them instead . Also, the extensive expertise necessary for conducting such sophisticated attacks campaigns within a reasonable time can be only acquired by teams.…”
Section: Introductionmentioning
confidence: 99%
“…Although TI is being increasingly adopted, there is little consensus on what it actually is or how to use it. Without any real understanding of this need, organizations risk investing large amounts of time and money without solving existing security problems [16][17][18].…”
Section: Related Workmentioning
confidence: 99%