Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security 2016
DOI: 10.1145/2976749.2978315
|View full text |Cite
|
Sign up to set email alerts
|

Acing the IOC Game

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0
1

Year Published

2018
2018
2021
2021

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 202 publications
(31 citation statements)
references
References 11 publications
0
15
0
1
Order By: Relevance
“…Another project called iACE [69], was tasked with identifying semantic elements (Named Entity Recognition, or NER) and extracting relations between them (Relation Extraction, or RE). The type of data that the authors wanted to collect were Indicators of Compromise or IOC.…”
Section: Information Extraction For Ctimentioning
confidence: 99%
“…Another project called iACE [69], was tasked with identifying semantic elements (Named Entity Recognition, or NER) and extracting relations between them (Relation Extraction, or RE). The type of data that the authors wanted to collect were Indicators of Compromise or IOC.…”
Section: Information Extraction For Ctimentioning
confidence: 99%
“…One area that has experienced development regarding automation is the ability for investigators to automatically detect indicators of crime. Liao et al, (2016) discussed a tool, iACE, that can be used to collect intelligence automatically from multiple sources and compare the relationships of the information gathered [17]. This can be extremely helpful to investigators performing online investigations.…”
Section: Automationmentioning
confidence: 99%
“…According to Liao et al, Gartner define Cyber Threat Intelligence (CTI) as "evidence-based knowledge, including context, mechanisms, indicators, implications and actionable advice, about an existing or emerging menace or hazard to assets that can be used to inform decisions regarding the subject's response to that menace or hazard" (Liao et al, 2016). Research on managing CTI by CTI-sharing (Brown, Gommers, & Serrano, 2015;Burger, Goodman, Kampanakis, & Zhu, 2014), and use of SIEM's systems to present and evaluate threats (Al Sabbagh & Kowalski, 2015), are relevant practice to consider when preparing for cyber exercises.…”
Section: Background and Relevant Literaturementioning
confidence: 99%