The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2017
DOI: 10.1016/s1361-3723(17)30031-3
|View full text |Cite
|
Sign up to set email alerts
|

Building an effective threat intelligence platform that would make Einstein proud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 0 publications
0
4
0
Order By: Relevance
“…Conversely, an associated URL in threat data might have been used many times. Therefore, threat intelligence must be extracted from the threat data with possible IOCs and their contextual information [3,16,52,46]. Table 1 shows examples of some of these websites that provide threat feeds and are utilized for gathering OSINT.…”
Section: Source Descriptionmentioning
confidence: 99%
See 2 more Smart Citations
“…Conversely, an associated URL in threat data might have been used many times. Therefore, threat intelligence must be extracted from the threat data with possible IOCs and their contextual information [3,16,52,46]. Table 1 shows examples of some of these websites that provide threat feeds and are utilized for gathering OSINT.…”
Section: Source Descriptionmentioning
confidence: 99%
“…Using threat intelligence platforms, companies can improve their countermeasures against cyber-attacks and prepare detection and prevention mechanisms. In recent years, the cybersecurity communities have emphasized building common threat intelligence platforms to share threat information in a unified and structured way, and make CTI actionable [18,22,31,33,46,52]. Various specifications and protocols such as STIX, TAXII, Cybox, CWE, CAPEC and CVE are widely used to describe and share threat information through common platforms [5,6,12,37].…”
Section: Source Descriptionmentioning
confidence: 99%
See 1 more Smart Citation
“…Threat intelligence (TI) is closely related to cybersecurity IS and SA. It embraces all evidence‐based knowledge about existing or emerging threats, which can be used to support cyberdefense decisions . TI has recently attracted great attention, including vendors of security solutions who offer diverse TI solutions …”
Section: Collaborative Security Information Sharing Situation Awarementioning
confidence: 99%