2019
DOI: 10.3390/fi11070162
|View full text |Cite
|
Sign up to set email alerts
|

Improving Forensic Triage Efficiency through Cyber Threat Intelligence

Abstract: The complication of information technology and the proliferation of heterogeneous security devices that produce increased volumes of data coupled with the ever-changing threat landscape challenges have an adverse impact on the efficiency of information security controls and digital forensics, as well as incident response approaches. Cyber Threat Intelligence (CTI)and forensic preparedness are the two parts of the so-called managed security services that defendants can employ to repel, mitigate or investigate s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(8 citation statements)
references
References 21 publications
0
7
0
Order By: Relevance
“…Extended next level research was also conducted in 2019 which was improved version in the study of "A Generic Digital Forensic Readiness Model for BYOD using Honeypot Technology [23]". Also in same direction Intelligent Threat Platform was another study for detecting the incident where accuracy has been analyzed [25]. To increases the accuracy level of malicious activities using audit logs collected from Intelligent Threat sources, accuracy has been analyzed as 90.73%, 96.16 and 93.71% [25].…”
Section: ) Deception Technologymentioning
confidence: 99%
See 1 more Smart Citation
“…Extended next level research was also conducted in 2019 which was improved version in the study of "A Generic Digital Forensic Readiness Model for BYOD using Honeypot Technology [23]". Also in same direction Intelligent Threat Platform was another study for detecting the incident where accuracy has been analyzed [25]. To increases the accuracy level of malicious activities using audit logs collected from Intelligent Threat sources, accuracy has been analyzed as 90.73%, 96.16 and 93.71% [25].…”
Section: ) Deception Technologymentioning
confidence: 99%
“…Also in same direction Intelligent Threat Platform was another study for detecting the incident where accuracy has been analyzed [25]. To increases the accuracy level of malicious activities using audit logs collected from Intelligent Threat sources, accuracy has been analyzed as 90.73%, 96.16 and 93.71% [25].…”
Section: ) Deception Technologymentioning
confidence: 99%
“…Based on this naive approach, Eberle et al [41] proposed a detector algorithm that applied the graph-based anomaly detection technique, as well as an anomalous insertion, modification, and deletion environment. The authors derived the main features, such as the calculation of real intelligence specific [42] to malicious insiders, and directed their focus towards the capture of insiders in the real world. The authors also derived the formation of synthetic security data applicable to each organization, involving reasonable computational overhead due to the improved algorithm.…”
Section: Insider Threats Based On Non-machine Learning Approach: Statistical Schemementioning
confidence: 99%
“…The attack lasted for three weeks, disrupting emails, real estate sales, water bills, health alerts, and several other services. The annual cost of suffering is increasing rapidly; in fact, the experts have projected it to rise to $6 trillion by 2021 1 [5], [6], [7]. Computer forensics techniques are used in civil, administrative, and criminal cases; however, an intelligent selection of tools is vital in criminal investigations.…”
Section: Introductionmentioning
confidence: 99%