2021
DOI: 10.3390/electronics10070818
|View full text |Cite
|
Sign up to set email alerts
|

inTIME: A Machine Learning-Based Framework for Gathering and Leveraging Web Data to Cyber-Threat Intelligence

Abstract: In today’s world, technology has become deep-rooted and more accessible than ever over a plethora of different devices and platforms, ranging from company servers and commodity PCs to mobile phones and wearables, interconnecting a wide range of stakeholders such as households, organizations and critical infrastructures. The sheer volume and variety of the different operating systems, the device particularities, the various usage domains and the accessibility-ready nature of the platforms creates a vast and com… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 45 publications
(17 citation statements)
references
References 63 publications
0
16
0
1
Order By: Relevance
“…In our literature review, we found that researchers are starting to apply supervised machine learning [61], natural language processing (NLP) [47,55], and deep learning [52] techniques to process shared CTI. However, we also found that applying an expert evaluation to the raw data, or using production rules, was far more popular.…”
Section: Process: Extracting Insights From Misp Datamentioning
confidence: 99%
“…In our literature review, we found that researchers are starting to apply supervised machine learning [61], natural language processing (NLP) [47,55], and deep learning [52] techniques to process shared CTI. However, we also found that applying an expert evaluation to the raw data, or using production rules, was far more popular.…”
Section: Process: Extracting Insights From Misp Datamentioning
confidence: 99%
“…e INTIME tool in Koloveas et al's work [32] provides a framework to identify and analyze cyber threats in specific cybersecurity topics (Internet of ings (IoT)) to share knowledge among cybersecurity organizations.…”
Section: Detecting and Predictingmentioning
confidence: 99%
“…Following it, the crawlers try to use the Web mining methods. Finally, crawlers perform distributed denial of service and remove the sites for quite a while (Vishwakarma and Jain, 2020; Rahman et al , 2020; Koloveas et al , 2021; Xu et al , 2018). It is disagreeable in any circumstance, especially in banking, as the data is sensitive.…”
Section: Related Workmentioning
confidence: 99%