2020
DOI: 10.1007/s10207-020-00490-y
|View full text |Cite
|
Sign up to set email alerts
|

Measuring and visualizing cyber threat intelligence quality

Abstract: The very raison d'être of cyber threat intelligence (CTI) is to provide meaningful knowledge about cyber security threats. The exchange and collaborative generation of CTI by the means of sharing platforms has proven to be an important aspect of practical application. It is evident to infer that inaccurate, incomplete, or outdated threat intelligence is a major problem as only high-quality CTI can be helpful to detect and defend against cyber attacks. Additionally, while the amount of available CTI is increasi… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 48 publications
(23 citation statements)
references
References 21 publications
0
22
0
1
Order By: Relevance
“…If the information matches with that of the recipient, the CTIP is relevant to the recipient. Another notable effort is [ 21 ], which also suggested the use of specific characteristics, such as the industry sector in the Identity SDO, that are included in STIX objects to achieve filtering (similar to the domain-tagging approach). In case that a CTIP and an organization share the same characteristics, the CTIP is relevant to the organization.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…If the information matches with that of the recipient, the CTIP is relevant to the recipient. Another notable effort is [ 21 ], which also suggested the use of specific characteristics, such as the industry sector in the Identity SDO, that are included in STIX objects to achieve filtering (similar to the domain-tagging approach). In case that a CTIP and an organization share the same characteristics, the CTIP is relevant to the organization.…”
Section: Discussionmentioning
confidence: 99%
“…Keyword searching is offered by most CTIP repositories [ 14 ]. Domain tagging concerns the categorization of shared CTIPs into domains, such as finance and education, with the utmost goal of presenting them to the organizations belonging to the same domain [ 21 ]. Keyword searching is labor-intensive, error-prone, and demands expertise in order to define the proper keywords [ 13 , 14 , 15 ], while the use of domain tagging is insufficient since current approaches only classify CTIP into a few arbitrary, high-level domains that are not sufficiently specific.…”
Section: Introductionmentioning
confidence: 99%
“…To this end, a second future direction is how to assure CTI quality. Whereas first approaches aim to analyze and propose quality metrics for CTI (Schlette et al 2020), the subjective nature and the diversity of threat information demand further research. Based upon data analysis, a stronger data-centric focus must take the entire CTI life cycle and organizational dependencies into account.…”
Section: Open Problems and Future Directionsmentioning
confidence: 99%
“…The verification needs to be as objective and meaningful as possible to provide guidance for buyers, since the actual data are encrypted. The following items serve as verification guidelines: -consistency with metadata of the seller's previous incidents -similarity check for incident metadata and verified incidents -assessment of various threat intelligence quality indicators [24] After receiving the incident data, each verifier independently performs a verification of the contained information. A basic consistency check using metadata of the seller's previous incidents verifies that the incident originates from the same industry.…”
Section: Verificationmentioning
confidence: 99%
“…To achieve this, the implemented questions are based on objective CTI data quality indicators developed for STIX2 [24]. The quality criteria are divided into three major domains.…”
Section: Verificationmentioning
confidence: 99%