2017
DOI: 10.1007/978-3-319-72359-4_35
|View full text |Cite
|
Sign up to set email alerts
|

Relevance Filtering for Shared Cyber Threat Intelligence (Short Paper)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
11
0
1

Year Published

2019
2019
2022
2022

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(12 citation statements)
references
References 5 publications
0
11
0
1
Order By: Relevance
“…Low-level approaches are those that describe threats in detail. Such approaches may be based on the use of the list of attacks [15][16][17][18][19] or the list of attack scenarios [20]. Some approaches come down to analyzing the exploitation of vulnerabilities in the system [21][22][23].…”
Section: Related Workmentioning
confidence: 99%
“…Low-level approaches are those that describe threats in detail. Such approaches may be based on the use of the list of attacks [15][16][17][18][19] or the list of attack scenarios [20]. Some approaches come down to analyzing the exploitation of vulnerabilities in the system [21][22][23].…”
Section: Related Workmentioning
confidence: 99%
“…A CTIP is relevant to an organization when its contained threat-related information relates to the organization’s context (e.g., location, domain, business process). A relevant CTIP is expected to be actionable to the organization consuming it [ 11 , 13 , 14 ]. A CTIP is actionable when the utilization of its content (i.e., the threat-related information that it contains) leads to a decision or an action to control an ongoing, imminent, or a future threat.…”
Section: Introductionmentioning
confidence: 99%
“…A CTIP is actionable when the utilization of its content (i.e., the threat-related information that it contains) leads to a decision or an action to control an ongoing, imminent, or a future threat. The necessity of filtering to avoid overload and “distilling the signal from the noise” has been extensively pointed out in the literature [ 13 , 14 , 15 , 16 , 17 , 18 ]. The lack of filtering overwhelms organizations’ processing capabilities [ 11 ] and demands expertise for narrowing down shared CTIP manually [ 14 ].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…As the basis of the threat model, the authors most often use the list of attacks [11][12][13][14][15], the list of attack scenarios [16], the description of exploitation of vulnerabilities [17,18], and the description of attackers [19]. This approach does not allow to determine the list of threats.…”
Section: Introductionmentioning
confidence: 99%