2016 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS) 2016
DOI: 10.1109/ntms.2016.7792484
|View full text |Cite
|
Sign up to set email alerts
|

Towards a Big Data Architecture for Facilitating Cyber Threat Intelligence

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
1
0
2

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 12 publications
0
1
0
2
Order By: Relevance
“…CTI can be acquired by a victim organization who records the attack investigation artifacts and shares them with peers. Wheelus et al [16] propose a tiered big data architecture for the automation of capturing and handling of network traffic. They generate features and artifacts that would be promptly available for machine learning algorithms and anomaly detectors.…”
Section: Background: Cyber Threat Intelligencementioning
confidence: 99%
“…CTI can be acquired by a victim organization who records the attack investigation artifacts and shares them with peers. Wheelus et al [16] propose a tiered big data architecture for the automation of capturing and handling of network traffic. They generate features and artifacts that would be promptly available for machine learning algorithms and anomaly detectors.…”
Section: Background: Cyber Threat Intelligencementioning
confidence: 99%
“…Viime vuosien aikana kyberhyökkäykset ovat lisääntyneet ja monimutkaistuneet, jonka vuoksi niiden havaitsemiseen, analysointiin ja suojaukseen tarvitaan yhä enemmän reaaliaikaista tietoa. (Conti ym., 2018;Wheelus, Bou-Harb & Zhu, 2016. )…”
Section: Tietoturvallisuus Organisaatiossaunclassified
“…In this study, a big data architecture is proposed and evaluated to automate the analysis of heterogeneous network data, allowing for effective cyber threat intelligence analytics. In this study, a big data architecture is proposed and evaluated to automate the analysis of heterogeneous network data, allowing for effective cyber threat intelligence analytics [1].…”
Section: Introductionmentioning
confidence: 99%