Correlation of cyber threat intelligence with sightings for intelligence assessment and augmentation

Computer Networks - Tập 228 - Trang 109736 - 2023
Po-Ching Lin1, Wen-Hao Hsu1, Ying-Dar Lin2, Ren-Hung Hwang3, Hsiao-Kuang Wu4, Yuan-Cheng Lai5, Chung-Kuan Chen6
1Department of Computer Science & Information Engineering, National Chung Cheng University, Chiayi, Taiwan
2Department of Computer Science, National Yang Ming Chiao Tung University, Hsinchu, Taiwan
3College of Artificial Intelligence, National Yang Ming Chiao Tung University, Tainan, Taiwan
4Department of Computer Science & Information Engineering, National Central University, Taoyuan, Taiwan
5Department of Information Management, National Taiwan University of Science and Technology, Taipei, Taiwan
6Cycraft Technology, New Taipei, Taiwan

Tài liệu tham khảo

World Economic Forum, 2021 Gao, 2021, Enabling efficient cyber threat hunting with cyber threat intelligence, 193 G. Farnham, Tools and Standards for Cyber Threat Intelligence Projects, White paper from SANS Institute, 2013. 2006 Hofstede, 2014, Flow monitoring explained: From packet capture to data analysis with NetFlow and IPFIX, IEEE Commun. Surv. Tutor., 16, 2037, 10.1109/COMST.2014.2321898 E.B. Claise, Cisco Systems NetFlow Services Export Version 9, RFC 3954, (ISSN: 2070-1721) 2004, RFC Editor, URL. B. Claise, 2013 Chen, 2022, FlowTele: Remotely shaping traffic on internet-scale networks, 349 Mills, 2022, Practical intrusion detection of emerging threats, IEEE Trans. Netw. Serv. Manag., 19, 582, 10.1109/TNSM.2021.3091517 Lee, 2018, Managing cyber threat intelligence in a graph database: Methods of analyzing intrusion sets, threat actors, and campaigns, 1 Gao, 2022, HinCTI: A cyber threat intelligence modeling and identification system based on heterogeneous information network, IEEE Trans. Knowl. Data Eng., 34, 708, 10.1109/TKDE.2020.2987019 Gao, 2018, Graph mining-based trust evaluation mechanism with multidimensional features for large-scale heterogeneous threat intelligence, 1272 Mavzer, 2021, Trust and quality computation for cyber threat intelligence sharing platforms, 360 Huang, 2022, Open source intelligence for malicious behavior discovery and interpretation, IEEE Trans. Dependable Secure Comput., 19, 776 Azevedo, 2019, PURE: Generating quality threat intelligence by clustering and correlating OSINT, 483 Sills, 2020, Cybersecurity threat intelligence augmentation and embedding improvement - a healthcare usecase, 1 Mavroeidis, 2021, Threat actor type inference and characterization within cyber threat intelligence, 327 Suryotrisongko, 2022, Robust botnet DGA detection: Blending XAI and OSINT for cyber threat intelligence sharing, IEEE Access, 10, 34613, 10.1109/ACCESS.2022.3162588 Berady, 2021, From TTP to IoC: Advanced persistent graphs for threat hunting, IEEE Trans. Netw. Serv. Manag., 18, 1321, 10.1109/TNSM.2021.3056999 Krishnamurthy, 2021, Machine learning for NetFlow anomaly detection with human-readable annotations, IEEE Trans. Netw. Serv. Manag., 18, 1885, 10.1109/TNSM.2021.3075656 SpeedGuide, 2022 phaag, 2022 Pedregosa, 2011, Scikit-learn: Machine learning in Python, J. Mach. Learn. Res., 12, 2825