Correlation of cyber threat intelligence with sightings for intelligence assessment and augmentation
Tài liệu tham khảo
World Economic Forum, 2021
Gao, 2021, Enabling efficient cyber threat hunting with cyber threat intelligence, 193
G. Farnham, Tools and Standards for Cyber Threat Intelligence Projects, White paper from SANS Institute, 2013.
2006
Hofstede, 2014, Flow monitoring explained: From packet capture to data analysis with NetFlow and IPFIX, IEEE Commun. Surv. Tutor., 16, 2037, 10.1109/COMST.2014.2321898
E.B. Claise, Cisco Systems NetFlow Services Export Version 9, RFC 3954, (ISSN: 2070-1721) 2004, RFC Editor, URL.
B. Claise, 2013
Chen, 2022, FlowTele: Remotely shaping traffic on internet-scale networks, 349
Mills, 2022, Practical intrusion detection of emerging threats, IEEE Trans. Netw. Serv. Manag., 19, 582, 10.1109/TNSM.2021.3091517
Lee, 2018, Managing cyber threat intelligence in a graph database: Methods of analyzing intrusion sets, threat actors, and campaigns, 1
Gao, 2022, HinCTI: A cyber threat intelligence modeling and identification system based on heterogeneous information network, IEEE Trans. Knowl. Data Eng., 34, 708, 10.1109/TKDE.2020.2987019
Gao, 2018, Graph mining-based trust evaluation mechanism with multidimensional features for large-scale heterogeneous threat intelligence, 1272
Mavzer, 2021, Trust and quality computation for cyber threat intelligence sharing platforms, 360
Huang, 2022, Open source intelligence for malicious behavior discovery and interpretation, IEEE Trans. Dependable Secure Comput., 19, 776
Azevedo, 2019, PURE: Generating quality threat intelligence by clustering and correlating OSINT, 483
Sills, 2020, Cybersecurity threat intelligence augmentation and embedding improvement - a healthcare usecase, 1
Mavroeidis, 2021, Threat actor type inference and characterization within cyber threat intelligence, 327
Suryotrisongko, 2022, Robust botnet DGA detection: Blending XAI and OSINT for cyber threat intelligence sharing, IEEE Access, 10, 34613, 10.1109/ACCESS.2022.3162588
Berady, 2021, From TTP to IoC: Advanced persistent graphs for threat hunting, IEEE Trans. Netw. Serv. Manag., 18, 1321, 10.1109/TNSM.2021.3056999
Krishnamurthy, 2021, Machine learning for NetFlow anomaly detection with human-readable annotations, IEEE Trans. Netw. Serv. Manag., 18, 1885, 10.1109/TNSM.2021.3075656
SpeedGuide, 2022
phaag, 2022
Pedregosa, 2011, Scikit-learn: Machine learning in Python, J. Mach. Learn. Res., 12, 2825