SECURE CYBER SECURITY THREAT INFORMATION EXCHANGE

被引:0
|
作者
Ionita, Mihai-Gabriel [1 ]
机构
[1] Mil Tech Acad, Bucharest, Romania
关键词
cyber security; intelligent threat exchange; neural networks; SIEM; HIDS;
D O I
暂无
中图分类号
F8 [财政、金融];
学科分类号
0202 ;
摘要
The following paper tackles one of the most important fields of current cyber security, in our opinion. This article concerns threat information exchange. Without information exchange a cyber-security system's functionality is severely hampered. An event might not trigger a specific danger threshold if attacks are stealthy and targeted. But the same attack, if information is gathered and correlated from different sources around an organization's network it might hit that specific threshold, and also hit an alarm point which will be much more visible to a human operator. In different studies it is demonstrated that a single hit can make the difference from an incident which is categorized as important and treated in a timely manner or, in the other scenario which is categorized as usual traffic and left uninvestigated. Information regarding cyber threats, when exchanged between entities involved in the same field of action permits transforming information into intelligence. The theme discussed in the present paper is focused on intelligent threat exchange, which makes different checks and decisions before sending different information in a secure manner. Any attack detail can be used by a third party for exploiting different vulnerable resources from the protected organization, if discovered. Another thorny problem of the current cyber security state is that of standardizing the way security incident information is normalized and packed for transport. This latter problem is also delved into in the current article. The experimental setup is built on top of a neural network and an evolved SIEM like infrastructure, for collecting, analyzing and sharing threat information.
引用
收藏
页码:63 / 67
页数:5
相关论文
共 50 条
  • [1] Secure and Robust Cyber Security Threat Information Sharing
    Bkakria, Anis
    Yaich, Reda
    Arabi, Walid
    [J]. FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2021, 2022, 13291 : 3 - 18
  • [2] Cyber-Security and Threat Politics: US Efforts to Secure the Information Age
    Deibert, Ronald J.
    [J]. INTERNATIONAL STUDIES REVIEW, 2009, 11 (02) : 373 - 375
  • [3] CYBER TERRORISM - A MODERN SECURITY THREAT TO INFORMATION SYSTEMS
    Prislan, Kaja
    Bernik, Igor
    [J]. POLICING IN CENTRAL AND EASTERN EUROPE - SOCIAL CONTROL OF UNCONVENTIONAL DEVIANCE: CONFERENCE PROCEEDINGS, 2011, : 175 - +
  • [4] Acquiring Cyber Threat Intelligence through Security Information Correlation
    Settanni, Giuseppe
    Shovgenya, Yegor
    Skopik, Florian
    Graf, Roman
    Wurzenberger, Markus
    Fiedler, Roman
    [J]. 2017 3RD IEEE INTERNATIONAL CONFERENCE ON CYBERNETICS (CYBCONF), 2017, : 415 - 421
  • [5] Secure information exchange - A security quantification approach
    Perka, Vilas Rao
    Mishra, Piyush
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON ELECTRO/INFORMATION TECHNOLOGY, 2006, : 448 - 453
  • [6] Cyber-security threat
    Klebba, Jesse
    [J]. CHEMISTRY & INDUSTRY, 2017, 81 (10) : 9 - 9
  • [7] Secure and Efficient Exchange of Threat Information Using Blockchain Technology
    Pahlevan, Maryam
    Ionita, Valentin
    [J]. INFORMATION, 2022, 13 (10)
  • [8] Cyber security information exchange to gain insight into the effects of cyber threats and incidents
    Fransen, F.
    Smulders, A.
    Kerkdijk, R.
    [J]. ELEKTROTECHNIK UND INFORMATIONSTECHNIK, 2015, 132 (02): : 106 - 112
  • [9] Crypto Mining Attacks in Information Systems: An Emerging Threat to Cyber Security
    Zimba, Aaron
    Wang, Zhaoshun
    Mulenga, Mwenge
    Odongo, Nickson Herbert
    [J]. JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2020, 60 (04) : 297 - 308
  • [10] Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions
    Kessler, Gary C.
    [J]. JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 2009, 4 (03) : 57 - 59