Ontology-based Cyber Risk Monitoring Using Cyber Threat Intelligence

被引:12
|
作者
Merah, Yazid [1 ]
Kenaza, Tayeb [1 ]
机构
[1] Ecole Mil Polytech, Borj El Bahri, Alger, Algeria
关键词
Cyber Threat Intelligence; OWL; Ontology; Risk Assessment;
D O I
10.1145/3465481.3470024
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Efficient cyber risk assessment needs to consider all security alerts provided by cybersecurity solutions deployed in a network. To build a reliable overview of cyber risk, there is a need to adopt continuous monitoring of emerged cyber threats related to that risk. Indeed, the integration of Cyber Threat Intelligence (CTI) into cybersecurity solutions provides valuable information about threats, targets, and potential vulnerabilities. Structured Threat Information eXpression (STIX), as a language for expressing information about cyber threats in a structured and unambiguous manner, is becoming a de facto standard for sharing information about cyber threats. In addition, ontology-based semantic knowledge modeling has become a promising solution that provides a machine-readable language for downstream work in cybersecurity problem-solving. In this paper, we propose an ontology using CTI for risk monitoring. This latter improves an existing ontology, originally proposed to be used within a SIEM (Security Information Event Management), by extending it and aligning it with the STIX concepts.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] Threat Modeling for Cyber Range: An Ontology-Based Approach
    Gong, Lei
    Tian, Yu
    [J]. COMMUNICATIONS, SIGNAL PROCESSING, AND SYSTEMS, CSPS 2018, VOL III: SYSTEMS, 2020, 517 : 1055 - 1062
  • [2] Cyber threat attribution using unstructured reports in cyber threat intelligence
    Irshad, Ehtsham
    Siddiqui, Abdul Basit
    [J]. EGYPTIAN INFORMATICS JOURNAL, 2023, 24 (01) : 43 - 59
  • [3] Using Smart Glasses for Monitoring Cyber Threat Intelligence Feeds
    Korkiakoski, Mikko
    Sadiq, Fatima
    Setianto, Febrian
    Latif, Ummi Khaira
    Alavesa, Paula
    Kostakos, Panos
    [J]. PROCEEDINGS OF THE 2021 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING, ASONAM 2021, 2021, : 630 - 634
  • [4] Cyber Security Threat Intelligence Monitoring and Classification
    Wang, Bo-Xiang
    Chen, Jiann-Liang
    Yu, Chiao-Lin
    [J]. 2021 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2021, : 70 - 72
  • [5] Cyber Threat Intelligence in Risk Management A Survey of the Impact of Cyber Threat Intelligence on Saudi Higher Education Risk Management
    Aljuhami, Amira M.
    Bamasoud, Doaa M.
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (10) : 156 - 164
  • [6] An Email Cyber Threat Intelligence Method Using Domain Ontology and Machine Learning
    Venckauskas, Algimantas
    Toldinas, Jevgenijus
    Morkevicius, Nerijus
    Sanfilippo, Filippo
    [J]. ELECTRONICS, 2024, 13 (14)
  • [7] Risk Assessment of Sharing Cyber Threat Intelligence
    Albakri, Adham
    Boiten, Eerke
    Smith, Richard
    [J]. COMPUTER SECURITY, ESORICS 2020 INTERNATIONAL WORKSHOPS, 2020, 12580 : 92 - 113
  • [8] Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence
    Gao, Peng
    Shao, Fei
    Liu, Xiaoyuan
    Xiao, Xusheng
    Qin, Zheng
    Xu, Fengyuan
    Mittal, Prateek
    Kulkarni, Sanjeev R.
    Song, Dawn
    [J]. 2021 IEEE 37TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2021), 2021, : 193 - 204
  • [9] Using Cyber Threat Intelligence in SDN Security
    Yurekten, Ozgur
    Demirci, Mehmet
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2017, : 377 - 382
  • [10] Ontology-Based Scenario Modeling for Cyber Security Exercise
    Wen, Shao-Fang
    Yamin, Muhammad Mudassar
    Katt, Basel
    [J]. 2021 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW 2021), 2021, : 249 - 258