Acquiring Cyber Threat Intelligence through Security Information Correlation

被引:0
|
作者
Settanni, Giuseppe [1 ]
Shovgenya, Yegor [1 ]
Skopik, Florian [1 ]
Graf, Roman [1 ]
Wurzenberger, Markus [1 ]
Fiedler, Roman [1 ]
机构
[1] Austrian Inst Technol, Donau City Str 1, A-1220 Vienna, Austria
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber Physical Systems (CPS) operating in modern critical infrastructures (CIs) are increasingly being targeted by highly sophisticated cyber attacks. Threat actors have quickly learned of the value and potential impact of targeting CPS, and numerous tailored multi-stage cyber-physical attack campaigns, such as Advanced Persistent Threats (APTs), have been perpetrated in the last years. They aim at stealthily compromising systems' operations and cause severe impact on daily business operations such as shutdowns, equipment damage, reputation damage, financial loss, intellectual property theft, and health and safety risks. Protecting CIs against such threats has become as crucial as complicated. Novel distributed detection and reaction methodologies are necessary to effectively uncover these attacks, and timely mitigate their effects. Correlating large amounts of data, collected from a multitude of relevant sources, is fundamental for Security Operation Centers (SOCs) to establish cyber situational awareness, and allow to promptly adopt suitable countermeasures in case of attacks. In our previous work we introduced three methods for security information correlation. In this paper we define metrics and benchmarks to evaluate these correlation methods, we assess their accuracy, and we compare their performance. We finally demonstrate how the presented techniques, implemented within our cyber threat intelligence analysis engine called CAESAIR, can be applied to support incident handling tasks performed by SOCs.
引用
收藏
页码:415 / 421
页数:7
相关论文
共 50 条
  • [1] Cyber Security Threat Intelligence Monitoring and Classification
    Wang, Bo-Xiang
    Chen, Jiann-Liang
    Yu, Chiao-Lin
    [J]. 2021 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2021, : 70 - 72
  • [2] Cyber threat intelligence for critical infrastructure security
    Osliak, Oleksii
    Saracino, Andrea
    Martinelli, Fabio
    Mori, Paolo
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (23):
  • [3] Using Cyber Threat Intelligence in SDN Security
    Yurekten, Ozgur
    Demirci, Mehmet
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2017, : 377 - 382
  • [4] Correlation of cyber threat intelligence with sightings for intelligence assessment and augmentation
    Lin, Po-Ching
    Hsu, Wen-Hao
    Lin, Ying-Dar
    Hwang, Ren-Hung
    Wu, Hsiao-Kuang
    Lai, Yuan-Cheng
    Chen, Chung-Kuan
    [J]. COMPUTER NETWORKS, 2023, 228
  • [5] Cyber Security Decision Making Informed by Cyber Threat Intelligence (CYDETI)
    Aliyu, Aliyu
    He, Ying
    Yevseyeva, Iryna
    Luo, Cunjin
    [J]. 2020 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2020,
  • [6] Towards Collaborative Cyber Threat Intelligence for Security Management
    Osliak, Oleksii
    Saracino, Andrea
    Martinelli, Fabio
    Dimitrakos, Theo
    [J]. ICISSP: PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2021, : 339 - 346
  • [7] A Summary of the Development of Cyber Security Threat Intelligence Sharing
    Du, Lili
    Fan, Yaqin
    Zhang, Lvyang
    Wang, Lianying
    Sun, Tianhang
    [J]. INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2020, 12 (04) : 54 - 67
  • [8] SECURE CYBER SECURITY THREAT INFORMATION EXCHANGE
    Ionita, Mihai-Gabriel
    [J]. PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE ON INFORMATICS IN ECONOMY (IE 2015): EDUCATION, RESEARCH & BUSINESS TECHNOLOGIES, 2015, : 63 - 67
  • [9] On the dissemination of Cyber Threat Intelligence through Hyperledger
    Moubarak, Joanna
    Bassil, Carole
    Antoun, Joe
    [J]. 2021 17TH INTERNATIONAL CONFERENCE ON THE DESIGN OF RELIABLE COMMUNICATION NETWORKS (DRCN), 2021,
  • [10] Exploring Open Source Information for Cyber Threat Intelligence
    Adewopo, Victor
    Gonen, Bilal
    Adewopo, Festus
    [J]. 2020 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2020, : 2232 - 2241