A Comparative Study on Cyber Threat Intelligence: The Security Incident Response Perspective

被引:38
|
作者
Schlette, Daniel [1 ]
Caselli, Marco [2 ]
Pernul, Gunther [1 ]
机构
[1] Univ Regensburg, Chair Informat Syst, D-93053 Regensburg, Germany
[2] Siemens AG, Dept Cybersecur Technol, D-81739 Munich, Germany
来源
基金
欧盟地平线“2020”;
关键词
Cyber threat intelligence; incident response; standardization; playbook format; INFORMATION;
D O I
10.1109/COMST.2021.3117338
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber Threat Intelligence (CTI) is threat information intended for security purposes. However, use for incident response demands standardization. This study examines the broader security incident response perspective. Introducing 18 core concepts, we assist efforts to establish and assess current standardization approaches. We further provide the reader with a detailed analysis of 6 incident response formats. While we synthesize structural elements, we point to characteristics and show format deficiencies. Also, we describe how core concepts can be used to determine a suitable format for a given use case. Our surveys' findings indicate a consistent focus on incident response actions within all formats. Besides, playbooks are used to represent procedures. Different use cases suggest that organizations can leverage and combine multiple formats. Finally, we discuss open research challenges to fully realize incident response potentials.
引用
收藏
页码:2525 / 2556
页数:32
相关论文
共 50 条
  • [21] Explainable artificial intelligence envisioned security mechanism for cyber threat hunting
    Kumar, Pankaj
    Wazid, Mohammad
    Singh, D. P.
    Singh, Jaskaran
    Das, Ashok Kumar
    Park, Youngho
    Rodrigues, Joel J. P. C.
    SECURITY AND PRIVACY, 2023, 6 (06)
  • [22] Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence
    Gao, Peng
    Shao, Fei
    Liu, Xiaoyuan
    Xiao, Xusheng
    Qin, Zheng
    Xu, Fengyuan
    Mittal, Prateek
    Kulkarni, Sanjeev R.
    Song, Dawn
    2021 IEEE 37TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2021), 2021, : 193 - 204
  • [23] AI Enabled Threat Detection: Leveraging Artificial Intelligence for Advanced Security and Cyber Threat Mitigation
    Dhanushkodi, Kavitha
    Thejas, S.
    IEEE Access, 2024, 12 : 173127 - 173136
  • [24] Unifying Cyber Threat Intelligence
    Menges, Florian
    Sperl, Christine
    Pernul, Guenther
    TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, TRUSTBUS 2019, 2019, 11711 : 161 - 175
  • [25] Cyber Threat Intelligence for "Things"
    Wagner, Thomas D.
    2019 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBER SA), 2019,
  • [26] Modeling Cyber Threat Intelligence
    Bromander, Siri
    Swimmer, Morton
    Eian, Martin
    Skjotskift, Geir
    Borg, Fredrik
    ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 273 - 280
  • [27] Cyber Threat Intelligence 101
    Dror-John Röcher
    Datenschutz und Datensicherheit - DuD, 2018, 42 (10) : 623 - 628
  • [28] Differentiating the Investigation Response Process of Cyber Security Incident for LEAs
    Hsiao, Shou-Ching
    Kao, Da-Yu
    INTELLIGENCE AND SECURITY INFORMATICS (PAISI 2017), 2017, 10241 : 34 - 48
  • [29] Operation Raven Design of a Cyber Security Incident Response Game
    Seiler, Andreas
    Lechner, Ulrike
    Strussenberg, Judith
    Hofbauer, Stefan
    INNOVATIONS FOR COMMUNITY SERVICES, I4CS 2024, 2024, 2109 : 337 - 347
  • [30] Informing Hybrid System Design in Cyber Security Incident Response
    Nyre-Yu, Megan
    Sprehn, Kelly A.
    Caldwell, Barrett S.
    HCI FOR CYBERSECURITY, PRIVACY AND TRUST, 2019, 11594 : 325 - 338