A Comparative Study on Cyber Threat Intelligence: The Security Incident Response Perspective

被引:38
|
作者
Schlette, Daniel [1 ]
Caselli, Marco [2 ]
Pernul, Gunther [1 ]
机构
[1] Univ Regensburg, Chair Informat Syst, D-93053 Regensburg, Germany
[2] Siemens AG, Dept Cybersecur Technol, D-81739 Munich, Germany
来源
基金
欧盟地平线“2020”;
关键词
Cyber threat intelligence; incident response; standardization; playbook format; INFORMATION;
D O I
10.1109/COMST.2021.3117338
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber Threat Intelligence (CTI) is threat information intended for security purposes. However, use for incident response demands standardization. This study examines the broader security incident response perspective. Introducing 18 core concepts, we assist efforts to establish and assess current standardization approaches. We further provide the reader with a detailed analysis of 6 incident response formats. While we synthesize structural elements, we point to characteristics and show format deficiencies. Also, we describe how core concepts can be used to determine a suitable format for a given use case. Our surveys' findings indicate a consistent focus on incident response actions within all formats. Besides, playbooks are used to represent procedures. Different use cases suggest that organizations can leverage and combine multiple formats. Finally, we discuss open research challenges to fully realize incident response potentials.
引用
收藏
页码:2525 / 2556
页数:32
相关论文
共 50 条
  • [31] A Comparative Analysis of Cyber-Threat Intelligence Sources, Formats and Languages
    Ramsdale, Andrew
    Shiaeles, Stavros
    Kolokotronis, Nicholas
    ELECTRONICS, 2020, 9 (05)
  • [32] Cyber threat attribution using unstructured reports in cyber threat intelligence
    Irshad, Ehtsham
    Siddiqui, Abdul Basit
    EGYPTIAN INFORMATICS JOURNAL, 2023, 24 (01) : 43 - 59
  • [33] Cyber-security threat
    Klebba, Jesse
    CHEMISTRY & INDUSTRY, 2017, 81 (10) : 9 - 9
  • [34] Enhancing Security in Ambient Intelligence: A STRIDE Threat Modeling Perspective
    Hossain, Md Ismail
    Hasan, Ragib
    2023 IEEE 9TH WORLD FORUM ON INTERNET OF THINGS, WF-IOT, 2023,
  • [35] Automated Cyber Threat Sensing and Responding: Integrating Threat Intelligence into Security-Policy-Controlled Systems
    Amthor, Peter
    Fischer, Daniel
    Kuehnhauser, Winfried E.
    Stelzer, Dirk
    14TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2019), 2019,
  • [36] Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligence
    Mavroeidis, Vasileios
    Bromander, Siri
    2017 EUROPEAN INTELLIGENCE AND SECURITY INFORMATICS CONFERENCE (EISIC), 2017, : 91 - 98
  • [37] Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study
    Orbinato, Vittorio
    Barbaraci, Mariarosaria
    Natella, Roberto
    Cotroneo, Domenico
    2022 IEEE 33RD INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE 2022), 2022, : 181 - 192
  • [38] Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions
    Kessler, Gary C.
    JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 2009, 4 (03) : 57 - 59
  • [39] Cyber Threat Intelligence and Machine Learning
    Haass, Jon C.
    Proceedings - 2022 4th International Conference on Transdisciplinary AI, TransAI 2022, 2022, : 156 - 159
  • [40] Automated Generation of Cyber Threat Intelligence
    Kakumaru, Takahiro
    Takahashi, Wataru
    Katsuse, Riku
    Siracusano, Giuseppe
    Sanvito, Davide
    Bifulco, Roberto
    1600, NEC Mediaproducts (17): : 33 - 37