A Comparative Study on Cyber Threat Intelligence: The Security Incident Response Perspective

被引:38
|
作者
Schlette, Daniel [1 ]
Caselli, Marco [2 ]
Pernul, Gunther [1 ]
机构
[1] Univ Regensburg, Chair Informat Syst, D-93053 Regensburg, Germany
[2] Siemens AG, Dept Cybersecur Technol, D-81739 Munich, Germany
来源
基金
欧盟地平线“2020”;
关键词
Cyber threat intelligence; incident response; standardization; playbook format; INFORMATION;
D O I
10.1109/COMST.2021.3117338
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber Threat Intelligence (CTI) is threat information intended for security purposes. However, use for incident response demands standardization. This study examines the broader security incident response perspective. Introducing 18 core concepts, we assist efforts to establish and assess current standardization approaches. We further provide the reader with a detailed analysis of 6 incident response formats. While we synthesize structural elements, we point to characteristics and show format deficiencies. Also, we describe how core concepts can be used to determine a suitable format for a given use case. Our surveys' findings indicate a consistent focus on incident response actions within all formats. Besides, playbooks are used to represent procedures. Different use cases suggest that organizations can leverage and combine multiple formats. Finally, we discuss open research challenges to fully realize incident response potentials.
引用
收藏
页码:2525 / 2556
页数:32
相关论文
共 50 条
  • [41] Cyber threat challenges intelligence capability
    Aviation Week and Space Technology (New York), 1997, 146 (06):
  • [42] Cyber threat challenges intelligence capability
    Covault, C
    AVIATION WEEK & SPACE TECHNOLOGY, 1997, 146 (06): : 20 - 21
  • [43] Security Incident Response Criteria: A Practitioner's Perspective
    Grispos, George
    Glisson, William Bradley
    Storer, Tim
    AMCIS 2015 PROCEEDINGS, 2015,
  • [44] Generating Network Security Defense Strategy Based on Cyber Threat Intelligence Knowledge Graph
    Zhang, Shuqin
    Li, Shuhan
    Chen, Peng
    Wang, Shijie
    Zhao, Chunxia
    EMERGING NETWORKING ARCHITECTURE AND TECHNOLOGIES, ICENAT 2022, 2023, 1696 : 507 - 519
  • [45] Integration of Cyber Threat Intelligence into Security Onion and Malcolm for the use case of industrial networks
    Ackermann, Tim
    Karch, Markus
    Kippe, Joerg
    AT-AUTOMATISIERUNGSTECHNIK, 2023, 71 (09) : 802 - 815
  • [46] Special Issue on Big Data Applications in Cyber Security and Threat Intelligence - Part 2
    Choo, Kim-Kwang Raymond
    Conti, Mauro
    Dehghantanha, Ali
    IEEE TRANSACTIONS ON BIG DATA, 2019, 5 (04) : 423 - 424
  • [47] Special Issue on Big Data Applications in Cyber Security and Threat Intelligence - Part 1
    Choo, Kim-Kwang Raymond
    Conti, Mauro
    Dehghantanha, Ali
    IEEE TRANSACTIONS ON BIG DATA, 2019, 5 (03) : 279 - 281
  • [48] Security OSIF: Toward Automatic Discovery and Analysis of Event Based Cyber Threat Intelligence
    Li, Ke
    Wen, Hui
    Li, Hong
    Zhu, Hongsong
    Sun, Limin
    2018 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI), 2018, : 741 - 747
  • [49] CYBER ATTACKS - UNPRECEDENTED THREAT TO SECURITY
    Repez, Filofteia
    Deaconu, Gheorghe
    PROCEEDINGS INTERNATIONAL CONFERENCE MILITARY SCIENCE UNIVERSE, SELECTED PAPERS, 2011, : 446 - 450
  • [50] An International Comparative Study on Cyber Security Strategy
    Min, Kyoung-Sik
    Chai, Seung-Woan
    Han, Mijeong
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (02): : 13 - 19