Open Source Intelligence Base Cyber Threat Inspection Framework for Critical Infrastructures

被引:0
|
作者
Lee, Seokcheol [1 ]
Shon, Taeshik [2 ]
机构
[1] Ajou Univ, Dept Comp Engn, Suwon, South Korea
[2] Ajou Univ, Dept Cyber Secur, Suwon, South Korea
关键词
OSINT; Security; Threat; Intelligence; CHALLENGES; SECURITY;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Critical infrastructure, which used in energy, industry, and financial area, is one of essential components for modern society. Thus, critical infrastructures and its availability must be kept secure. Inspecting cyber threat is needed to prevent cyber-attack on critical infrastructure. By using OSINT (Open Source INTelligence) process, it is possible to gather meaningful intelligence related to security. In this paper, a cyber threat inspection framework for critical infrastructure based on OSINT process, is proposed.
引用
收藏
页码:1030 / 1033
页数:4
相关论文
共 50 条
  • [21] A Research and Analysis Method of Open Source Threat Intelligence Data
    Liu, Ruyue
    Zhao, Ziping
    Sun, Chengjun
    Yang, Xiaoyu
    Gong, Xiaoli
    Zhang, Jin
    [J]. DATA SCIENCE, PT 1, 2017, 727 : 352 - 363
  • [22] A Blockchain-Based Framework for Scalable and Trustless Delegation of Cyber Threat Intelligence
    Dunnett, Kealan
    Pal, Shantanu
    Jadidi, Zahra
    Jurdak, Raja
    [J]. 2023 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN AND CRYPTOCURRENCY, ICBC, 2023,
  • [23] Methodological Framework to Collect, Process, Analyze and Visualize Cyber Threat Intelligence Data
    Borges Amaro, Lucas Jose
    Percilio Azevedo, Bruce William
    Lopes de Mendonca, Fabio Lucio
    Giozza, William Ferreira
    Albuquerque, Robson de Oliveira
    Garcia Villalba, Luis Javier
    [J]. APPLIED SCIENCES-BASEL, 2022, 12 (03):
  • [24] A Trusted, Verifiable and Differential Cyber Threat Intelligence Sharing Framework using Blockchain
    Dunnett, Kealan
    Pal, Shantanu
    Putra, Guntur Dharma
    Jadidi, Zahra
    Jurdak, Raja
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 1107 - 1114
  • [25] A Blockchain-Enabled Incentivised Framework for Cyber Threat Intelligence Sharing in ICS
    Nguyen, Kathy
    Pal, Shantanu
    Jadidi, Zahra
    Dorri, Ali
    Jurdak, Raja
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS AND OTHER AFFILIATED EVENTS (PERCOM WORKSHOPS), 2022,
  • [26] PRAETORIAN: A Framework for the Protection of Critical Infrastructures from advanced Combined Cyber and Physical Threats
    Papadopoulos, Lazaros
    Karteris, Antonios
    Soudris, Dimitrios
    Munoz-Navarro, Eva
    Hernandez-Montesinos, Juan Jose
    Paul, Stephane
    Museux, Nicolas
    Koenig, Sandra
    Egger, Manuel
    Schauer, Stefan
    Hingant Gomez, Javier
    Hadjina, Tamara
    [J]. 18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,
  • [27] Decepti-SCADA: A cyber deception framework for active defense of networked critical infrastructures
    Cifranic, Nicholas
    Hallman, Roger A.
    Romero-Mariona, Jose
    Souza, Brian
    Calton, Trevor
    Coca, Giancarlo
    [J]. INTERNET OF THINGS, 2020, 12
  • [28] Sharing Is Caring: Hurdles and Prospects of Open, Crowd-Sourced Cyber Threat Intelligence
    Jesus, Vitor
    Bains, Balraj
    Chang, Victor
    [J]. IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, 2023, : 6854 - 6873
  • [29] Automating threat modeling using an ontology framework: Validated with data from critical infrastructures
    Valja, Margus
    Heiding, Fredrik
    Franke, Ulrik
    Lagerstrom, Robert
    [J]. CYBERSECURITY, 2020, 3 (01)
  • [30] A System for Automated Open-Source Threat Intelligence Gathering and Management
    Gao, Peng
    Liu, Xiaoyuan
    Choi, Edward
    Soman, Bhavna
    Mishra, Chinmaya
    Farris, Kate
    Song, Dawn
    [J]. SIGMOD '21: PROCEEDINGS OF THE 2021 INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, 2021, : 2716 - 2720