Open Source Intelligence Base Cyber Threat Inspection Framework for Critical Infrastructures

被引:0
|
作者
Lee, Seokcheol [1 ]
Shon, Taeshik [2 ]
机构
[1] Ajou Univ, Dept Comp Engn, Suwon, South Korea
[2] Ajou Univ, Dept Cyber Secur, Suwon, South Korea
关键词
OSINT; Security; Threat; Intelligence; CHALLENGES; SECURITY;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Critical infrastructure, which used in energy, industry, and financial area, is one of essential components for modern society. Thus, critical infrastructures and its availability must be kept secure. Inspecting cyber threat is needed to prevent cyber-attack on critical infrastructure. By using OSINT (Open Source INTelligence) process, it is possible to gather meaningful intelligence related to security. In this paper, a cyber threat inspection framework for critical infrastructure based on OSINT process, is proposed.
引用
收藏
页码:1030 / 1033
页数:4
相关论文
共 50 条
  • [41] CySecAlert: An Alert Generation System for Cyber Security Events Using Open Source Intelligence Data
    Riebe, Thea
    Wirth, Tristan
    Bayer, Markus
    Kuhn, Philipp
    Kaufhold, Marc-Andre
    Knauthe, Volker
    Guthe, Stefan
    Reuter, Christian
    [J]. INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2021), PT I, 2021, 12918 : 429 - 446
  • [42] INTIME: A Machine Learning-Based Framework for Gathering and Leveraging Web Data to Cyber-Threat Intelligence
    Koloveas, Paris
    Chantzios, Thanasis
    Alevizopoulou, Sofia
    Skiadopoulos, Spiros
    Tryfonopoulos, Christos
    [J]. ELECTRONICS, 2021, 10 (07)
  • [43] APT-scope: A novel framework to predict advanced persistent threat groups from enriched heterogeneous information network of cyber threat intelligence
    Gulbay, Burak
    Demirci, Mehmet
    [J]. ENGINEERING SCIENCE AND TECHNOLOGY-AN INTERNATIONAL JOURNAL-JESTECH, 2024, 57
  • [44] A Framework for Open Source Intelligence Penetration Testing of Virtual Health Care Systems
    DeCusatis, Casimer
    Peko, Patrick
    Irving, Jordan
    Teache, Maxwell
    Laibach, Christopher
    Hodge, Jason
    [J]. 2022 IEEE 12TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2022, : 760 - 764
  • [45] Sec-Buzzer: cyber security emerging topic mining with open threat intelligence retrieval and timeline event annotation
    Lee, Kuo-Chan
    Hsieh, Chih-Hung
    Wei, Li-Jia
    Mao, Ching-Hao
    Dai, Jyun-Han
    Kuang, Yu-Ting
    [J]. SOFT COMPUTING, 2017, 21 (11) : 2883 - 2896
  • [46] Sec-Buzzer: cyber security emerging topic mining with open threat intelligence retrieval and timeline event annotation
    Kuo-Chan Lee
    Chih-Hung Hsieh
    Li-Jia Wei
    Ching-Hao Mao
    Jyun-Han Dai
    Yu-Ting Kuang
    [J]. Soft Computing, 2017, 21 : 2883 - 2896
  • [47] Priv-Share: A privacy-preserving framework for differential and trustless delegation of cyber threat intelligence using blockchain
    Dunnett, Kealan
    Pal, Shantanu
    Jadidi, Zahra
    Dedeoglu, Volkan
    Jurdak, Raja
    [J]. COMPUTER NETWORKS, 2024, 252
  • [48] Automating shareable cyber threat intelligence production for closed source software vulnerabilities: a deep learning based detection system
    Arikan, Sueleyman Muhammed
    Kocak, Aynur
    Alkan, Mustafa
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (05) : 3135 - 3151
  • [49] Open-source intelligence: a comprehensive review of the current state, applications and future perspectives in cyber security
    Ashok Yadav
    Atul Kumar
    Vrijendra Singh
    [J]. Artificial Intelligence Review, 2023, 56 : 12407 - 12438
  • [50] Open-source intelligence: a comprehensive review of the current state, applications and future perspectives in cyber security
    Yadav, Ashok
    Kumar, Atul
    Singh, Vrijendra
    [J]. ARTIFICIAL INTELLIGENCE REVIEW, 2023, 56 (11) : 12407 - 12438