Malware incident response(IR) informed by cyber threat intelligence(CTI)

被引:0
|
作者
Ying HE [1 ]
Ellis INGLUT [1 ]
Cunjin LUO [2 ,3 ,4 ]
机构
[1] School of Computer Science and Informatics, De Montfort University
[2] Key Lab of Medical Electrophysiology, Ministry of Education
[3] The Health Informatics Group, Institute of Cardiovascular Research, Southwest Medical University
[4] School of Computer Science and Engineering, Northeastern University
基金
中国国家自然科学基金;
关键词
D O I
暂无
中图分类号
TP311.5 [软件工程]; TP309 [安全保密];
学科分类号
081201 ; 0839 ; 1402 ;
摘要
Dear editor, Security experts have been fighting against cybercriminals for many years and existing research shows that this battle will continue. Malicious software has no remorse when it targets different organizations, regardless of its forms [1]. Ransomware [2] has caused serious issues in different industries, especially in healthcare. The existing report shows that 34% of ransomware is targeting healthcare organizations. Nowadays, criminals prefer crypto-jacking over ransomware (which also relies on cryptocurrency for anonymous ransom payments).
引用
收藏
页码:256 / 258
页数:3
相关论文
共 50 条
  • [41] VPNFilter Malware Analysis on Cyber Threat in Smart Home Network
    Sicato, Jose Costa Sapalo
    Sharma, Pradip Kumar
    Loia, Vincenzo
    Park, Jong Hyuk
    APPLIED SCIENCES-BASEL, 2019, 9 (13):
  • [42] Efficient Incident Response System on Shared Cyber Threat Information Using SDN and STIX
    Okada, Satoshi
    Fujiwara, Yoshiki
    Fujimoto, Mariko
    Matsuda, Wataru
    Mitsunaga, Takuho
    2021 IEEE INTERNATIONAL CONFERENCE ON COMPUTING (ICOCO), 2021, : 109 - 114
  • [43] Cyber Threat Intelligence in Risk Management A Survey of the Impact of Cyber Threat Intelligence on Saudi Higher Education Risk Management
    Aljuhami, Amira M.
    Bamasoud, Doaa M.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (10) : 156 - 164
  • [44] Classification and Sharing Method of Malware Based on Threat Intelligence
    Liu, Guangyuan
    Zhou, Jiting
    Ma, Xiaoyu
    PROCEEDINGS OF 2020 IEEE 4TH INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2020), 2020, : 2203 - 2207
  • [45] Correlation of cyber threat intelligence with sightings for intelligence assessment and augmentation
    Lin, Po-Ching
    Hsu, Wen-Hao
    Lin, Ying-Dar
    Hwang, Ren-Hung
    Wu, Hsiao-Kuang
    Lai, Yuan-Cheng
    Chen, Chung-Kuan
    COMPUTER NETWORKS, 2023, 228
  • [46] Transforming Cyber Incident Response
    Murdoch S.
    ITNOW, 2019, 61 (01) : 34 - 35
  • [47] Quality Evaluation of Cyber Threat Intelligence Feeds
    Griffioen, Harm
    Booij, Tim
    Doerr, Christian
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2020), PT II, 2020, 12147 : 277 - 296
  • [48] Cyber Threat Intelligence meets the Analytic Tradecraft
    Bjurling, Bjoern
    Raza, Shahid
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2025, 28 (01)
  • [49] Cyber Threat Analysis and Trustworthy Artificial Intelligence
    Wang, Shuangbao Paul
    Arafin, Md Tanvir
    Osuagwu, Onyema
    Wandji, Ketchiozo
    2022 6TH INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY, CSP 2022, 2022, : 86 - 90
  • [50] Cyber threat intelligence for critical infrastructure security
    Osliak, Oleksii
    Saracino, Andrea
    Martinelli, Fabio
    Mori, Paolo
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (23):