An Ontology for Threat Intelligence

被引:0
|
作者
Falk, Courtney [1 ]
机构
[1] Optiv, Denver, CO 80202 USA
关键词
threat intelligence; ontology; semantic web; cybersecurity;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper describes the work done to build an ontology in support of cyber threat intelligence. The end goal is a system that helps threat intelligence analysts effectively organize and search both open source intelligence and threat indicators in order to build a comprehensive picture of the threat environment. The Lockheed Martin kill chain model serves as the basis for the ontology. Semantic Web technologies such as RDF, OWL, and SPARQL are used to leverage existing commercial off-the-shelf software and tools.
引用
收藏
页码:111 / 116
页数:6
相关论文
共 50 条
  • [1] Event-Based Threat Intelligence Ontology Model
    Wang, Peng
    Dai, Guangxiang
    Zhai, Lidong
    SCIENCE OF CYBER SECURITY, SCISEC 2023, 2023, 14299 : 261 - 282
  • [2] Ontology-based Cyber Risk Monitoring Using Cyber Threat Intelligence
    Merah, Yazid
    Kenaza, Tayeb
    ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,
  • [3] An Email Cyber Threat Intelligence Method Using Domain Ontology and Machine Learning
    Venckauskas, Algimantas
    Toldinas, Jevgenijus
    Morkevicius, Nerijus
    Sanfilippo, Filippo
    ELECTRONICS, 2024, 13 (14)
  • [4] Ontology-based Unified Model for Heterogeneous Threat Intelligence Integration and Sharing
    Zhao, Yishuai
    Lang, Bo
    Liu, Ming
    PROCEEDINGS OF 2017 11TH IEEE INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION (ASID), 2017, : 11 - 15
  • [5] Networked intelligence and ontology
    Yamaguchi, T
    Soft Computing as Transdisciplinary Science and Technology, 2005, : 8 - 10
  • [6] Ontology for the intelligence analyst
    Smith, B. (phismith@buffalo.edu), 1600, U.S. Department of Defense (25):
  • [7] Cyberpsychological Threat Intelligence
    Murphy, Julie
    Keane, Anthony
    PROCEEDINGS OF THE 18TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2019), 2019, : 314 - 318
  • [8] Threat Intelligence Computing
    Shu, Xiaokui
    Araujo, Frederico
    Schales, Douglas L.
    Stoecklin, Marc Ph.
    Jang, Jiyong
    Huang, Heqing
    Rao, Josyula R.
    PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 1883 - 1898
  • [9] Toward an Ontology for Insider Threat Research: Varieties of Insider Threat Definitions
    Mundie, David A.
    Perl, Sam
    Huth, Carly L.
    2013 THIRD WORKSHOP ON SOCIO-TECHNICAL ASPECTS IN SECURITY AND TRUST (STAST 2013), 2013, : 26 - 36
  • [10] Networked intelligence by using ontology
    Sato, E
    Yamaguchi, T
    Harashima, F
    2004 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS, VOLS 1-3, PROCEEDINGS, 2004, : 311 - 316