An Ontology for Threat Intelligence

被引:0
|
作者
Falk, Courtney [1 ]
机构
[1] Optiv, Denver, CO 80202 USA
关键词
threat intelligence; ontology; semantic web; cybersecurity;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper describes the work done to build an ontology in support of cyber threat intelligence. The end goal is a system that helps threat intelligence analysts effectively organize and search both open source intelligence and threat indicators in order to build a comprehensive picture of the threat environment. The Lockheed Martin kill chain model serves as the basis for the ontology. Semantic Web technologies such as RDF, OWL, and SPARQL are used to leverage existing commercial off-the-shelf software and tools.
引用
收藏
页码:111 / 116
页数:6
相关论文
共 50 条
  • [31] Threat intelligence platform for the energy sector
    Leszczyna, Rafal
    Wrobel, Michal R.
    SOFTWARE-PRACTICE & EXPERIENCE, 2019, 49 (08): : 1225 - 1254
  • [32] Artificial Intelligence in Psychiatry: Threat or Blessing?
    Pak, Thomas Kun
    Hernandez, Cesar Eber Montelongo
    Do, Carter Nguyen
    ACADEMIC PSYCHIATRY, 2023, 47 (06) : 587 - 588
  • [33] #Twiti: Social Listening for Threat Intelligence
    Shin, Hyejin
    Shim, WooChul
    Kim, Saebom
    Lee, Sol
    Kang, Yong Goo
    Hwang, Yong Ho
    PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE 2021 (WWW 2021), 2021, : 92 - 104
  • [34] Behavioral analysis of botnets for threat intelligence
    Alper Caglayan
    Mike Toothaker
    Dan Drapeau
    Dustin Burke
    Gerry Eaton
    Information Systems and e-Business Management, 2012, 10 : 491 - 519
  • [35] Towards Automated Threat Intelligence Fusion
    Modi, Ajay
    Sun, Zhibo
    Panwar, Anupam
    Khairnar, Tejas
    Zhao, Ziming
    Doupe, Adam
    Ahn, Gail-Joon
    Black, Paul
    2016 IEEE 2ND INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (IEEE CIC), 2016, : 408 - 416
  • [37] Towards privacy preserving threat intelligence
    Dara, Sashank
    Zargar, Saman Taghavi
    Muralidhara, V. N.
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 38 : 28 - 39
  • [38] Behavioral analysis of botnets for threat intelligence
    Caglayan, Alper
    Toothaker, Mike
    Drapeau, Dan
    Burke, Dustin
    Eaton, Gerry
    INFORMATION SYSTEMS AND E-BUSINESS MANAGEMENT, 2012, 10 (04) : 491 - 519
  • [39] Anomaly Detection for Physical Threat Intelligence
    Mignone, Paolo
    Malerba, Donato
    Ceci, Michelangelo
    MACHINE LEARNING AND PRINCIPLES AND PRACTICE OF KNOWLEDGE DISCOVERY IN DATABASES, ECML PKDD 2022, PT I, 2023, 1752 : 281 - 292
  • [40] Artificial Intelligence: Threat or Boon to Radiologists?
    Recht, Michael
    Bryan, R. Nick
    JOURNAL OF THE AMERICAN COLLEGE OF RADIOLOGY, 2017, 14 (11) : 1476 - 1480