A Research and Analysis Method of Open Source Threat Intelligence Data

被引:4
|
作者
Liu, Ruyue [1 ]
Zhao, Ziping [1 ]
Sun, Chengjun [2 ]
Yang, Xiaoyu [3 ]
Gong, Xiaoli [2 ]
Zhang, Jin [2 ]
机构
[1] Tianjin Normal Univ, Comp & Informat Engn Coll, Tianjin 300071, Peoples R China
[2] Nankai Univ, Coll Comp & Control Engn, Tianjin 300071, Peoples R China
[3] Chinese Acad Sci, Inst Informat Engn, Beijing 100093, Peoples R China
来源
DATA SCIENCE, PT 1 | 2017年 / 727卷
基金
美国国家科学基金会;
关键词
Threat intelligence; Cyber security; CIF;
D O I
10.1007/978-981-10-6385-5_30
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As the form of cyber threats becomes more complex, which leads to a widespread concern about how to promote network security active defense system by using the exploding cyber threat intelligence. Basing on the content analysis method, introduces the precision, recall rate and timely rate on the basis of the change of time dimension, and analyzes the threat intelligence provider from three aspects. The validity of this method is verified by the test of massive source of threat data, which improves the efficiency of CIF analysis and makes it easy to analyze and extract the threat intelligence information quickly.
引用
收藏
页码:352 / 363
页数:12
相关论文
共 50 条
  • [1] On Data Licenses for Open Source Threat Intelligence
    Shim, WooChul
    Shin, Hyejin
    Hwang, Yong Ho
    IEEE SECURITY & PRIVACY, 2022, 20 (04) : 8 - 22
  • [2] Exploring Open Source Information for Cyber Threat Intelligence
    Adewopo, Victor
    Gonen, Bilal
    Adewopo, Festus
    2020 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2020, : 2232 - 2241
  • [3] A Web Semantic Mining Method for Fake Cybersecurity Threat Intelligence in Open Source Communities
    Li, Zhihua
    Yu, Xinye
    Zhao, Yukai
    INTERNATIONAL JOURNAL ON SEMANTIC WEB AND INFORMATION SYSTEMS, 2024, 20 (01)
  • [4] Open source threat intelligence discovery based on topic detection
    Li, Dong
    Zhou, Xiao
    Xue, Ao
    2020 29TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN 2020), 2020,
  • [5] EXPLORING OPEN-SOURCE INFORMATION FOR CYBER THREAT INTELLIGENCE
    Netke, Madhavi M.
    Patil, Sarita
    Mahajan, Manjushree
    INTERNATIONAL JOURNAL OF EARLY CHILDHOOD SPECIAL EDUCATION, 2022, 14 (02) : 8157 - 8163
  • [6] A System for Automated Open-Source Threat Intelligence Gathering and Management
    Gao, Peng
    Liu, Xiaoyuan
    Choi, Edward
    Soman, Bhavna
    Mishra, Chinmaya
    Farris, Kate
    Song, Dawn
    SIGMOD '21: PROCEEDINGS OF THE 2021 INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, 2021, : 2716 - 2720
  • [7] On the Automated Assessment of Open-Source Cyber Threat Intelligence Sources
    Tundis, Andrea
    Ruppert, Samuel
    Muehlhaeuser, Max
    COMPUTATIONAL SCIENCE - ICCS 2020, PT II, 2020, 12138 : 453 - 467
  • [8] Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence
    Liao, Xiaojing
    Yuan, Kan
    Wang, XiaoFeng
    Li, Zhou
    Xing, Luyi
    Beyah, Raheem
    CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 755 - 766
  • [9] Open Source Intelligence Base Cyber Threat Inspection Framework for Critical Infrastructures
    Lee, Seokcheol
    Shon, Taeshik
    PROCEEDINGS OF 2016 FUTURE TECHNOLOGIES CONFERENCE (FTC), 2016, : 1030 - 1033
  • [10] Analysis of Open Source Business Intelligence Suites
    Marinheiro, Antonio
    Bernardino, Jorge
    PROCEEDINGS OF THE 2013 8TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI 2013), 2013,