Hide metadata

dc.date.accessioned2017-09-23T16:03:49Z
dc.date.available2017-09-23T16:03:49Z
dc.date.created2017-09-14T09:48:55Z
dc.date.issued2017
dc.identifier.citationMavroeidis, Vasileios Bromander, Siri . Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligence. Proceedings of the IEEE. 2017
dc.identifier.urihttp://hdl.handle.net/10852/58492
dc.description.abstractThreat intelligence is the provision of evidence-based knowledge about existing or potential threats. Benefits of threat intelligence include improved efficiency and effectiveness in security operations in terms of detective and preventive capabilities. Successful threat intelligence within the cyber domain demands a knowledge base of threat information and an expressive way to represent this knowledge. This purpose is served by the use of taxonomies, sharing standards, and ontologies. This paper introduces the Cyber Threat Intelligence (CTI) model, which enables cyber defenders to explore their threat intelligence capabilities and understand their position against the ever-changing cyber threat landscape. In addition, we use our model to analyze and evaluate several existing taxonomies, sharing standards, and ontologies relevant to cyber threat intelligence. Our results show that the cyber security community lacks an ontology covering the complete spectrum of threat intelligence. To conclude, we argue the importance of developing a multi-layered cyber threat intelligence ontology based on the CTI model and the steps should be taken under consideration, which are the foundation of our future work.en_US
dc.languageEN
dc.publisherIEEE conference proceedings
dc.titleCyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligenceen_US
dc.typeChapteren_US
dc.creator.authorMavroeidis, Vasileios
dc.creator.authorBromander, Siri
cristin.unitcode185,15,0,0
cristin.unitnameDet matematisk-naturvitenskapelige fakultet
cristin.ispublishedtrue
cristin.fulltextpostprint
cristin.qualitycode2
dc.identifier.cristin1537298
dc.identifier.bibliographiccitationinfo:ofi/fmt:kev:mtx:ctx&ctx_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.jtitle=Proceedings of the IEEE&rft.volume=&rft.spage=&rft.date=2017
dc.identifier.startpage91
dc.identifier.endpage98
dc.identifier.doihttps://doi.org/10.1109/EISIC.2017.20
dc.identifier.urnURN:NBN:no-61200
dc.type.documentBokkapittelen_US
dc.type.peerreviewedPeer reviewed
dc.source.isbn978-1-5386-2385-5
dc.identifier.fulltextFulltext https://www.duo.uio.no/bitstream/handle/10852/58492/4/CTI_Mavroeidis.pdf
dc.type.versionAcceptedVersion
cristin.btitleProceedings of European Intelligence and Security Informatics Conference (EISIC) 2017


Files in this item

Appears in the following Collection

Hide metadata