Hide metadata

dc.date.accessioned2021-03-24T12:48:35Z
dc.date.available2021-03-24T12:48:35Z
dc.date.issued2021
dc.identifier.urihttp://hdl.handle.net/10852/84713
dc.description.abstractCyberattacks have the realistic potential of causing serious harm to humans, their assets and business processes. Cybersecurity is aimed at detecting, blocking and mitigating such threats and cyber threat intelligence is used to inform the decisions on how to respond to the ever-changing threats in and from cyber space. Increasing the effectiveness of cyber threat intelligence strengthens the collective digital defense. Cyber threat intelligence is collection, analysis and dissemination of relevant data, information and knowledge about cyber threats. Automation of such efforts increases the efficiency and allows use of advanced analysis techniques which requires large computational power. Such automation requires machine readable content. Standardization and structure provides a computer with the ability to read and process data, information and potentially knowledge. This thesis gives an overview of what cyber threat intelligence is and the status of standardization efforts within the domain. A datamodel which provides automation possibilities is suggested and explained.en_US
dc.language.isoenen_US
dc.relation.haspartPaper I: Siri Bromander, Audun Jøsang and Martin Eian ‘Semantic Cyberthreat modelling’. In Proceedings of the Eleventh Conference on Semantic Technology for Intelligence, Defense, and Security (STIDS 2016), pp. 74–78. The article is included in the thesis.
dc.relation.haspartPaper II: Siri Bromander ‘Ethical considerations in sharing cyber threat intelligence’. In: Proceedings of the Tenth Norwegian Information Security Conference (NISK 2017), pp. 54–62. The article is included in the thesis.
dc.relation.haspartPaper III: Vasileios Mavroeidis and Siri Bromander ‘Cyber threat intelligence model: An evaluation of taxonomies, sharing standards, and ontologies within cyber threat intelligence’. In: Proceedings of the 2017 European Intelligence and Security Informatics Conference (EISIC 2017), pp. 91–98. The article is included in the thesis.
dc.relation.haspartPaper IV: Siri Bromander, Lilly Muller, Martin Eian and Audun Jøsang ‘Examining the Known Truths of Cyber Threat Intelligence - the case of STIX’. In: Proceedings of the 15th International Conference on Cyber Warfare and Security (ICCWS 2020), pp. 493–XII. The article is included in the thesis.
dc.relation.haspartPaper V: Siri Bromander, Morton Swimmer, Martin Eian, Fredrik Borg and Geir Skjøtskift ‘Modelling Cyber Threat Intelligence’. In: Proceedings of the 6th International Conference on Information Systems Security and Privacy (ICISSP 2020), pp. 273-280. DOI: 10.5220/0008875302730280. The article is included in the thesis.
dc.relation.haspartPaper VI: Siri Bromander, Morton Swimmer, Lilly Muller, Martin Eian, Fredrik Borg and Geir Skjøtskift ‘Investigating sharing of Cyber Threat Intelligence and proposing a new data model for enabling automation in knowledge representation and exchange’. Submitted for publication in ACM Digital Threats: Research and Practice (DTRAP), October 2020. To be published. The paper is not available in DUO awaiting publishing.
dc.titleUnderstanding Cyber Threat Intelligence: Towards Automationen_US
dc.typeDoctoral thesisen_US
dc.creator.authorBromander, Siri
dc.identifier.urnURN:NBN:no-87408
dc.type.documentDoktoravhandlingen_US
dc.identifier.fulltextFulltext https://www.duo.uio.no/bitstream/handle/10852/84713/1/PhD-Bromander-2021.pdf


Files in this item

Appears in the following Collection

Hide metadata