Author:
Al-Mohannadi Hamad,Awan Irfan,Al Hamar Jassim
Abstract
AbstractThe understanding of cyber threats to a network is challenging yet rewarding as it allows an organisation to prevent a potential attack. Numerous efforts have been made to predict cyber threat before they occur. To build a threat intelligence framework, an organisation must understand attack data collected from the network events and analyse them to identify the cyber attack artefacts such as IP address, domain name, tools and techniques, username and password, and geographic location of the attacker, which could be used to understand the nature of attack to a system or network. However, it is very difficult or dangerous to collect and analyse live data from a production system. Honeypot technology is well known for mimicking the real system while collecting actual data that can be in near real time in order to monitor the activities on the network. This paper proposes a threat intelligence approach analysing attack data collected using cloud-based web service in order to support the active threat intelligence.
Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Information Systems,Management Information Systems,Software
Reference37 articles.
1. Al-Mohannadi H, Awan I, Al Hamar J, Al Hamar Y, Shah M, Musa A (2018) Understanding awareness of cyber security threat among it employees. In: 2018 6th international conference on future internet of things and cloud workshops (FiCloudW). IEEE, pp 188–192
2. Al-Mohannadi H, Mirza Q, Namanya A, Awan I, Cullen A, Disso J (2016) Cyber-attack modeling analysis techniques: an overview. In: 2016 IEEE 4th international conference on future internet of things and cloud workshops (FiCloudW), pp 69–76
3. Angiulli F, Argento L, Furfaro A, Parise A (2018) A hierarchical hybrid framework for modelling anomalous behaviours. Simul Model Pract Theory 82:103–115
4. BankofEngland (2016) Cbest intelligence-led testing: an introduction to cyber threat modelling. Bank of England Publication, London
5. Binaco D (2015) A framework for cyber threat hunting part 1: the pyramid of pain. http://blog.sqrrl.com/a-framework-for-threat-huntingpart-1-the-pyramid-of-pain. Accessed 5 Apr 2017
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献