Abstract
Abstract
This article provides an example of the use of deceptive systems as data sources for a cyber threat intelligence platform. The main result is the preliminary verification and enrichment of indicators of compromise (thereby trying to solve the problems of verification of indicators of compromise, IoC).
Subject
General Physics and Astronomy
Reference21 articles.
1. A framework for effective threat hunting;Bhardwaj;Network Security,2019
2. When cellular meets WiFi in wireless small cell networks;Bennis;IEEE Communications Magazine,2013
3. LTE Release 12 and beyond;Astely;IEEE Communications Magazine,2013
4. Estimation of network traffic anomalies based on cyclic analysis;Kireeva;T-Comm.,2018
5. Review of cyber threat analysis platforms;Tumanov,2019