Affiliation:
1. mnemonic as
2. Trend Micro
3. King's College London
4. University of Oslo Faculty of Mathematics and Natural Sciences
Abstract
For a strong, collective defense in the digital domain we need to produce, consume, analyze and share cyber threat intelligence. With an increasing amount of available information, we need automation in order to be effective. We present the results from a questionnaire investigating the use of standards and standardization and how practitioners share and use cyber threat intelligence. We propose a strict data model for cyber threat intelligence which enables consumption of all relevant data, data validation and analysis of consumed content. The main contribution of this paper is insight into how cyber threat intelligence is shared and used by practitioners, and the strictness of the data model which enforces input of information and enables automation and deduction of new knowledge.
Publisher
Association for Computing Machinery (ACM)
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献