Affiliation:
1. School of Engineering and Computer Science, University of Central Lancashire (UCLan), Preston PR1 2HE, UK
2. Faculty of Economics and Business, Amsterdam Business School, University of Amsterdam (UvA), 1018 TV Amsterdam, The Netherlands
Abstract
Cyber threats continue to evolve in complexity, thereby traditional cyber threat intelligence (CTI) methods struggle to keep pace. AI offers a potential solution, automating and enhancing various tasks, from data ingestion to resilience verification. This paper explores the potential of integrating artificial intelligence (AI) into CTI. We provide a blueprint of an AI-enhanced CTI processing pipeline and detail its components and functionalities. The pipeline highlights the collaboration between AI and human expertise, which is necessary to produce timely and high-fidelity cyber threat intelligence. We also explore the automated generation of mitigation recommendations, harnessing AI’s capabilities to provide real-time, contextual, and predictive insights. However, the integration of AI into CTI is not without its challenges. Thereby, we discuss the ethical dilemmas, potential biases, and the imperative for transparency in AI-driven decisions. We address the need for data privacy, consent mechanisms, and the potential misuse of technology. Moreover, we highlight the importance of addressing biases both during CTI analysis and within AI models, warranting their transparency and interpretability. Lastly, our work points out future research directions, such as the exploration of advanced AI models to augment cyber defenses, and human–AI collaboration optimization. Ultimately, the fusion of AI with CTI appears to hold significant potential in the cybersecurity domain.
Reference68 articles.
1. Johnson, C., Badger, L., Waltermire, D., Snyder, J., and Skorupka, C. (2023, September 22). Guide to Cyber Threat Information Sharing. October 2016, Available online: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-150.pdf.
2. Phythian, M. (2013). Understanding the Intelligence Cycle, Routledge Taylor & Francis Group.
3. A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection;Buczak;IEEE Commun. Surv.,2016
4. Strom, B.E., Applebaum, A., Miller, D.P., Nickels, K.C., Pennington, A.G., and Thomas, C.B. (2023, September 27). The MITRE Corporation. March 2020. Available online: https://attack.mitre.org/docs/ATTACK_Design_and_Philosophy_March_2020.pdf.
5. A threat-intelligence driven methodology to incorporate uncertainty in cyber risk analysis and enhance decision-making;Dekker;Wiley Secur. Priv.,2023