Pivot Attack Classification for Cyber Threat Intelligence
The initial access achieved by cyber adversaries conducting a systematic attack against a targeted network is unlikely to be an asset of interest. Therefore, it is necessary to use lateral movement techniques to expand access to different devices within ...
Rafael Salema Marques +3 more
doaj +1 more source
A Methodology to Evaluate Standards and Platforms within Cyber Threat Intelligence
The cyber security landscape is fundamentally changing over the past years. While technology is evolving and new sophisticated applications are being developed, a new threat scenario is emerging in alarming proportions.
Alessandra de Melo e Silva +3 more
doaj +1 more source
Visualizing Interesting Patterns in Cyber Threat Intelligence Using Machine Learning Techniques
In an advanced and dynamic cyber threat environment, organizations need to yield more proactive methods to handle their cyber defenses. Cyber threat data known as Cyber Threat Intelligence (CTI) of previous incidents plays an important role by helping ...
Ejaz Sarwat, Noor Umara, Rashid Zahid
doaj +1 more source
IMDfence: Architecting a Secure Protocol for Implantable Medical Devices
Over the past decade, focus on the security and privacy aspects of implantable medical devices (IMDs) has intensified, driven by the multitude of cybersecurity vulnerabilities found in various existing devices. However, due to their strict computational,
Muhammad Ali Siddiqi +2 more
doaj +1 more source
From Intelligence gathering to Cyber Threat Detection [PDF]
Intelligence plays a key role in the detection and neutralisation of threat actors in cyberspace, particularly when dealing with advanced ones. However, the relationship between intelligence and the final detection capabilities is not well–defined in ...
Antonio VILLALON-HUERTA +2 more
doaj
The Challenges of Leveraging Threat Intelligence to Stop Data Breaches
Despite the significant increase in cybersecurity solutions investment, organizations are still plagued by security breaches, especially data breaches. As more organizations experience crippling security breaches, the wave of compromised data is growing ...
Amani Ibrahim +3 more
doaj +1 more source
Methodological Framework to Collect, Process, Analyze and Visualize Cyber Threat Intelligence Data
Cyber attacks have increased in frequency in recent years, affecting small, medium and large companies, creating an urgent need for tools capable of helping the mitigation of such threats.
Lucas José Borges Amaro +5 more
doaj +1 more source
Cyber Threat Intelligence Mining for Proactive Cybersecurity Defense: A Survey and New Perspectives
Today’s cyber attacks have become more severe and frequent, which calls for a new line of security defenses to protect against them. The dynamic nature of new-generation threats, which are evasive, resilient, and complex, makes traditional security ...
Nan Sun +6 more
semanticscholar +1 more source
TTPXHunter: Actionable Threat Intelligence Extraction as TTPs from Finished Cyber Threat Reports [PDF]
Understanding the modus operandi of adversaries aids organizations to employ efficient defensive strategies and share intelligence in the community. This knowledge is often present in unstructured natural language text within threat analysis reports.
N. Rani +3 more
semanticscholar +1 more source
Adaptive Traffic Fingerprinting for Darknet Threat Intelligence [PDF]
Darknet technology such as Tor has been used by various threat actors for organising illegal activities and data exfiltration. As such, there is a case for organisations to block such traffic, or to try and identify when it is used and for what purposes.
Al-Khateeb, Haider +3 more
core +2 more sources

