Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2808128.2808133acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

From Cyber Security Information Sharing to Threat Management

Published: 12 October 2015 Publication History

Abstract

Across the world, organizations have teams gathering threat data to protect themselves from incoming cyber attacks and maintain a strong cyber security posture. Teams are also sharing information, because along with the data collected internally, organizations need external information to have a comprehensive view of the threat landscape. The information about cyber threats comes from a variety of sources, including sharing communities, open-source and commercial sources, and it spans many different levels and timescales. Immediately actionable information are often low-level indicators of compromise, such as known malware hash values or command-and-control IP addresses, where an actionable response can be executed automatically by a system. Threat intelligence refers to more complex cyber threat information that has been acquired or inferred through the analysis of existing information. Information such as the different malware families used over time with an attack or the network of threat actors involved in an attack, is valuable information and can be vital to understanding and predicting attacks, threat developments, as well as informing law enforcement investigations. This information is also actionable, but on a longer time scale. Moreover, it requires action and decision-making at the human level. There is a need for effective intelligence management platforms to facilitate the generation, refinement, and vetting of data, post sharing. In designing such a system, some of the key challenges that exist include: working with multiple intelligence sources, combining and enriching data for greater intelligence, determining intelligence relevance based on technical constructs, and organizational input, delivery into organizational workflows and into technological products. This paper discusses these challenges encountered and summarizes the community requirements and expectations for an all-encompassing Threat Intelligence Management Platform. The requirements expressed in this paper, when implemented, will serve as building blocks to create systems that can maximize value out of a set of collected intelligence and translate those findings into action for a broad range of stakeholders.

References

[1]
Allen, J. and Lehrer, N. 1992. DARPA/Rome Laboratory Planning and Scheduling Initiative Knowledge Representation Specification Language (KRSL), Version 2.0.1 Reference Manual. ISX Corporation.
[2]
Aziz, A. System and method of detecting malicious traffic while reducing false positives. US8776229 B1.
[3]
Bonifacio, M. et al. 2004. Peer-Mediated Distributed Knowledge Management. Agent-Mediated Knowledge Management. L. van Elst et al., eds. Springer Berlin Heidelberg. 31--47.
[4]
Burger, E.W. et al. 2014. Taxonomy Model for Cyber Threat Intelligence Information Exchange Technologies. Proceedings of the 2014 ACM Workshop on Information Sharing & Collaborative Security (New York, NY, USA, 2014), 51--60.
[5]
Clark, R.M. 2004. Intelligence Analysis: A Target-centric Approach. CQ Press.
[6]
Dandurand, L. and Serrano, O.S. 2013. Towards improved cyber security information sharing. Cyber Conflict (CyCon), 2013 5th International Conference on (Jun. 2013), 1--16.
[7]
Edwards, C. et al. System and method of data collection, processing, analysis, and annotation for monitoring cyber-threats and the notification thereof to subscribers. US 20020038430 A1.
[8]
Ehrig, M. et al. 2003. SWAP: Ontology-based Knowledge Management with Peer-to-Peer Technology.
[9]
Fransen, F. et al. 2015. Cyber security information exchange to gain insight into the effects of cyber threats and incidents. e & i Elektrotechnik und Informationstechnik. 132, 2 (2015), 106--112.
[10]
Fulton, J.A. 1992. Technical report on the semantic unification meta-model. Standards working document ISO TC184/SC4/WG3 N103. IGES/PDES Organization, Dictionary/Methodology Committee.
[11]
Gruber, T.R. 1995. Toward principles for the design of ontologies used for knowledge sharing? International Journal of Human-Computer Studies. 43, 5-6 (Nov. 1995), 907--928.
[12]
INFOSEC Research Council 2006. Hard Problems List. Cyber Security and Information Assurance Interagency Working Group (CSIA IWG).
[13]
Kalfoglou, Y. and Schorlemmer, M. 2003. Ontology Mapping: The State of the Art. The knowledge engineering review. 18, 1 (2003), 1--31.
[14]
Kampanakis, P. 2014. Security Automation and Threat Information-Sharing Options. Security Privacy, IEEE. 12, 5 (Sep. 2014), 42--51.
[15]
Serrano, O. et al. 2014. On the Design of a Cyber Security Data Sharing System. Proceedings of the 2014 ACM Workshop on Information Sharing & Collaborative Security (New York, NY, USA, 2014), 61--69.
[16]
Sommer, R. and Paxson, V. 2010. Outside the closed world: On using machine learning for network intrusion detection. Security and Privacy (SP), 2010 IEEE Symposium on (2010), 305--316.
[17]
2014. Standards and tools for exchange and processing of actionable information. ENISA -- European Union Agency for Network and Information Security.

Cited By

View all
  • (2025)TIMFuser: A multi-granular fusion framework for cyber threat intelligenceComputers & Security10.1016/j.cose.2024.104141148(104141)Online publication date: Jan-2025
  • (2024)Cyber Threat Intelligence meets the Analytic TradecraftACM Transactions on Privacy and Security10.1145/370129928:1(1-37)Online publication date: 24-Oct-2024
  • (2024)The "Big Beast to Tackle": Practices in Quality Assurance for Cyber Threat IntelligenceProceedings of the 27th International Symposium on Research in Attacks, Intrusions and Defenses10.1145/3678890.3678903(337-352)Online publication date: 30-Sep-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
WISCS '15: Proceedings of the 2nd ACM Workshop on Information Sharing and Collaborative Security
October 2015
84 pages
ISBN:9781450338226
DOI:10.1145/2808128
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 12 October 2015

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. cyber security
  2. data sharing
  3. threat intelligence

Qualifiers

  • Research-article

Conference

CCS'15
Sponsor:

Acceptance Rates

WISCS '15 Paper Acceptance Rate 6 of 16 submissions, 38%;
Overall Acceptance Rate 23 of 58 submissions, 40%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)251
  • Downloads (Last 6 weeks)33
Reflects downloads up to 23 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2025)TIMFuser: A multi-granular fusion framework for cyber threat intelligenceComputers & Security10.1016/j.cose.2024.104141148(104141)Online publication date: Jan-2025
  • (2024)Cyber Threat Intelligence meets the Analytic TradecraftACM Transactions on Privacy and Security10.1145/370129928:1(1-37)Online publication date: 24-Oct-2024
  • (2024)The "Big Beast to Tackle": Practices in Quality Assurance for Cyber Threat IntelligenceProceedings of the 27th International Symposium on Research in Attacks, Intrusions and Defenses10.1145/3678890.3678903(337-352)Online publication date: 30-Sep-2024
  • (2024)What do malware analysts want from academia? A survey on the state-of-the-practice to guide research developmentsProceedings of the 27th International Symposium on Research in Attacks, Intrusions and Defenses10.1145/3678890.3678892(77-96)Online publication date: 30-Sep-2024
  • (2024)A Threat-Led Approach to Mitigating Ransomware Attacks: Insights from a Comprehensive Analysis of the Ransomware EcosystemProceedings of the 2024 European Interdisciplinary Cybersecurity Conference10.1145/3655693.3661321(210-216)Online publication date: 5-Jun-2024
  • (2024)Navigating the Cyber Battlefield: Understanding Threats and Safeguarding Digital Frontiers2024 International Conference on Electrical Electronics and Computing Technologies (ICEECT)10.1109/ICEECT61758.2024.10739310(1-6)Online publication date: 29-Aug-2024
  • (2024)Integrating Machine Learning for Sustaining Cybersecurity in Digital BanksHeliyon10.1016/j.heliyon.2024.e37571(e37571)Online publication date: Sep-2024
  • (2024)Automating shareable cyber threat intelligence production for closed source software vulnerabilities: a deep learning based detection systemInternational Journal of Information Security10.1007/s10207-024-00882-423:5(3135-3151)Online publication date: 1-Oct-2024
  • (2024)Extended Horizons: Multi-hop Awareness in Network GamesDecision and Game Theory for Security10.1007/978-3-031-74835-6_10(201-219)Online publication date: 11-Oct-2024
  • (2024)A BERT-Based Framework for Automated Extraction of Behavioral Indicators of Compromise from Security Incident ReportsFoundations and Practice of Security10.1007/978-3-031-57537-2_14(219-232)Online publication date: 25-Apr-2024
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media