Strategic cyber threat intelligence sharing: A case study of IDS logs

Spike E. Dog, Alex Tweed, Leroy Rouse, Bill Chu, Duan Qi, Yueqi Hu, Jing Yang, Ehab Al-Shaer

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

12 Scopus citations

Abstract

Cyber threat intelligence sharing is emerging as an important tool for network security as it can identify evolving threat patterns and prevent attackers from replicating their early success across the Internet. However the types of information sharing being practiced today are at the tactical level focusing on specific attacks, e.g. characteristics of a piece of malware, and black listed IP addresses and domains. In this paper we argue sharing cyber intelligence at a more strategic level is needed. By strategic information we mean information about salient common features of groups of attacks and attackers. Strategic information allows us to take actions that are much closer to the source of the attacks. For example instead of block an IP address as opposed to shutting down the botnet. We propose at set of strategic cyber threat indicators and show how they can be derived using an IDS log from a large commercial enterprise.

Original languageEnglish
Title of host publication2016 25th International Conference on Computer Communications and Networks, ICCCN 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781509022793
DOIs
StatePublished - 14 Sep 2016
Externally publishedYes
Event25th International Conference on Computer Communications and Networks, ICCCN 2016 - Waikoloa, United States
Duration: 1 Aug 20164 Aug 2016

Publication series

Name2016 25th International Conference on Computer Communications and Networks, ICCCN 2016

Conference

Conference25th International Conference on Computer Communications and Networks, ICCCN 2016
Country/TerritoryUnited States
CityWaikoloa
Period1/08/164/08/16

Bibliographical note

Publisher Copyright:
© 2016 IEEE.

Keywords

  • Cyber threat intelligence
  • Information visualization
  • Intrusion detection
  • Machine learning
  • Security analytics

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications
  • Hardware and Architecture

Fingerprint

Dive into the research topics of 'Strategic cyber threat intelligence sharing: A case study of IDS logs'. Together they form a unique fingerprint.

Cite this