Abstract
Cyber threat intelligence sharing is emerging as an important tool for network security as it can identify evolving threat patterns and prevent attackers from replicating their early success across the Internet. However the types of information sharing being practiced today are at the tactical level focusing on specific attacks, e.g. characteristics of a piece of malware, and black listed IP addresses and domains. In this paper we argue sharing cyber intelligence at a more strategic level is needed. By strategic information we mean information about salient common features of groups of attacks and attackers. Strategic information allows us to take actions that are much closer to the source of the attacks. For example instead of block an IP address as opposed to shutting down the botnet. We propose at set of strategic cyber threat indicators and show how they can be derived using an IDS log from a large commercial enterprise.
| Original language | English |
|---|---|
| Title of host publication | 2016 25th International Conference on Computer Communications and Networks, ICCCN 2016 |
| Publisher | Institute of Electrical and Electronics Engineers Inc. |
| ISBN (Electronic) | 9781509022793 |
| DOIs | |
| State | Published - 14 Sep 2016 |
| Externally published | Yes |
| Event | 25th International Conference on Computer Communications and Networks, ICCCN 2016 - Waikoloa, United States Duration: 1 Aug 2016 → 4 Aug 2016 |
Publication series
| Name | 2016 25th International Conference on Computer Communications and Networks, ICCCN 2016 |
|---|
Conference
| Conference | 25th International Conference on Computer Communications and Networks, ICCCN 2016 |
|---|---|
| Country/Territory | United States |
| City | Waikoloa |
| Period | 1/08/16 → 4/08/16 |
Bibliographical note
Publisher Copyright:© 2016 IEEE.
Keywords
- Cyber threat intelligence
- Information visualization
- Intrusion detection
- Machine learning
- Security analytics
ASJC Scopus subject areas
- Computer Networks and Communications
- Computer Science Applications
- Hardware and Architecture