| Veröffentlichte Version Download ( PDF | 1MB) | Lizenz: Creative Commons Namensnennung 4.0 International |
Measuring and visualizing cyber threat intelligence quality
Schlette, Daniel
, Böhm, Fabian, Caselli, Marco und Pernul, Günther
(2020)
Measuring and visualizing cyber threat intelligence quality.
International Journal of Information Security.
Veröffentlichungsdatum dieses Volltextes: 04 Mrz 2020 12:41
Artikel
DOI zum Zitieren dieses Dokuments: 10.5283/epub.41734
Zusammenfassung
The very raison d'etre of cyber threat intelligence (CTI) is to provide meaningful knowledge about cyber security threats. The exchange and collaborative generation of CTI by the means of sharing platforms has proven to be an important aspect of practical application. It is evident to infer that inaccurate, incomplete, or outdated threat intelligence is a major problem as only high-quality CTI ...
The very raison d'etre of cyber threat intelligence (CTI) is to provide meaningful knowledge about cyber security threats. The exchange and collaborative generation of CTI by the means of sharing platforms has proven to be an important aspect of practical application. It is evident to infer that inaccurate, incomplete, or outdated threat intelligence is a major problem as only high-quality CTI can be helpful to detect and defend against cyber attacks. Additionally, while the amount of available CTI is increasing it is not warranted that quality remains unaffected. In conjunction with the increasing number of available CTI, it is thus in the best interest of every stakeholder to be aware of the quality of a CTI artifact. This allows for informed decisions and permits detailed analyses. Our work makes a twofold contribution to the challenge of assessing threat intelligence quality. We first propose a series of relevant quality dimensions and configure metrics to assess the respective dimensions in the context of CTI. In a second step, we showcase the extension of an existing CTI analysis tool to make the quality assessment transparent to security analysts. Furthermore, analysts' subjective perceptions are, where necessary, included in the quality assessment concept.
Alternative Links zum Volltext
Beteiligte Einrichtungen
Details
| Dokumentenart | Artikel | ||||
| Titel eines Journals oder einer Zeitschrift | International Journal of Information Security | ||||
| Verlag: | Springer | ||||
|---|---|---|---|---|---|
| Ort der Veröffentlichung: | NEW YORK | ||||
| Datum | 2 März 2020 | ||||
| Institutionen | Wirtschaftswissenschaften > Institut für Wirtschaftsinformatik > Lehrstuhl für Wirtschaftsinformatik I - Informationssysteme (Prof. Dr. Günther Pernul) Informatik und Data Science > Fachbereich Wirtschaftsinformatik > Lehrstuhl für Wirtschaftsinformatik I - Informationssysteme (Prof. Dr. Günther Pernul) | ||||
| Identifikationsnummer |
| ||||
| Stichwörter / Keywords | DIMENSIONS; Cyber threat intelligence; Threat intelligence sharing; Data quality; Threat intelligence formats; Information security visualization | ||||
| Dewey-Dezimal-Klassifikation | 000 Informatik, Informationswissenschaft, allgemeine Werke > 004 Informatik 300 Sozialwissenschaften > 330 Wirtschaft | ||||
| Status | Veröffentlicht | ||||
| Begutachtet | Ja, diese Version wurde begutachtet | ||||
| An der Universität Regensburg entstanden | Ja | ||||
| URN der UB Regensburg | urn:nbn:de:bvb:355-epub-417345 | ||||
| Dokumenten-ID | 41734 |
Downloadstatistik
Downloadstatistik