• Keine Ergebnisse gefunden

Today, several different data formats with varying properties are available that allow to structure and describe incidents as well as cyber threat intelligence (CTI) information

N/A
N/A
Protected

Academic year: 2021

Aktie "Today, several different data formats with varying properties are available that allow to structure and describe incidents as well as cyber threat intelligence (CTI) information"

Copied!
1
0
0

Wird geladen.... (Jetzt Volltext ansehen)

Volltext

(1)

Unifying Cyber Threat Intelligence

The threat landscape and the associated number of IT security incidents are constantly increasing. In order to address this problem, a trend towards cooperative approaches and the exchange of information on security incidents has been developing over recent years. Today, several different data formats with varying properties are available that allow to structure and describe incidents as well as cyber threat intelligence (CTI) information. Observed differences in data formats implicate problems in regard to consistent understanding and compatibility. This ultimately builds a barrier for efficient information exchange. Moreover, a common definition for the components of CTI formats is missing.

In order to improve this situation, this work presents an approach for the description and unification of these formats. Therefore, we propose a model that describes the elementary properties as well as a common notation for entities within CTI formats. In addition, we develop a unified model to show the results of our work, to improve the understanding of CTI data formats and to discuss possible future research directions.

Referenzen

ÄHNLICHE DOKUMENTE

In Japan, company data in their primary form are mainly available in four types: uncon- solidated annual accounts according to the Commercial Code, reports according to the

alpha cursor location (row, column), graphics cursor location (X,Y), the location of a second graphics cursor tied to the alpha cursor, tracking cross location, cross- hair

As one of the hits, an ethyl acetate extract from in fl orescences of Verbesina lanata showed signi fi cant inhibitory activity in vitro against grapevine downy mildew

At the same time, as mobile internet becomes available and affordable, the mobile device can play as personal access point to private and shared data, as well as applications, which

The Mark IV Clustered Display System (formerly the CO:77 Information Display System) is a direct replace- ment for the IBM 3270 Information Display System and

However, meta-analyses have shown that in other genera sexually deceptive species tend to have lower levels of fruit set than related orchids with more generalized

The strategy defines cyber intelligence as follows: “the collection, processing, analysis, and dissemination of information from all sources of intelligence on foreign actors’

Actions in this plan are expected to include strengthening lab and surveillance capacity in member states, promoting proper infection control techniques within countries,