Reading the tea leaves: A comparative analysis of threat intelligence

VG Li, M Dunn, P Pearce, D McCoy… - 28th USENIX security …, 2019 - usenix.org
The term" threat intelligence" has swiftly become a staple buzzword in the computer security
industry. The entirely reasonable premise is that, by compiling up-to-date information about …

A different cup of {TI}? the added value of commercial threat intelligence

X Bouwman, H Griffioen, J Egbers, C Doerr… - 29th USENIX security …, 2020 - usenix.org
Commercial threat intelligence is thought to provide unmatched coverage on attacker
behavior, but it is out of reach for many organizations due to its hefty price tag. This paper …

Quality evaluation of cyber threat intelligence feeds

H Griffioen, T Booij, C Doerr - … , ACNS 2020, Rome, Italy, October 19–22 …, 2020 - Springer
In order to mount an effective defense, information about likely adversaries, as well as their
techniques, tactics and procedures is needed. This so-called cyber threat intelligence helps …

From cyber security information sharing to threat management

S Brown, J Gommers, O Serrano - … of the 2nd ACM workshop on …, 2015 - dl.acm.org
Across the world, organizations have teams gathering threat data to protect themselves from
incoming cyber attacks and maintain a strong cyber security posture. Teams are also …

Made: Security analytics for enterprise threat detection

A Oprea, Z Li, R Norris, K Bowers - … of the 34th Annual Computer Security …, 2018 - dl.acm.org
Enterprises are targeted by various malware activities at a staggering rate. To counteract the
increased sophistication of cyber attacks, most enterprises deploy within their perimeter a …

Collective threat intelligence gathering system

JC Magee, AM Andrews, MW Nicholson… - US Patent …, 2014 - Google Patents
Information networks are threatened on a daily basis with attacks from malicious computers
or software, Such as bot nets (collections of computers controlled by a central actor, used for …

AttacKG: Constructing technique knowledge graph from cyber threat intelligence reports

Z Li, J Zeng, Y Chen, Z Liang - European Symposium on Research in …, 2022 - Springer
Cyber attacks are becoming more sophisticated and diverse, making attack detection
increasingly challenging. To combat these attacks, security practitioners actively summarize …

Threat intelligence computing

X Shu, F Araujo, DL Schales, MP Stoecklin… - Proceedings of the …, 2018 - dl.acm.org
Cyber threat hunting is the process of proactively and iteratively formulating and validating
threat hypotheses based on security-relevant observations and domain knowledge. To …

[PDF][PDF] The evolution of cyber threat intelligence (cti): 2019 sans cti survey

R Brown, RM Lee - SANS Institute. Available online: https://www. sans. org …, 2019 - a51.nl
Cyber threat intelligence (CTI) analyzes information about the intent, capabilities and
opportunities of adversaries in cyberspace, making it a valuable resource for organizations …

[PDF][PDF] Threat intelligence: What it is, and how to use it effectively

M Bromiley - SANS Institute InfoSec Reading Room, 2016 - nsfocusglobal.com
In today's cyber landscape, decision makers constantly question the value of their security
investments, asking whether each dollar is helping secure the business. Meanwhile, cyber …