Modeling Cyber Threat Intelligence
Siri Bromander, Siri Bromander, Morton Swimmer, Martin Eian, Geir Skjotskift, Fredrik Borg
2020
Abstract
For a strong, collective defense in the digital domain we need to produce, consume, analyze and share cyber threat intelligence. With an increasing amount of available information, we need automation in order to be effective. We propose a strict data model for cyber threat intelligence which enables consumption of all relevant data, data validation and analysis of consumed content. The main contribution of this paper is the strictness of the data model which enforces input of information and enables automation and deduction of new knowledge.
DownloadPaper Citation
in Harvard Style
Bromander S., Swimmer M., Eian M., Skjotskift G. and Borg F. (2020). Modeling Cyber Threat Intelligence. In Proceedings of the 6th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, ISBN 978-989-758-399-5, pages 273-280. DOI: 10.5220/0008875302730280
in Bibtex Style
@conference{icissp20,
author={Siri Bromander and Morton Swimmer and Martin Eian and Geir Skjotskift and Fredrik Borg},
title={Modeling Cyber Threat Intelligence},
booktitle={Proceedings of the 6th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,},
year={2020},
pages={273-280},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0008875302730280},
isbn={978-989-758-399-5},
}
in EndNote Style
TY - CONF
JO - Proceedings of the 6th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,
TI - Modeling Cyber Threat Intelligence
SN - 978-989-758-399-5
AU - Bromander S.
AU - Swimmer M.
AU - Eian M.
AU - Skjotskift G.
AU - Borg F.
PY - 2020
SP - 273
EP - 280
DO - 10.5220/0008875302730280