首页> 外文会议>International Conference on Platform Technology and Service >Managing Cyber Threat Intelligence in a Graph Database: Methods of Analyzing Intrusion Sets, Threat Actors, and Campaigns
【24h】

Managing Cyber Threat Intelligence in a Graph Database: Methods of Analyzing Intrusion Sets, Threat Actors, and Campaigns

机译:在图形数据库中管理网络威胁情报:分析入侵集,威胁参与者和战役的方法

获取原文

摘要

Efforts to cope jointly with the ever-increasing number of breach incidents have resulted in the establishment of the standard format and protocol and given birth to many consultative groups. In addition, various channels that distribute Cyber Threat Intelligence information free of charge have emerged, and studies on utilizing such channels have spread. As the market for sharing information professionally is expanding, the need to manage the shared information in various ways in order to achieve better result has arisen. This paper proposes a standardized management structure and method based on the standardized format and a meaning and standard of Cyber Threat Intelligence that can be shared outside when loading OSINT information collected from various channels into the graph database. This paper also proposes a method of supporting the detection provided by existing security equipment with the information saved in the graph database and an effective method of analysis. Lastly, the paper discusses the advantages that can be expected from saving cyber threat information in the graph database developed using information collected from the outside.
机译:与不断增加的违规事件共同应对的努力导致标准格式和协议的建立,并催生了许多咨询小组。此外,已经出现了许多免费分发网络威胁情报信息的渠道,并且有关利用这种渠道的研究也得到了广泛传播。随着专业共享信息的市场不断扩大,已经出现了以各种方式管理共享信息以达到更好效果的需求。本文提出了一种基于标准化格式以及网络威胁情报的含义和标准的标准化管理结构和方法,当从各种渠道收集的OSINT信息加载到图形数据库中时可以在外部共享。本文还提出了一种利用图数据库中存储的信息来支持现有安全设备提供的检测的方法以及一种有效的分析方法。最后,本文讨论了将网络威胁信息保存在使用从外部收集的信息开发的图形数据库中可以预期的优势。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号