Cyber Security Threat Intelligence Platforms
Cyber Security Threat Intelligence Platforms
Security
Senior security
Operation Center
Audience The board Defenders management;
architects staff; incident
response team
Attackers’
High level
Details of specific tactics, Indicators of
Content information on
incoming attacks techniques and compromise
changing risks
procedures
Time
Long term Short term Long term Immediate
frame
[Tounsi, 2019]
CTI process
Phase 2: Data Phase 4: Intel
Phase 1: Intel Phase 3: Threat
Collection and Usage and
Planning/Strategy Analytics
Aggregation Dissemination
16
Threats
A (simplified) taxonomy of threats
• multi-vectored
• attacks can use multiple means of propagation (e.g., web, email, applications)
• multi-staged
• attacks can infiltrate networks, spread, and ultimately exfiltrate the valuable
data
Prime threats in 2021
[ENISA 2021]
Prime threats in 2021
• Ransomware
• A type of malicious attack where attackers encrypt an organisation’s data and demand payment to restore access
• Malware
• Software or firmware intended to perform an unauthorised process that will have an adverse impact on the confidentiality, integrity, or availability of a
system
• Cryptojacking
• A type of cybercrime where a criminal secretly uses a victim’s computing power to generate cryptocurrency
• E-mail related threats
• A bundle of threats that exploit weaknesses in the human psyche and in everyday habits, rather than technical vulnerabilities in
information systems
• Threats against data
• Data breaches/leaks. A data breach or data leak is the release of sensitive, confidential or protected data to an untrusted environment
• Threats against availability and integrity
• Denial of Service (DoS), Web Attacks. DDoS is one of the most critical threats to IT systems, targeting their availability by exhausting resources, causing
decreases in performance, loss of data, and service outages
• Disinformation – misinformation
• Disinformation and misinformation campaigns are on the rise, spurred by the increased use of social media platforms and online media, as well as a
result of the increase of people’s online presence due to the COVID-19 pandemic
• Non-malicious threats
• Threats where malicious intent is not apparent. Mostly based on human errors and system misconfigurations
Top Trends
• Ransomware has been assessed as the prime threat for 2020-2021.
• Cybercriminals are increasingly motivated by monetisation of their activities, e.g.
ransomware. Cryptocurrency remains the most common pay-out method for threat
actors.
• Malware decline that was observed in 2020 continues during 2021.
• The volume of cryptojacking infections attained a record high in the first quarter of 2021
• COVID-19 is still the dominant lure in campaigns for e-mail attacks
• There was a surge in healthcare sector related data breaches
• Traditional DDoS (Distributed Denial of Service) campaigns in 2021 are more targeted,
more persistent and increasingly multivector.
• The IoT (Internet of Things) in conjunction with mobile networks is resulting in a new wave of
DDoS attacks.
• In 2020 and 2021 there has been a spike in non-malicious incidents, as the COVID-19
pandemic became a multiplier for human errors and system misconfigurations
[ENISA 2021]
Challenges
• Advanced persistent threats (APT)
• Sophisticated network attacks in which an attacker keeps trying until he gains access
to a network
• multi-vectored and multi-staged
• Polymorphic threats
• cyber attacks, such as viruses, worms or Trojans that constantly change
• filename changes, file compression, …
• Zero-day threats
• cyber threats on a publicly unknown vulnerability
• Composite threats
• exploit technical vulnerabilities in software and/or hardware
• exploit social vulnerabilities to gain personal information
• Phishing
Indicators of Compromise (IoC)
• Data fundamentals associated with cyber attacks
IoC: Network Indicators
• Found in URLs and Domain names used for
Command & Control (C&C) and link-based
malware delivery
• IP addresses used in detecting attacks from known
compromised servers, botnets and systems conducting
DDoS attacks
• Characterized by short lifetime
• Cloud-based hosting services
• It is no longer just compromised servers that are used, but
also legitimate IP addresses belonging to large corporations.
IoC: Host-based indicators
• Obtained through analysis of an infected device
• Malware names, decoy documents, file hashes of
the malware
• MD5 or SHA-1 hashes of binaries
• Dynamic Link Libraries (DLLs) are also often targeted
• E.g., attackers replace Windows system files to ensure
that their payload executes each time Windows starts.
• Registry keys added by malicious code
• Common technique with Trojans
IoC: email indicators
• Created typically when attackers use free email services
to send socially engineered emails to targeted
organizations and individuals
• Created from addresses that appear to belong to recognizable
individuals
• Containing intriguing email subject lines
• Often with attachments and links
• X-originating and X-forwarding IP addresses
• email headers identifying the originating IP address of:
• a client connecting to a mail server
• a client connecting to a web server through a HTTP proxy or load
balancer
• Monitoring these IP addresses when available provide
additional insight into attackers
Data Sources
IoC sources
• Commonly internal sources
• crowdsourcing, log and network data, honeynets
• Government-sponsored sources
• law enforcement, national security organizations
• industry sources
• Open Source INTelligence OSINT
• Public threat feeds
• Dshild, ZeuS Tracker, in-house intelligence collection such as attacker forums, social
media)
• commercial sources
• threat feeds, Software- as-a-Service (SaaS) threat alerting, security intelligence
providers.
Data Sources
• Open source or public CTI feeds (DNS, MalwareDomainList.com, …)
• Community or industry groups
• Security data gathered from IDS, firewall, endpoint and other security systems
• Media reports and news
Internal sources External sources • Incident response and live forencis
• SIEM platform
Structured (mainly) Structured Unstructured • Vulnerability data
• Network traffic analysis (packet and flow data)
Vulnerabilities
Firewall and router databases, IP blacklists Forums, news sites, • Forensics
Example logs, honeynets and whitelists, threat social media, dark web
data feeds • Application logs
• Closed or dark web sources
Collection: crawlers,
Technologies feed/web parsers • Security analytics platforms
for collecting Feed/web scraper,
Feed parser Processing: Natural
and parser
Language Processing
• User access and account information
processing
(NLP), machine learning • Honeypot data
• User behavior data
• Shared spreadsheeds or email
Internal sources
• Internal sources for threat data collected from within the organization
specifically internal network and SIEM that being implemented in
organization.
• Threat data from internal network can be in the form of email log, alerts,
incident response report, event logs, DNS logs, firewall log, etc.
CTI Systems Description
System activity, principally errors and security
System logs and events All systems
events
Network equipment, devices connecting/disconnecting, A CL alert,
Network events
(switches, routers, firewalls) login/failed login, etc.
Network utilisation and Network equipment, SNMP, NetFlow, R M O N, etc. to Network
tra c profiles (switches, routers, probes) management platform
Alerts from boundary Alerts/events collected and analysed by SIEM or
IDS/IPS, Firewall, WAF
devices vendor-specific management portal
Corporate AV software
Corporate AV system alerts from host AV
AV, system alerts installed on host systems,
software
(client and Server)
Human All systems Observed anomalies or events
Forensic All systems Artefacts and intelligence gathered after an event
Source Examples
[NIST 2016]
Internal sources
Source Examples
[NIST 2016]
Internal sources
Source Examples
Other Data Sources
Security Information and Event Summary reports synthesized from a variety of data sources (e.g., operating
Management (SIEM) system, application, and network logs)
[NIST 2016]
External sources
• External sources have a wide coverage
• “Open source” intelligence
• Security researcher, vendor blogs, publicly available reputation and block lists
• Private or commercial sources
• threat intelligence feeds, structured data reports, and unstructured reports (such as PDF
and Word documents).
Source Description
News feeds News articles covering ongoing threats
Vulnerability Alerts and advisories
Search automation Using search technologies to find vulnerable systems: Google dorks, Shodan, etc.
Anti-virus vendors Information, alerts, news feeds on malware activity and threats
Communications Monitoring communication channels for intelligence: Slack, IRC, Twitter, etc.
Dark web Intelligence available directly from the criminal underworld
Poster
information
Ransomware
code
Information of one
card for carders
Queries to be processed
Dark Web CTI platforms
Sector Platform Dark Web Data Source Analytics* Operational Intel*
Forum DNM C. Shop IRC
Industry Verint √ √ NL NL Network/text Portal, API
Skybox Security √ √ NL NL NL Portal, Feeds
LookingGlass √ NL NL Yes ML Portal, API
Recorded Future √ √ √ NL ML, NLP Portal, Feeds
Blueliv NL √ NL NL NL Portal
Digital Shadows √ √ NL NL Basic search Portal, API
Flashpoint √ NL √ NL Search, SME API
Surfwatch Labs √ √ No No SME, search Portal
ZeroFox NL √ No No Search Portal, API
CYR3CON √ √ NL NL Rule-based Blogs, feeds
DarkOwl √ √ √ √ NL Portal, feeds
Experian NL √ √ NL Search Portal
Academic AZSecure DIBBs √ √ √ √ None Newsletters
Intl. CyberCrime √ √ No No NL Newsletters
Research
IARPA CAUSE √ √ √ √ ML Newsletters
Cambridge Cybercrime √ No No No None Newsletters
Centre
IMPACT No √ No No NL Papers/data
MEMEX √ √ NL √ NL Papers/data
*Note: NL = Not Listed; ML=Machine Learning; API=Application Programming Interface; SME=Subject Matter Expert; NLP=Natural
Language Processing.
1. Economic incentives 3. The presence of trust among 7. Economic incentives from the provision
stemming from cost IE participants; of subsidies;
savings;
4. Incentives from receiving 8. Economic incentives stemming from
2. Incentives privileged information from gaining voice and influence;
stemming from the government or security
quality, value and services; 9. Economic incentives stemming from the
use of information use of cyber insurance;
shared; 5. Incentives deriving from the
processes and structures for 10. Incentives stemming from the
sharing; reputational benefits of participation;
[ENISA. 2010]
Challenges
Table 2 – Reasons for not to share.
1 Fearing negative publicity
2 Legal rules, Privacy issues
3 Quality issues
4 Untrusted participants
Knowledge)
Alerts
Configuration CVRF
Guidance CWE
CVSS
CVE Incident
XCCDF CCSS
Report
OCIL
CCE RID-T CYBEX
STIX RID
CWSS
IODEF IndEX
OVAL
MAEC
Intelligence Process
Collection Common formatting
Structured format
Processing Low overhead
Machine readability
Unambiguous data model
Analysis
Relationship mechanisms
Deploy Interoperability
Transport mechanism
Dissemination
Practical application
STIXv2 [46,47] & TAXII [52] IODEFv2 [52] & RID [53] OpenIOC [54]
Holistc Architecture
Threat ++++ ++++ ++++
Incident ++++ ++++ +++
Threat Actor ++++ ++++ ++
Defense ++++ ++ +
Intelligence Process
Common formatting ++++ ++++ ++++
Structured format ++++ ++++ ++++
Low overhead +++ +++ +++
Machine readability ++++ +++ ++++
Unambiguous data model ++++ +++ ++++
Relationship mechanisms ++++ ++ +++
Interoperability ++++ +++ +++
Transport mechanism ++++ ++++ +
Practical application ++++ ++ +++
Legend: very high (++++) high (+++) medium (++) low (+).
https://oasis-open.github.io/cti-documentation/stix/intro
A scenario representing an advanced
persistent threat (APT) intrusion set
• Suspected to be funded by the
country “Franistan”.
• Target is the Branistan People’s Party
(BPP),
• Two sophisticated campaigns and
attack patterns
• Insert false information into the BPP’s
web pages,
• DDoS effort against the BPP web
servers.
https://oasis-open.github.io/cti-documentation/stix/intro
Threat Intelligence Platforms
• Designed to solve the collection and storing problems of TTI and to facilitate sharing
threat information with other organizations in the threat intelligence space
• An emerging technology discipline that supports organizations’ threat intelligence
programs and helps them to improve their cyber threat intelligence capabilities
• TIPs enable organizations to easily bootstrap the core processes of collecting, normalizing,
enriching, correlating, analyzing, disseminating and sharing of threat related information
• Generally organized as large repositories that often use big data technologies (e.g. graph analysis
and data warehousing) to draw links between types of TTI, allowing quicker response to detected
threats, as well as a historical record of an IOC
TIP: Threat Intelligence Platforms
Role Contributions Needs and challenges
•
Automated data enrichment to reduce
repetitive work.
Good integration with SIEM tools
Incident • new indicators and malware samples • need tailored and ad-hoc intelligence
responders, coming from investigations • need detailed context and enrichment over
cyber fraud the indicators provided
analyss Lack of visibility into events across different
systems or domains
CTI analysts • Responsible for anything that goes in • centralised platform for managing TI
and out of the TIP • Too much threat intelligence information
• Enrich and analyse the data within TIP as • Lack of threat intelligence best practices
well as linking intelligence
Share intelligence with stakeholders
Web interface
Multiple users and groups
Role based access
PyMISP
MISP: Basic Concepts
• All the malware data entered into MISP are made up of event objects
• Events are containers of contextually linked information
• From an incident, a security report or a threat actor analysis
• Contains attributes with indicators
• Indicators contain a pattern that can be used to detect suspicious or
malicious cyber activity
• IoCs are a subset of indicators
MISP: Basic Concepts: Proposals
• Each event can only be directly edited by users of the original creator
organization
• However, if another organization would like to amend an event with
extra information on an event, or if they'd like to correct a mistake in
an attribute, they can create a Proposal
• Proposals can be accepted by the original creator
• Proposals can be pulled to another server, allowing users on
connected instances to propose changes that, if accepted, can be
subsequently pushed back
MISP: Basic Concepts: Delegation
1 * Indicator
Event (Attribute)
* *
TAGS Attach
MISP DB Format (complete)
Distribution Threat Level
Date Analysis
Category
Event Info Type
UUID 1 * Indicator
Distribution
Event (Attribute) Value
Contextual
Comment
For Intrusion
1 Detection System
* * Category
Name Distribution
Contextual
Color Comment
TAGS Attach FILE
Is a malware
sample
MISP DB Format (complete)
Network Activity
Distribution Threat Level
Date Analysis Payload Delivery
md5
Category Antivirus Detection hostname
... domain
Event Info Type ...
mac-address
UUID 1 * Indicator
Distribution regkey|value
Event (Attribute) Value Your Organization Only
This Community Only
Contextual
Comment
Connected Communities
For Intrusion
1 Detection System
All Communities
Antivirus
* * Category
Detection
Payload
Distribution Installation
Name ...
Contextual Network
Color Comment
Activity
TAGS Attach FILE
Is a malware
sample
MISP: Event Example
List of Event and Filters
Intelligence Plane
User-friendly Legal -privacy compliance
tools assessment Threat
Risk Analysis/ Threat/Incident Security
Usable consent Intelligence
Assessment Detection Analytics
Incident/ Impact Assessment Sharing
Blockchain Privacy-Preserving SSI Layer
Managed Domain
Security/
Privacy-
preservation
tools
Task 3.2 - Privacy-preservation
“We will enhance the state of the art for reliability, safety and
privacy guarantees of security intelligence techniques based
on artificial intelligence, machine learning and data analytics.”
Objectives and scope
• Define requirements and mechanisms to share digital evidence between expert
systems
• Interact with Threat Intelligence Information Services for early malware activity
detection
• Challenges:
• Issues with IoC
• Network indicators: “the faster you share, the more you theoretically will stop”
• cumulative uniqueness, time of spread, time of validity
• Malware indicators
• Obfuscation techniques
• Indicators such as created registry keys or file artifacts are less commonly changed by attackers but
they can be given random or pseudorandom component in their names
• Challenges:
• Traditional solutions (e.g., SIEM and SOAR solutions) may lack the necessary
capabilities to quickly adapt to new and/or evolving threats. They should integrate
intelligent components to automatize the process.
• Quality over quantity
• The daily dump of indicators seen as suspicious in Internet, provides information
approximating 250 to millions of indicators per day
• A common standardized format for sharing TI minimizes the risk of losing the quality of threat
data
• Provides better automated analytics solutions on large volumes of TTI
• customization, filtering, aggregation, search
Reducing the quantity of threat feeds
• Identifying the mutations of malware variants is essential in order to
recognize those belonging to the same family
• Data science and machine-learning models are looking to deliver
entirely new ways of searching malwares.
• Analyzing a huge amount of threats, to learn shared patterns
• Malware analysis, detection, classification, and clustering can help this
automation
Examples: Malheur
• collects behavioral analysis data inside sandbox
• malware binaries are collected in the wild and executed
• The execution of each malware binary results in a report of recorded behavior
• Extraction of prototypes from reports
• Automatic identification of groups (clusters) of reports containing similar behavior
• Classification of behavior based on a set of previously clustered reports
• Incremental analysis, by processing reports in chunks
Interoperability in privacy, requirements and
regulation
• Goal: Sharing trusted, reliable and privacy-preserving information
• How: Enforcing appropriate security and privacy policies to enforce sharing requirements of
threat intelligence and alerts
• Challenges:
• ensuring that information collected within TIPs is reliable and accurate
• Example: TIPs allow to export a subset of the data into Intrusion Detection System (IDS) rules that can be
inserted in solutions like Snort or Suricata. Malicious or unreliable input may compromise such HIDS and
NIDS
• Enhance the privacy and trust capabilities to overcome concerns
• Goal: Designing a solution meant for gathering and managing threat information from
different data sources
• Main objectives:
• Improving the accuracy of Threat Detection Systems in detecting incoming attacks
• Enabling the sharing of trusted, reliable and relevant threat information among
organizations
Our proposal
• Defining a distributed platform enabling the sharing of reliable and privatized data
• Main capabilities
• Threat Detection Systems cooperation
• Human in the loop (Active Learning)
• Data enrichment from different sources
• E.g., TDS, honeypots, etc
Active Learning
• Active Learning (AL) refers a family of approaches and algorithms wherein new instances to be labelled are
interactively chosen by means of a query
• Idea: providing unknown examples (extracted with different strategies) to an oracle that will correctly label them
• Usage Scenario: AL can is used when data are hard to label or highly skewed and allows for making sense of data
faster and more efficiently
• E.g., intrusion detection, fraud detection, fault detection, etc.
• Strategies:
• Uncertainty Sampling, Query-by-Committee, Expected Model changes, etc.
Platform overview
• There are essentially three actors
• TDS Layer
• Different types of Threat Detection Systems (e.g., IDS, IPS, etc) can interface with the TIP
• TDSs provide information concerning incoming attacks
• TDSs feed the TIP with new intrusion events/statistic
• Honeynet
• Honeypots are deployed with the aim to collect additional information concerning new attacks
Platform: main actors
Distributed TIP
sharing data concerning
new attacks MISP Event
Honeypot MISP MISP ... MISP Security Service
Instance 1 Instance 2 Instance k Providers/Consumers
Honeypot
Enriched IoCs, privatized data,
. Threat Intelligence Platform (TIP)
Risk Indicators, etc.
TIP information is used to
. deploy new honeypots alarms, pcap, TCP flow,
. security events other exchange
formats
Honeypot
TDS TDS ... TDS
Honeynet EBIDS Method 1 Method N
TDS input: Network Traffic
Threat Detection System (TDS) Layer TDS output: Alarms Computer Network
TIP Details
• A network of MISP instances
• Motivation
• Open source
• Strong underlying community
• Extensible (MISP Objects)
• Good documentation
• Support to different standards
Data exchange format
• The assets interface among them by using a custom MISP Object in JSON format
• The MISP object represents the data structure adopted by MISP to store
shared threat events
• The general template can be extended so as to include further relevant
information on specific threat events
Platform in action: TDS Cooperation
Distributed TIP
5 1 Network flow (pcap) is sent to TDS 1
MISP WEB
...
Interface
MISP MISP MISP
6 TDS 1 detects an anomaly and shares it with a MISP
Instance 1 Instance 2 Instance k 2 instance by sending a security event object (SEO)
TDS 2 gathers information from MISP
2 MISP Network 3 to update its classifier
TDS 2 classifies the new threat and updates
3 4 4 the SEO on MISP
An expert (either user or automated) checks
1 5
TDS TDS ... TDS the new threat via MISP Web Interface
Method 1 Method 2 Method N
6 The expert validates the threat event
Computer Network Threat Detection System (TDS) Layer
Benefits
• The amount of false positive reduced
• The sharing protocol allows different actors (either AI or humans) to validate
threat evidence and mutually benefit from feedbacks provided by other peers
• time to threat detection lowered
• Collaboration among automated predictive models allows for reducing the
average time to detect an intrusion
• Threat information better contextualized with additional IoCs coming
from other assets
• Privacy enhancement via cooperation with other assets in a seamless
integration
Concluding remarks
• Security intelligence platforms and sharing mechanisms can
substantially improve the security capabilities of cybersecurity
applications in various vertical domains and use cases
• Current Threat Intelligence platforms can take advantage from the
adoption of AI/ML tools
• Knowledge extraction from different sources
• Improving the quality of data via AI powered tools
• The need for strengthenining the collaborative mechanisms to include
• data-driven and AI powered threat detection systems
• Sophisticated refinements of IoCs
• privacy enabling techniques and methods to guarantee trust and confidence
Concluding remarks
• The CS4E contribution
• A research roadmap
• Vertical demonstrations with measurable benefits
• false positive alerts reduction
• contextualizing threat data
• boosting trust among producers and consumers of threat data
• strengthening the robustness of ML models
References
• V. Adewopo, B. Gonen and F. Adewopo, "Exploring Open Source Information for Cyber Threat Intelligence," 2020 IEEE International Conference on Big Data (Big Data), 2020, pp.
2232-2241,
• S. Barnum. Standardizing cyber threat intelligence information with the structured threat information expression (stix). Mitre Corporation 11 (2012), 1–22.
• E.W. Burger, M.D. Goodman, P . Kampanakis, K. A. Zhu. Taxonomy model for cyber threat intelligence information exchange technologies, in: Proceedings of the 2014 ACM
Workshop on Information Sharing & Collaborative Security, ACM, pp. 51–60; 2014.
• D . Chismon, M . Ruks. Threat intelligence: Collecting, analysing, evaluating, MWR Infosecurity, UK Cert, United Kingdom; 2015.
• A. de Melo e Silva, J.Costa Gondim, R. de Oliveira Al- buquerque, and L. J. García Villalba. 2020. A methodology to evaluate standards and platforms within cyber threat
intelligence. Future Internet 12, 6 (2020), 1–23
• P. -Y. Du et al., "Identifying, Collecting, and Presenting Hacker Community Data: Forums, IRC, Carding Shops, and DNMs," 2018 IEEE International Conference on Intelligence and
Security Informatics (ISI), 2018, pp. 70-75
• ENISA. 2010. Incentives and Challenges for Information Sharing in the Context of Network and Information Security. https://www.enisa.europa.eu/publications/incentives-and-
barriers-to-information-sharing
• ENISA. 2018. Exploring the opportunities and limitations of current Threat Intelligence Platforms. https://www.enisa.europa.eu/publications/exploring-the-opportunities-and-
limitations-of-current-threat-intelligence-platforms
• ENISA. 2021. Threat Landscape. https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends
• V . Ghanaei, C.S. Iliopoulos, R.E. Overill. Statistical approach towards malware classification and detection, in: SAI Computing Conference (SAI), 2016, IEEE, pp. 1093–1099; 2016.
• M. Guarascio, E. Ritacco, D. Biondo, R. Mammoliti, A. Toma. Integrating a Framework for Discovering Alternative App Stores in a Mobile App Monitoring Platform. In: NFMCP 2017.
LNCS, vol 10785.
• R. Holland, S. Balaouras, K. Mak. Five Steps To Build An Effective Threat Intelligence Capability, Forrester research, inc.; 2013.
• NIST 2016. Guide to Cyber Threat Information Sharing. NIST Special Publication 800-150. http://dx.doi.org/10.6028/NIST.SP.800-150
• O. Or-Meir, N. Nissim, Y. Elovici, and L. Rokach. 2019. Dynamic Malware Analysis in the Modern Era—A State of the Art Survey. ACM Comput. Surv. 52
References
• S. Piper Definitive guide to next generation threat protection, CyberEdge Group, LLC, 2013.
• A. Ramsdale S. Shiaeles, N. Kolokotronis, A Comparative Analysis of Cyber-Threat Intelligence Sources, Formats and Languages. Electronics. 2020; 9(5):824.
• S. Samtani, W. Li, V. Benjamin, and H. Chen. 2021. Informing Cyber Threat Intelligence through Dark Web Situational Awareness: The AZSecure Hacker Assets Portal. Digit. Threat.: Res. Pract. 2, 4,
2021
• S. Samtani, K. Chinn, C. Larson and H. Chen, "AZSecure Hacker Assets Portal: Cyber threat intelligence and malware analysis," 2016 IEEE Conference on Intelligence and Security Informatics (ISI),
2016, pp. 19-24
• W, Tounsi, H Rais, A survey on technical threat intelligence in the age of sophisticated cyber attacks, Computers & security, 2018 - Elsevier
• W. Tounsi, What is Cyber Threat Intelligence and How is it Evolving? In: Cyber-Vigilance and Digital Trust: Cyber Security in the Era of Cloud Computing and IoT, Wiley, 2019
• C. Sauerwein, I. Pekaric, M. Felderer, R. Breu, An analysis and classification of public information security data sources used in research and practice, Computers & Security, 82, 2019, Pages 140-
155,
• C. Sauerwein, C. Sillaber, A. Mussmann, R. Breu, 2017. Threat intelligence sharing platforms: An exploratory study of software vendors andresearch perspectives. Wirtschaftsinformatik und
Angewandte Informatik
• C. Sauerwein, D. Fischer, M. Rubsamen, G. Rosenberger, D. Stelzer, and R. Breu. 2021. From Threat Data to Actionable Intelligence:An Exploratory Analysis of the Intelligence Cycle Implementation
in Cyber Threat Intelligence Sharing Platforms. In The 16th International Conference on Availability, Reliability and Security (ARES 2021).
• M. Sahin and S. Bahtiyar. A Survey on Malware Detection with Deep Learning. In 13th International Conference on Security of Information and Networks (SIN 2020).
• F . Skopik, G . Settanni, R. Fiedler. A problem shared is a problem halved: a survey on the dimensions of collective cyber defense through security information sharing. Comput Secur 2016;60:154–
76.
• B. Stojkovski, G. Lenzini, V. Koenig, and S. Rivas. What’s in a Cyber Threat Intelligence sharing platform? A mixed-methods user experience investigation of MISP. In Annual Computer Security
Applications Conference (ACSAC 2021).
• Wagner et al. 2016. MISP: The Design and Implementation of a Collaborative Threat Intelligence Sharing Platform. In Proceedings of the 2016 ACM on Workshop on Information Sharing and
Collaborative Security (WISCS ‘16).
• A. Zibak and A. Simpson. 2019. Cyber Threat Information Sharing: Perceived Benefits and Barriers. In Proceedingsof the 14th International Conference on Availability, Reliability and Security (ARES
'19).
References
• A curated list of pointers on threat intelligence:
https://github.com/hslatman/awesome-threat-intelligence
• Collection of Cyber Threat Intelligence sources from the Deep and Dark Web
https://github.com/fastfire/deepdarkCTI
• Github topic: threat intelligence
https://github.com/topics/threat-intelligence
• CS4E deliverables:
• Deliverable D3.3: Research Challenges and Requirements to Manage Digital Evidence
• https://cybersec4europe.eu/wp-content/uploads/2020/02/D3.3-Research-challenges-and-
requirements-to-manage-digital-evidence-Submitted.pdf
• Deliverable D3.14: Cooperation With Threat Intelligence Services For Deploying
Adaptive Honeypots
• https://cybersec4europe.eu/wp-content/uploads/2021/10/D3.14-Cooperation-with-Threat-
Intelligence-Services-for-deploying-adaptive-honeypots_2.05_submitted.pdf