Modeling Cyber Threat Intelligence

Siri Bromander, Morton Swimmer, Martin Eian, Geir Skjotskift, Fredrik Borg

Abstract

For a strong, collective defense in the digital domain we need to produce, consume, analyze and share cyber threat intelligence. With an increasing amount of available information, we need automation in order to be effective. We propose a strict data model for cyber threat intelligence which enables consumption of all relevant data, data validation and analysis of consumed content. The main contribution of this paper is the strictness of the data model which enforces input of information and enables automation and deduction of new knowledge.

Download


Paper Citation


in Harvard Style

Bromander S., Swimmer M., Eian M., Skjotskift G. and Borg F. (2020). Modeling Cyber Threat Intelligence.In Proceedings of the 6th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, ISBN 978-989-758-399-5, pages 273-280. DOI: 10.5220/0008875302730280


in Bibtex Style

@conference{icissp20,
author={Siri Bromander and Morton Swimmer and Martin Eian and Geir Skjotskift and Fredrik Borg},
title={Modeling Cyber Threat Intelligence},
booktitle={Proceedings of the 6th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,},
year={2020},
pages={273-280},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0008875302730280},
isbn={978-989-758-399-5},
}


in EndNote Style

TY - CONF

JO - Proceedings of the 6th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,
TI - Modeling Cyber Threat Intelligence
SN - 978-989-758-399-5
AU - Bromander S.
AU - Swimmer M.
AU - Eian M.
AU - Skjotskift G.
AU - Borg F.
PY - 2020
SP - 273
EP - 280
DO - 10.5220/0008875302730280