Aviso: para depositar documentos, por favor, inicia sesión e identifícate con tu cuenta de correo institucional de la UCM con el botón MI CUENTA UCM. No emplees la opción AUTENTICACIÓN CON CONTRASEÑA
 

Methodological Framework to Collect, Process, Analyze and Visualize Cyber Threat Intelligence Data

dc.contributor.authorBorges Amaro, Lucas José
dc.contributor.authorPercilio Azevedo, Bruce William
dc.contributor.authorLopes de Mendonca, Fabio Lucio
dc.contributor.authorFerreira Giozza, William
dc.contributor.authorOliveira Albuquerque, Robson de
dc.contributor.authorGarcía Villalba, Luis Javier
dc.date.accessioned2023-06-22T11:04:50Z
dc.date.available2023-06-22T11:04:50Z
dc.date.issued2022-01-24
dc.description.abstractCyber attacks have increased in frequency in recent years, affecting small, medium and large companies, creating an urgent need for tools capable of helping the mitigation of such threats. Thus, with the increasing number of cyber attacks, we have a large amount of threat data from heterogeneous sources that needs to be ingested, processed and analyzed in order to obtain useful insights for their mitigation. This study proposes a methodological framework to collect, organize, filter, share and visualize cyber-threat data to mitigate attacks and fix vulnerabilities, based on an eight-step cyber threat intelligence model with timeline visualization of threats information and analytic data insights. We developed a tool to address needs in which the cyber security analyst can insert threat data, analyze them and create a timeline to obtain insights and a better contextualization of a threat. Results show the facilitation of understanding the context in which the threats are inserted, rendering the mitigation of vulnerabilities more effective.
dc.description.departmentDepto. de Ingeniería de Software e Inteligencia Artificial (ISIA)
dc.description.facultyFac. de Informática
dc.description.refereedTRUE
dc.description.sponsorshipUnión Europea. Horizonte 2020
dc.description.statuspub
dc.eprint.idhttps://eprints.ucm.es/id/eprint/74844
dc.identifier.doi10.3390/app12031205
dc.identifier.issn2076-3417
dc.identifier.officialurlhttps://doi.org/10.3390/app12031205
dc.identifier.relatedurlhttps://www.mdpi.com/2076-3417/12/3/1205/htm
dc.identifier.urihttps://hdl.handle.net/20.500.14352/72082
dc.issue.number3
dc.journal.titleApplied Sciences
dc.language.isoeng
dc.page.initial1205
dc.publisherMPDI
dc.relation.projectIDHEROES (101021801)
dc.rightsAtribución 3.0 España
dc.rights.accessRightsopen access
dc.rights.urihttps://creativecommons.org/licenses/by/3.0/es/
dc.subject.keywordanalytics
dc.subject.keywordcyber threat intelligence
dc.subject.keywordframework
dc.subject.keywordsharing
dc.subject.keywordvisualization
dc.subject.keywordvulnerabilities
dc.subject.ucmBases de datos (Informática)
dc.subject.ucmSeguridad informática
dc.titleMethodological Framework to Collect, Process, Analyze and Visualize Cyber Threat Intelligence Data
dc.typejournal article
dc.volume.number12
dspace.entity.typePublication
relation.isAuthorOfPublication0f67f6b3-4d2f-4545-90e1-95b8d9f3e1f0
relation.isAuthorOfPublication.latestForDiscovery0f67f6b3-4d2f-4545-90e1-95b8d9f3e1f0

Download

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
applsci-12-01205.pdf
Size:
1.5 MB
Format:
Adobe Portable Document Format

Collections