No Cover Image

Book chapter 1072 views

Application of Artificial Intelligence and Machine Learning in Producing Actionable Cyber Threat Intelligence

Reza Montasari Orcid Logo, Fiona Carroll, Stuart Macdonald Orcid Logo, Hamid Jahankhani, Amin Hosseinian-Far, Alireza Daneshkhah

Digital Forensic Investigation of Internet of Things (IoT) Devices, Pages: 47 - 64

Swansea University Authors: Reza Montasari Orcid Logo, Stuart Macdonald Orcid Logo

Abstract

Cyber Threat Intelligence (CTI) can be used by organisations to assist their security teams in safeguarding their networks against cyber-attacks. This can be achieved by including threat data feeds into their networks or systems. However, despite being an effective Cyber Security (CS) tool, many org...

Full description

Published in: Digital Forensic Investigation of Internet of Things (IoT) Devices
ISBN: 978-3-030-60424-0 978-3-030-60425-7
Published: Springer 2021
Online Access: https://www.springer.com/gp/book/9783030604240
URI: https://cronfa.swan.ac.uk/Record/cronfa54803
Tags: Add Tag
No Tags, Be the first to tag this record!
first_indexed 2021-01-03T20:19:36Z
last_indexed 2023-01-11T14:33:02Z
id cronfa54803
recordtype SURis
fullrecord <?xml version="1.0" encoding="utf-8"?><rfc1807 xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema"><bib-version>v2</bib-version><id>54803</id><entry>2020-07-25</entry><title>Application of Artificial Intelligence and Machine Learning in Producing Actionable Cyber Threat Intelligence</title><swanseaauthors><author><sid>e420369ac98aaaa7f39248e39a847af1</sid><ORCID>0000-0001-7136-6753</ORCID><firstname>Reza</firstname><surname>Montasari</surname><name>Reza Montasari</name><active>true</active><ethesisStudent>false</ethesisStudent></author><author><sid>933e714a4cc37c3ac12d4edc277f8f98</sid><ORCID>0000-0002-7483-9023</ORCID><firstname>Stuart</firstname><surname>Macdonald</surname><name>Stuart Macdonald</name><active>true</active><ethesisStudent>false</ethesisStudent></author></swanseaauthors><date>2020-07-25</date><deptcode>CSSP</deptcode><abstract>Cyber Threat Intelligence (CTI) can be used by organisations to assist their security teams in safeguarding their networks against cyber-attacks. This can be achieved by including threat data feeds into their networks or systems. However, despite being an effective Cyber Security (CS) tool, many organisations do not sufficiently utilise CTI. This is due to a number of reasons such as not fully understanding how to manage a daily flood of data filled with extraneous information across their security systems. This adds an additional layer of complexity to the tasksperformed by their security teams who might not have the appropriate tools or sufficient skills to determine what information to prioritise and what information to disregard. Therefore, to help address the stated issue, this paper aims firstly to provide an in-depth understanding of what CTI is and how it can benefit organisations, and secondly to deliver a brief analysis of the application of Artificial Intelligence and Machine Learning in generating actionable CTI. The key contribution of this paper is that it assists organisations in better understanding their approachto CTI, which in turn will enable them to make informed decisions in relation to CTI.</abstract><type>Book chapter</type><journal>Digital Forensic Investigation of Internet of Things (IoT) Devices</journal><volume/><journalNumber/><paginationStart>47</paginationStart><paginationEnd>64</paginationEnd><publisher>Springer</publisher><placeOfPublication/><isbnPrint>978-3-030-60424-0</isbnPrint><isbnElectronic>978-3-030-60425-7</isbnElectronic><issnPrint/><issnElectronic/><keywords/><publishedDay>1</publishedDay><publishedMonth>1</publishedMonth><publishedYear>2021</publishedYear><publishedDate>2021-01-01</publishedDate><doi/><url>https://www.springer.com/gp/book/9783030604240</url><notes/><college>COLLEGE NANME</college><department>Criminology, Sociology and Social Policy</department><CollegeCode>COLLEGE CODE</CollegeCode><DepartmentCode>CSSP</DepartmentCode><institution>Swansea University</institution><apcterm/><funders/><projectreference/><lastEdited>2023-09-18T07:59:20.6072287</lastEdited><Created>2020-07-25T19:11:13.8093830</Created><path><level id="1">Faculty of Humanities and Social Sciences</level><level id="2">Hilary Rodham Clinton School of Law</level></path><authors><author><firstname>Reza</firstname><surname>Montasari</surname><orcid>0000-0001-7136-6753</orcid><order>1</order></author><author><firstname>Fiona</firstname><surname>Carroll</surname><order>2</order></author><author><firstname>Stuart</firstname><surname>Macdonald</surname><orcid>0000-0002-7483-9023</orcid><order>3</order></author><author><firstname>Hamid</firstname><surname>Jahankhani</surname><order>4</order></author><author><firstname>Amin</firstname><surname>Hosseinian-Far</surname><order>5</order></author><author><firstname>Alireza</firstname><surname>Daneshkhah</surname><order>6</order></author></authors><documents/><OutputDurs/></rfc1807>
spelling v2 54803 2020-07-25 Application of Artificial Intelligence and Machine Learning in Producing Actionable Cyber Threat Intelligence e420369ac98aaaa7f39248e39a847af1 0000-0001-7136-6753 Reza Montasari Reza Montasari true false 933e714a4cc37c3ac12d4edc277f8f98 0000-0002-7483-9023 Stuart Macdonald Stuart Macdonald true false 2020-07-25 CSSP Cyber Threat Intelligence (CTI) can be used by organisations to assist their security teams in safeguarding their networks against cyber-attacks. This can be achieved by including threat data feeds into their networks or systems. However, despite being an effective Cyber Security (CS) tool, many organisations do not sufficiently utilise CTI. This is due to a number of reasons such as not fully understanding how to manage a daily flood of data filled with extraneous information across their security systems. This adds an additional layer of complexity to the tasksperformed by their security teams who might not have the appropriate tools or sufficient skills to determine what information to prioritise and what information to disregard. Therefore, to help address the stated issue, this paper aims firstly to provide an in-depth understanding of what CTI is and how it can benefit organisations, and secondly to deliver a brief analysis of the application of Artificial Intelligence and Machine Learning in generating actionable CTI. The key contribution of this paper is that it assists organisations in better understanding their approachto CTI, which in turn will enable them to make informed decisions in relation to CTI. Book chapter Digital Forensic Investigation of Internet of Things (IoT) Devices 47 64 Springer 978-3-030-60424-0 978-3-030-60425-7 1 1 2021 2021-01-01 https://www.springer.com/gp/book/9783030604240 COLLEGE NANME Criminology, Sociology and Social Policy COLLEGE CODE CSSP Swansea University 2023-09-18T07:59:20.6072287 2020-07-25T19:11:13.8093830 Faculty of Humanities and Social Sciences Hilary Rodham Clinton School of Law Reza Montasari 0000-0001-7136-6753 1 Fiona Carroll 2 Stuart Macdonald 0000-0002-7483-9023 3 Hamid Jahankhani 4 Amin Hosseinian-Far 5 Alireza Daneshkhah 6
title Application of Artificial Intelligence and Machine Learning in Producing Actionable Cyber Threat Intelligence
spellingShingle Application of Artificial Intelligence and Machine Learning in Producing Actionable Cyber Threat Intelligence
Reza Montasari
Stuart Macdonald
title_short Application of Artificial Intelligence and Machine Learning in Producing Actionable Cyber Threat Intelligence
title_full Application of Artificial Intelligence and Machine Learning in Producing Actionable Cyber Threat Intelligence
title_fullStr Application of Artificial Intelligence and Machine Learning in Producing Actionable Cyber Threat Intelligence
title_full_unstemmed Application of Artificial Intelligence and Machine Learning in Producing Actionable Cyber Threat Intelligence
title_sort Application of Artificial Intelligence and Machine Learning in Producing Actionable Cyber Threat Intelligence
author_id_str_mv e420369ac98aaaa7f39248e39a847af1
933e714a4cc37c3ac12d4edc277f8f98
author_id_fullname_str_mv e420369ac98aaaa7f39248e39a847af1_***_Reza Montasari
933e714a4cc37c3ac12d4edc277f8f98_***_Stuart Macdonald
author Reza Montasari
Stuart Macdonald
author2 Reza Montasari
Fiona Carroll
Stuart Macdonald
Hamid Jahankhani
Amin Hosseinian-Far
Alireza Daneshkhah
format Book chapter
container_title Digital Forensic Investigation of Internet of Things (IoT) Devices
container_start_page 47
publishDate 2021
institution Swansea University
isbn 978-3-030-60424-0
978-3-030-60425-7
publisher Springer
college_str Faculty of Humanities and Social Sciences
hierarchytype
hierarchy_top_id facultyofhumanitiesandsocialsciences
hierarchy_top_title Faculty of Humanities and Social Sciences
hierarchy_parent_id facultyofhumanitiesandsocialsciences
hierarchy_parent_title Faculty of Humanities and Social Sciences
department_str Hilary Rodham Clinton School of Law{{{_:::_}}}Faculty of Humanities and Social Sciences{{{_:::_}}}Hilary Rodham Clinton School of Law
url https://www.springer.com/gp/book/9783030604240
document_store_str 0
active_str 0
description Cyber Threat Intelligence (CTI) can be used by organisations to assist their security teams in safeguarding their networks against cyber-attacks. This can be achieved by including threat data feeds into their networks or systems. However, despite being an effective Cyber Security (CS) tool, many organisations do not sufficiently utilise CTI. This is due to a number of reasons such as not fully understanding how to manage a daily flood of data filled with extraneous information across their security systems. This adds an additional layer of complexity to the tasksperformed by their security teams who might not have the appropriate tools or sufficient skills to determine what information to prioritise and what information to disregard. Therefore, to help address the stated issue, this paper aims firstly to provide an in-depth understanding of what CTI is and how it can benefit organisations, and secondly to deliver a brief analysis of the application of Artificial Intelligence and Machine Learning in generating actionable CTI. The key contribution of this paper is that it assists organisations in better understanding their approachto CTI, which in turn will enable them to make informed decisions in relation to CTI.
published_date 2021-01-01T07:59:22Z
_version_ 1777357671501922304
score 11.036684