Book chapter 1072 views
Application of Artificial Intelligence and Machine Learning in Producing Actionable Cyber Threat Intelligence
Reza Montasari ,
Fiona Carroll,
Stuart Macdonald ,
Hamid Jahankhani,
Amin Hosseinian-Far,
Alireza Daneshkhah
Digital Forensic Investigation of Internet of Things (IoT) Devices, Pages: 47 - 64
Swansea University Authors: Reza Montasari , Stuart Macdonald
Abstract
Cyber Threat Intelligence (CTI) can be used by organisations to assist their security teams in safeguarding their networks against cyber-attacks. This can be achieved by including threat data feeds into their networks or systems. However, despite being an effective Cyber Security (CS) tool, many org...
Published in: | Digital Forensic Investigation of Internet of Things (IoT) Devices |
---|---|
ISBN: | 978-3-030-60424-0 978-3-030-60425-7 |
Published: |
Springer
2021
|
Online Access: |
https://www.springer.com/gp/book/9783030604240 |
URI: | https://cronfa.swan.ac.uk/Record/cronfa54803 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
first_indexed |
2021-01-03T20:19:36Z |
---|---|
last_indexed |
2023-01-11T14:33:02Z |
id |
cronfa54803 |
recordtype |
SURis |
fullrecord |
<?xml version="1.0" encoding="utf-8"?><rfc1807 xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema"><bib-version>v2</bib-version><id>54803</id><entry>2020-07-25</entry><title>Application of Artificial Intelligence and Machine Learning in Producing Actionable Cyber Threat Intelligence</title><swanseaauthors><author><sid>e420369ac98aaaa7f39248e39a847af1</sid><ORCID>0000-0001-7136-6753</ORCID><firstname>Reza</firstname><surname>Montasari</surname><name>Reza Montasari</name><active>true</active><ethesisStudent>false</ethesisStudent></author><author><sid>933e714a4cc37c3ac12d4edc277f8f98</sid><ORCID>0000-0002-7483-9023</ORCID><firstname>Stuart</firstname><surname>Macdonald</surname><name>Stuart Macdonald</name><active>true</active><ethesisStudent>false</ethesisStudent></author></swanseaauthors><date>2020-07-25</date><deptcode>CSSP</deptcode><abstract>Cyber Threat Intelligence (CTI) can be used by organisations to assist their security teams in safeguarding their networks against cyber-attacks. This can be achieved by including threat data feeds into their networks or systems. However, despite being an effective Cyber Security (CS) tool, many organisations do not sufficiently utilise CTI. This is due to a number of reasons such as not fully understanding how to manage a daily flood of data filled with extraneous information across their security systems. This adds an additional layer of complexity to the tasksperformed by their security teams who might not have the appropriate tools or sufficient skills to determine what information to prioritise and what information to disregard. Therefore, to help address the stated issue, this paper aims firstly to provide an in-depth understanding of what CTI is and how it can benefit organisations, and secondly to deliver a brief analysis of the application of Artificial Intelligence and Machine Learning in generating actionable CTI. The key contribution of this paper is that it assists organisations in better understanding their approachto CTI, which in turn will enable them to make informed decisions in relation to CTI.</abstract><type>Book chapter</type><journal>Digital Forensic Investigation of Internet of Things (IoT) Devices</journal><volume/><journalNumber/><paginationStart>47</paginationStart><paginationEnd>64</paginationEnd><publisher>Springer</publisher><placeOfPublication/><isbnPrint>978-3-030-60424-0</isbnPrint><isbnElectronic>978-3-030-60425-7</isbnElectronic><issnPrint/><issnElectronic/><keywords/><publishedDay>1</publishedDay><publishedMonth>1</publishedMonth><publishedYear>2021</publishedYear><publishedDate>2021-01-01</publishedDate><doi/><url>https://www.springer.com/gp/book/9783030604240</url><notes/><college>COLLEGE NANME</college><department>Criminology, Sociology and Social Policy</department><CollegeCode>COLLEGE CODE</CollegeCode><DepartmentCode>CSSP</DepartmentCode><institution>Swansea University</institution><apcterm/><funders/><projectreference/><lastEdited>2023-09-18T07:59:20.6072287</lastEdited><Created>2020-07-25T19:11:13.8093830</Created><path><level id="1">Faculty of Humanities and Social Sciences</level><level id="2">Hilary Rodham Clinton School of Law</level></path><authors><author><firstname>Reza</firstname><surname>Montasari</surname><orcid>0000-0001-7136-6753</orcid><order>1</order></author><author><firstname>Fiona</firstname><surname>Carroll</surname><order>2</order></author><author><firstname>Stuart</firstname><surname>Macdonald</surname><orcid>0000-0002-7483-9023</orcid><order>3</order></author><author><firstname>Hamid</firstname><surname>Jahankhani</surname><order>4</order></author><author><firstname>Amin</firstname><surname>Hosseinian-Far</surname><order>5</order></author><author><firstname>Alireza</firstname><surname>Daneshkhah</surname><order>6</order></author></authors><documents/><OutputDurs/></rfc1807> |
spelling |
v2 54803 2020-07-25 Application of Artificial Intelligence and Machine Learning in Producing Actionable Cyber Threat Intelligence e420369ac98aaaa7f39248e39a847af1 0000-0001-7136-6753 Reza Montasari Reza Montasari true false 933e714a4cc37c3ac12d4edc277f8f98 0000-0002-7483-9023 Stuart Macdonald Stuart Macdonald true false 2020-07-25 CSSP Cyber Threat Intelligence (CTI) can be used by organisations to assist their security teams in safeguarding their networks against cyber-attacks. This can be achieved by including threat data feeds into their networks or systems. However, despite being an effective Cyber Security (CS) tool, many organisations do not sufficiently utilise CTI. This is due to a number of reasons such as not fully understanding how to manage a daily flood of data filled with extraneous information across their security systems. This adds an additional layer of complexity to the tasksperformed by their security teams who might not have the appropriate tools or sufficient skills to determine what information to prioritise and what information to disregard. Therefore, to help address the stated issue, this paper aims firstly to provide an in-depth understanding of what CTI is and how it can benefit organisations, and secondly to deliver a brief analysis of the application of Artificial Intelligence and Machine Learning in generating actionable CTI. The key contribution of this paper is that it assists organisations in better understanding their approachto CTI, which in turn will enable them to make informed decisions in relation to CTI. Book chapter Digital Forensic Investigation of Internet of Things (IoT) Devices 47 64 Springer 978-3-030-60424-0 978-3-030-60425-7 1 1 2021 2021-01-01 https://www.springer.com/gp/book/9783030604240 COLLEGE NANME Criminology, Sociology and Social Policy COLLEGE CODE CSSP Swansea University 2023-09-18T07:59:20.6072287 2020-07-25T19:11:13.8093830 Faculty of Humanities and Social Sciences Hilary Rodham Clinton School of Law Reza Montasari 0000-0001-7136-6753 1 Fiona Carroll 2 Stuart Macdonald 0000-0002-7483-9023 3 Hamid Jahankhani 4 Amin Hosseinian-Far 5 Alireza Daneshkhah 6 |
title |
Application of Artificial Intelligence and Machine Learning in Producing Actionable Cyber Threat Intelligence |
spellingShingle |
Application of Artificial Intelligence and Machine Learning in Producing Actionable Cyber Threat Intelligence Reza Montasari Stuart Macdonald |
title_short |
Application of Artificial Intelligence and Machine Learning in Producing Actionable Cyber Threat Intelligence |
title_full |
Application of Artificial Intelligence and Machine Learning in Producing Actionable Cyber Threat Intelligence |
title_fullStr |
Application of Artificial Intelligence and Machine Learning in Producing Actionable Cyber Threat Intelligence |
title_full_unstemmed |
Application of Artificial Intelligence and Machine Learning in Producing Actionable Cyber Threat Intelligence |
title_sort |
Application of Artificial Intelligence and Machine Learning in Producing Actionable Cyber Threat Intelligence |
author_id_str_mv |
e420369ac98aaaa7f39248e39a847af1 933e714a4cc37c3ac12d4edc277f8f98 |
author_id_fullname_str_mv |
e420369ac98aaaa7f39248e39a847af1_***_Reza Montasari 933e714a4cc37c3ac12d4edc277f8f98_***_Stuart Macdonald |
author |
Reza Montasari Stuart Macdonald |
author2 |
Reza Montasari Fiona Carroll Stuart Macdonald Hamid Jahankhani Amin Hosseinian-Far Alireza Daneshkhah |
format |
Book chapter |
container_title |
Digital Forensic Investigation of Internet of Things (IoT) Devices |
container_start_page |
47 |
publishDate |
2021 |
institution |
Swansea University |
isbn |
978-3-030-60424-0 978-3-030-60425-7 |
publisher |
Springer |
college_str |
Faculty of Humanities and Social Sciences |
hierarchytype |
|
hierarchy_top_id |
facultyofhumanitiesandsocialsciences |
hierarchy_top_title |
Faculty of Humanities and Social Sciences |
hierarchy_parent_id |
facultyofhumanitiesandsocialsciences |
hierarchy_parent_title |
Faculty of Humanities and Social Sciences |
department_str |
Hilary Rodham Clinton School of Law{{{_:::_}}}Faculty of Humanities and Social Sciences{{{_:::_}}}Hilary Rodham Clinton School of Law |
url |
https://www.springer.com/gp/book/9783030604240 |
document_store_str |
0 |
active_str |
0 |
description |
Cyber Threat Intelligence (CTI) can be used by organisations to assist their security teams in safeguarding their networks against cyber-attacks. This can be achieved by including threat data feeds into their networks or systems. However, despite being an effective Cyber Security (CS) tool, many organisations do not sufficiently utilise CTI. This is due to a number of reasons such as not fully understanding how to manage a daily flood of data filled with extraneous information across their security systems. This adds an additional layer of complexity to the tasksperformed by their security teams who might not have the appropriate tools or sufficient skills to determine what information to prioritise and what information to disregard. Therefore, to help address the stated issue, this paper aims firstly to provide an in-depth understanding of what CTI is and how it can benefit organisations, and secondly to deliver a brief analysis of the application of Artificial Intelligence and Machine Learning in generating actionable CTI. The key contribution of this paper is that it assists organisations in better understanding their approachto CTI, which in turn will enable them to make informed decisions in relation to CTI. |
published_date |
2021-01-01T07:59:22Z |
_version_ |
1777357671501922304 |
score |
11.036684 |