An automated platform for gathering and managing open-source cyber threat intelligence

NA Al-Dmour, MK Hasan, M Ajmal, M Ali… - … for Technology and …, 2023 - ieeexplore.ieee.org
The community has begun paying more attention to source OSCTI Cyber Threat Intelligence
to stay informed about the rapidly changing cyber threat landscape. Numerous reports from …

A system for automated open-source threat intelligence gathering and management

P Gao, X Liu, E Choi, B Soman, C Mishra… - Proceedings of the …, 2021 - dl.acm.org
To remain aware of the fast-evolving cyber threat landscape, open-source Cyber Threat
Intelligence (OSCTI) has received growing attention from the community. Commonly …

TINKER: A framework for Open source Cyberthreat Intelligence

N Rastogi, S Dutta, A Gittens, MJ Zaki… - … Conference on Trust …, 2022 - ieeexplore.ieee.org
Threat intelligence on malware attacks and campaigns is increasingly being shared with
other security experts for a cost or for free. Other security analysts use this intelligence to …

Threatkg: A threat knowledge graph for automated open-source cyber threat intelligence gathering and management

P Gao, X Liu, E Choi, S Ma, X Yang, Z Ji… - arXiv preprint arXiv …, 2022 - arxiv.org
Despite the increased adoption of open-source cyber threat intelligence (OSCTI) for
acquiring knowledge about cyber threats, little effort has been made to harvest knowledge …

SecTKG: A Knowledge Graph for Open‐Source Security Tools

S Sun, C Huang, T Wu, Y Shen - International Journal of …, 2023 - Wiley Online Library
As the complexity of cyberattacks continues to increase, multistage combination attacks
have become the primary method of attack. Attackers plan and organize a series of attack …

Generating quality threat intelligence leveraging OSINT and a cyber threat unified taxonomy

C Martins, I Medeiros - ACM Transactions on Privacy and Security, 2022 - dl.acm.org
Today's threats use multiple means of propagation, such as social engineering, email, and
application vulnerabilities, and often operate in different phases, such as single device …

Malware knowledge graph generation

S Dutta, N Rastogi, D Yee, C Gu, Q Ma - arXiv preprint arXiv:2102.05583, 2021 - arxiv.org
Cyber threat and attack intelligence information are available in non-standard format from
heterogeneous sources. Comprehending them and utilizing them for threat intelligence …

Cyber-all-intel: An ai for security related threat intelligence

S Mittal, A Joshi, T Finin - arXiv preprint arXiv:1905.02895, 2019 - arxiv.org
Keeping up with threat intelligence is a must for a security analyst today. There is a volume
of information present inthe wild'that affects an organization. We need to develop an artificial …

A knowledge base question answering system for cyber threat knowledge acquisition

Z Ji, E Choi, P Gao - 2022 IEEE 38th International Conference …, 2022 - ieeexplore.ieee.org
Open-source cyber threat intelligence (OSCTI) provides a form of evidence-based
knowledge about cyber threats, enabling businesses to gain visibility into the fast-evolving …

Cybersecurity Threat hunting and vulnerability analysis using a Neo4j graph database of open source intelligence

E Pelofske, LM Liebrock, V Urias - arXiv preprint arXiv:2301.12013, 2023 - arxiv.org
Open source intelligence is a powerful tool for cybersecurity analysts to gather information
both for analysis of discovered vulnerabilities and for detecting novel cybersecurity threats …