Cyber threat intelligence mining for proactive cybersecurity defense: a survey and new perspectives

N Sun, M Ding, J Jiang, W Xu, X Mo… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Today's cyber attacks have become more severe and frequent, which calls for a new line of
security defenses to protect against them. The dynamic nature of new-generation threats …

A survey on threat hunting in enterprise networks

B Nour, M Pourzandi, M Debbabi - … Communications Surveys & …, 2023 - ieeexplore.ieee.org
With the rapidly evolving technological landscape, the huge development of the Internet of
Things, and the embracing of digital transformation, the world is witnessing an explosion in …

Cskg4apt: A cybersecurity knowledge graph for advanced persistent threat organization attribution

Y Ren, Y Xiao, Y Zhou, Z Zhang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Open-source cyber threat intelligence (OSCTI) is becoming more influential in obtaining
current network security information. Most studies on cyber threat intelligence (CTI) focus on …

AttacKG: Constructing technique knowledge graph from cyber threat intelligence reports

Z Li, J Zeng, Y Chen, Z Liang - European Symposium on Research in …, 2022 - Springer
Cyber attacks are becoming more sophisticated and diverse, making attack detection
increasingly challenging. To combat these attacks, security practitioners actively summarize …

Understanding indicators of compromise against cyber-attacks in industrial control systems: a security perspective

M Asiri, N Saxena, R Gjomemo, P Burnap - ACM transactions on cyber …, 2023 - dl.acm.org
Numerous sophisticated and nation-state attacks on Industrial Control Systems (ICSs) have
increased in recent years, exemplified by Stuxnet and Ukrainian Power Grid. Measures to be …

What are the attackers doing now? Automating cyberthreat intelligence extraction from text on pace with the changing threat landscape: A survey

MR Rahman, RM Hezaveh, L Williams - ACM Computing Surveys, 2023 - dl.acm.org
Cybersecurity researchers have contributed to the automated extraction of CTI from textual
sources, such as threat reports and online articles describing cyberattack strategies …

APT-KGL: An intelligent APT detection system based on threat knowledge and heterogeneous provenance graph learning

T Chen, C Dong, M Lv, Q Song, H Liu… - … on Dependable and …, 2022 - ieeexplore.ieee.org
APTs (Advanced Persistent Threats) have caused serious security threats worldwide. Most
existing APT detection systems are implemented based on sophisticated forensic analysis …

Looking beyond IoCs: Automatically extracting attack patterns from external CTI

MT Alam, D Bhusal, Y Park, N Rastogi - Proceedings of the 26th …, 2023 - dl.acm.org
Public and commercial organizations extensively share cyberthreat intelligence (CTI) to
prepare systems to defend against existing and emerging cyberattacks. However, traditional …

Explainable cyber threat behavior identification based on self-adversarial topic generation

W Ge, J Wang, T Lin, B Tang, X Li - Computers & Security, 2023 - Elsevier
Abstract Cyber Threat Intelligence (CTI) provides ample evidence and information regarding
the detection of cyber attack activities. Existing methods employ CTI reports to extract …

Advanced Persistent Threat intelligent profiling technique: A survey

BH Tang, JF Wang, Z Yu, B Chen, W Ge, J Yu… - Computers and Electrical …, 2022 - Elsevier
With the boom in Internet and information technology, cyber-attacks are becoming more
frequent and sophisticated, especially Advanced Persistent Threat (APT) attacks. Unlike …