What are the attackers doing now? Automating cyberthreat intelligence extraction from text on pace with the changing threat landscape: A survey

MR Rahman, RM Hezaveh, L Williams - ACM Computing Surveys, 2023 - dl.acm.org
Cybersecurity researchers have contributed to the automated extraction of CTI from textual
sources, such as threat reports and online articles describing cyberattack strategies …

A review of computer vision methods in network security

J Zhao, R Masood, S Seneviratne - … Communications Surveys & …, 2021 - ieeexplore.ieee.org
Network security has become an area of significant importance more than ever as
highlighted by the eye-opening numbers of data breaches, attacks on critical infrastructure …

Automated retrieval of att&ck tactics and techniques for cyber threat reports

V Legoy, M Caselli, C Seifert, A Peter - arXiv preprint arXiv:2004.14322, 2020 - arxiv.org
Over the last years, threat intelligence sharing has steadily grown, leading cybersecurity
professionals to access increasingly larger amounts of heterogeneous data. Among those …

[HTML][HTML] Cyber threat attribution using unstructured reports in cyber threat intelligence

E Irshad, AB Siddiqui - Egyptian Informatics Journal, 2023 - Elsevier
Cyber-threat attribution is the identification of attacker responsible for a cyber-attack. It is a
challenging task as attacker uses different obfuscation and deception techniques to hide its …

Automated emerging cyber threat identification and profiling based on natural language processing

R Marinho, R Holanda - IEEE Access, 2023 - ieeexplore.ieee.org
The time window between the disclosure of a new cyber vulnerability and its use by
cybercriminals has been getting smaller and smaller over time. Recent episodes, such as …

An automatic generation approach of the cyber threat intelligence records based on multi-source information fusion

T Sun, P Yang, M Li, S Liao - Future Internet, 2021 - mdpi.com
With the progressive deterioration of cyber threats, collecting cyber threat intelligence (CTI)
from open-source threat intelligence publishing platforms (OSTIPs) can help information …

Sok: The mitre att&ck framework in research and practice

S Roy, E Panaousis, C Noakes, A Laszka… - arXiv preprint arXiv …, 2023 - arxiv.org
The MITRE ATT&CK framework, a comprehensive knowledge base of adversary tactics and
techniques, has been widely adopted by the cybersecurity industry as well as by academic …

Key requirements for the detection and sharing of behavioral indicators of compromise

A Villalón-Huerta, I Ripoll-Ripoll, H Marco-Gisbert - Electronics, 2022 - mdpi.com
Cyber threat intelligence feeds the focus on atomic and computed indicators of compromise.
These indicators are the main source of tactical cyber intelligence most organizations benefit …

Threat intelligence ATT&CK extraction based on the attention transformer hierarchical recurrent neural network

C Liu, J Wang, X Chen - Applied Soft Computing, 2022 - Elsevier
With the rapid growth of cyberattacks in the world wide, Tactics, Techniques & Procedures
(TTPs) has become the most prevalent advanced indicator for a particular attack in …

Identifying att&ck tactics in android malware control flow graph through graph representation learning and interpretability

J Fairbanks, A Orbe, C Patterson… - … Conference on Big …, 2021 - ieeexplore.ieee.org
To mitigate a malware threat it is important to understand the malware's behavior. The
MITRE ATT&ACK ontology specifies an enumeration of tactics, techniques, and procedures …