Demystifying Cyber Threat Intelligence: Literature Insights and a Practical Framework
Article Sidebar
Main Article Content
Downloads
References
E. M. Hutchins, M. J. Cloppert, and R. M. Amin, “Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns,” in Proceedings of the 6th International Conference on Information Warfare and Security, pp. 113–125, 2011.
S. Barnum, “Standardizing Cyber Threat Intelligence Information with STIX,” MITRE Corporation, Technical Report, 2014.
MITRE Corporation, “ATT&CK: Adversarial Tactics, Techniques, and Common Knowledge,” MITRE Framework Documentation, 2020.
T. Rid and B. Buchanan, “Attributing Cyber Attacks: Challenges and Opportunities,” Journal of Strategic Studies, vol. 38, no. 1–2, pp. 4–37, 2015.
A. Ahmad, S. B. Maynard, and G. Shanks, “A Case Study of Information Security Risk Management,” Computers & Security, vol. 100, pp. 102–113, 2021.
R. Alabdán, “Threat Intelligence Platforms: Adoption Factors and Security Challenges,” International Journal of Critical Infrastructure Protection, vol. 30, pp. 100–110, 2020.
C. Brown and D. Pires, “Improving Cyber Threat Intelligence Sharing: Barriers and Incentives,” in Proceedings of the ACM Workshop on Information Sharing and Collaborative Security, pp. 1–8, 2018.
Verizon, “Data Breach Investigations Report,” Verizon Enterprise Solutions, 2021.
FireEye, “Cyber Threat Intelligence: Understanding Adversary Campaigns,” FireEye White Paper, 2019.
Mandiant, “M-Trends 2020: Insights into Today’s Breach Trends,” Mandiant Report, 2020.
K. Scarfone and P. Mell, “Guide to Intrusion Detection and Prevention Systems,” NIST Special Publication 800-94, 2012.
N. Kontaxis, A. P. Fuchs, and A. Lanzi, “Threat Intelligence-Driven Cyber Defense,” IEEE Security & Privacy, vol. 17, no. 3, pp. 80–87, 2019.
M. Conti, A. Dehghantanha, K. Franke, and S. Watson, “Internet of Things Security and Forensics: Challenges and Opportunities,” Future Generation Computer Systems, vol. 78, pp. 544–546, 2018.
D. Bianco, “The Pyramid of Pain,” SANS Institute Reading Room, 2013.
R. Skopik, G. Settanni, and R. Fiedler, “A Problem Shared is a Problem Halved: A Survey on the Dimensions of Collective Cyber Defense,” Computers & Security, vol. 60, pp. 154–176, 2016.

This work is licensed under a Creative Commons Attribution 4.0 International License.
All articles published in our journal are licensed under CC-BY 4.0, which permits authors to retain copyright of their work. This license allows for unrestricted use, sharing, and reproduction of the articles, provided that proper credit is given to the original authors and the source.