Taxonomical Challenges for Cyber Incident Response Threat Intelligence: A Review

Taxonomical Challenges for Cyber Incident Response Threat Intelligence: A Review

Meryem Ammi, Oluwasegun Adedugbe, Fahad Mohamed Alharby, Elhadj Benkhelifa
Copyright: © 2022 |Pages: 14
DOI: 10.4018/IJCAC.300770
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

As attackers continue to devise new means of exploiting vulnerabilities in computer systems, security personnel are doing their best to identify loopholes and threats. Analysis of threats to come up with effective mitigation techniques requires all-encompassing information about them. Security analysts can represent and share cyber threat information with semantic knowledge graphs within cyber security space to access. However, there should be no conflicting information because the response to threats must be immediate. This calls for a standardized taxonomy that is generally accepted within the cybersecurity space to represent information, ultimately making cyber threat intelligence (CTI) credible. This review looks into existing CTI-based ontologies, taxonomies, and knowledge graphs. The absence of standardized taxonomy identified could be responsible for limited taxonomy encoding and integration among existing CTI-based ontologies, as well as missing interconnections between taxonomies and existing ontologies. Hence, the development of a standardized taxonomy will enhance CTI effectiveness.
Article Preview
Top

1. Introduction

The cyberspace continues to face several threats, with attack mechanisms and means of exploiting cyber space vulnerabilities evolving rapidly alongside preventive measures, leading to huge data breaches, financial loss and several other negative impacts for both individuals and organizations. There is a significant focus on stealing, compromising, or destroying organizational assets with huge reputational, confidential, intellectual, operational, or financial value (Bendovschi, 2015). The goal of cyber threat intelligence is collection of indications of compromise and developing knowledge regarding the adversary towards reducing risks posed to organizational networks and their stakeholders. Hence, it is crucial to have intelligence data towards identifying attacks and analysing their threats, with the application of analysis techniques based on hypotheses and pieces of evidence. For comprehensive threat reviews, the following are fundamental questions that require answering:

  • Who are the adversaries, including actors, sponsors, and employees?

  • What adversaries use, including their capabilities and infrastructure used?

  • Where adversaries usually attack, detailing industries, types of companies, and geographic regions.

  • When adversaries act, identifying timelines.

  • Why opponents attack, including motives and intentions.

  • How adversaries operate, focused on their behavioural patterns.

Cyber-attacks take advantage of vulnerabilities, whether associated with the software, computing devices, or humans that manage and use them. An intelligence product based on Cyber Threat Intelligence must always have two final elements: context and action; without both, intelligence on the threat would be neither understandable nor actionable. Cyber Threat Intelligence services aid in tracking, analysing, interpreting, and mitigating continuously evolving cybersecurity threats and attacks (Kanakogi et al., 2021). They also manage relevant data required to combat cyber risks. The investigation, detection and remediation of harm is further hampered due to evolving patterns for cyber-attacks. This implies that despite the development and adoption of enhanced security measures towards preventing, detecting, and disrupting potential attacks, attacks are becoming more dynamic, thereby enabling the launch of complex adversarial attacks (Li et al., 2020). Based on these, it has become even more pertinent to better comprehend potential threats towards raising security levels. This subsequently enables organizations to detect threats and exchange related information towards their prevention. This practice of collecting and aggregating information on possible threats defines the scope of cyber threat intelligence, facilitating organisational identification and understanding of attacks at hand. It also expedites security operations, as well as pushing and prioritizing application of security controls (Mavroeidis & Bromander, 2021). The objectives of adopting an intelligence-driven approach include preventing successful attacks and ability to observe and define effective responses to incidents in cyberspace. CTI also focuses on gathering technical information about attacks for improved comprehension and attribution of the attack’s Tactics, Techniques, and Procedures (TTPs), attack principal and motives. This thereby enables proactive, responsive, and intelligence-led cyber resilience (Ramsdale et al., 2020). The goal of the intelligence also includes offering the most relevant information possible, providing evidence-based knowledge regarding existing or emerging threats. Relevancy, context, timeliness, accuracy, and workability are also crucial features for an effective CTI (Mavroeidis & Bromander, 2021). To combat cyber threats, there is also implementation of mitigation approaches based on risk assessments. This is followed by establishment of detection techniques to potentially minimize the effect of attacks in a timely manner. Following detection of a threat, it must be contained and necessary remediation solutions applied (Veerasamy et al., 2019).

Complete Article List

Search this Journal:
Reset
Volume 14: 1 Issue (2024)
Volume 13: 1 Issue (2023)
Volume 12: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 11: 4 Issues (2021)
Volume 10: 4 Issues (2020)
Volume 9: 4 Issues (2019)
Volume 8: 4 Issues (2018)
Volume 7: 4 Issues (2017)
Volume 6: 4 Issues (2016)
Volume 5: 4 Issues (2015)
Volume 4: 4 Issues (2014)
Volume 3: 4 Issues (2013)
Volume 2: 4 Issues (2012)
Volume 1: 4 Issues (2011)
View Complete Journal Contents Listing