scholarly journals Last Line of Defense: Reliability through Inducing Cyber Threat Hunting with Deception in SCADA Networks

IEEE Access ◽  
2021 ◽  
pp. 1-1
Author(s):  
Abdul Basit Ajmal ◽  
Masoom Alam ◽  
Awais Abdul Khaliq ◽  
Shawal Khan ◽  
Zakria Qadir ◽  
...  
Keyword(s):  
Author(s):  
John Robertson ◽  
Ahmad Diab ◽  
Ericsson Marin ◽  
Eric Nunes ◽  
Vivin Paliath ◽  
...  

2017 ◽  
Author(s):  
Deepak K. Tosh ◽  
Sachin Shetty ◽  
Shamik Sengupta ◽  
Jay P. Kesan ◽  
Charles Kamhoua

Author(s):  
Nolan Arnold ◽  
Mohammadreza Ebrahimi ◽  
Ning Zhang ◽  
Ben Lazarine ◽  
Mark Patton ◽  
...  

Sensors ◽  
2021 ◽  
Vol 21 (14) ◽  
pp. 4890
Author(s):  
Athanasios Dimitriadis ◽  
Christos Prassas ◽  
Jose Luis Flores ◽  
Boonserm Kulvatunyou ◽  
Nenad Ivezic ◽  
...  

Cyber threat information sharing is an imperative process towards achieving collaborative security, but it poses several challenges. One crucial challenge is the plethora of shared threat information. Therefore, there is a need to advance filtering of such information. While the state-of-the-art in filtering relies primarily on keyword- and domain-based searching, these approaches require sizable human involvement and rarely available domain expertise. Recent research revealed the need for harvesting of business information to fill the gap in filtering, albeit it resulted in providing coarse-grained filtering based on the utilization of such information. This paper presents a novel contextualized filtering approach that exploits standardized and multi-level contextual information of business processes. The contextual information describes the conditions under which a given threat information is actionable from an organization perspective. Therefore, it can automate filtering by measuring the equivalence between the context of the shared threat information and the context of the consuming organization. The paper directly contributes to filtering challenge and indirectly to automated customized threat information sharing. Moreover, the paper proposes the architecture of a cyber threat information sharing ecosystem that operates according to the proposed filtering approach and defines the characteristics that are advantageous to filtering approaches. Implementation of the proposed approach can support compliance with the Special Publication 800-150 of the National Institute of Standards and Technology.


2020 ◽  
Vol 53 (1) ◽  
pp. 1-34 ◽  
Author(s):  
Nektaria Kaloudi ◽  
Jingyue Li
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document