A Framework for Collecting and Processing Publicly Available Security Information into Actionable Threat Intelligence
dc.contributor.author | Sauerwein, Clemens | |
dc.contributor.author | Haas, Christoph | |
dc.contributor.author | Breu, Ruth | |
dc.date.accessioned | 2024-12-26T21:09:58Z | |
dc.date.available | 2024-12-26T21:09:58Z | |
dc.date.issued | 2025-01-07 | |
dc.description.abstract | Obtaining timely information on vulnerabilities, attacks, threats, countermeasures and risks is crucial in combating today's sophisticated and constantly evolving security threats. The required information can be obtained from different sources, ranging from inter-organizational threat intelligence sharing platforms to publicly available security information sources. However, the heterogeneity of available information sources poses a major challenge for automatic collection and processing into actionable threat intelligence. To address this challenge, the following paper investigates methods for collecting and processing security information from diverse, heterogeneous sources into actionable threat intelligence. We present a generic extensible framework that enables the automatic generation of actionable threat intelligence from a variety of unstructured and structured security information sources. | |
dc.format.extent | 10 | |
dc.identifier.doi | 10.24251/HICSS.2025.740 | |
dc.identifier.isbn | 978-0-9981331-8-8 | |
dc.identifier.other | b163a412-96ff-4cb2-b1cd-f5bccb68fa03 | |
dc.identifier.uri | https://hdl.handle.net/10125/109588 | |
dc.relation.ispartof | Proceedings of the 58th Hawaii International Conference on System Sciences | |
dc.rights | Attribution-NonCommercial-NoDerivatives 4.0 International | |
dc.rights.uri | https://creativecommons.org/licenses/by-nc-nd/4.0/ | |
dc.subject | Organizational Cybersecurity: Advanced Cyber Defense, Cyber Analytics, and Security Operations | |
dc.subject | collection, framework, processing, security information, threat intelligence | |
dc.title | A Framework for Collecting and Processing Publicly Available Security Information into Actionable Threat Intelligence | |
dc.type | Conference Paper | |
dc.type.dcmi | Text | |
prism.startingpage | 6186 |
Files
Original bundle
1 - 1 of 1