A Survey on Threat Intelligence Techniques for Constructing, Detecting, and Reacting to Advanced Intrusion Campaigns

No Thumbnail Available

Date

2023

Journal Title

Journal ISSN

Volume Title

Publisher

Springer

Abstract

The rise of intrusion has increased the need for cybersecurity in various organizations. A set of these intrusions by an adversary against a particular organization are called intrusion campaigns. Threat intelligence techniques help detect and respond to intrusion attempts and help organizations set up a framework that can secure their services and interests. This chapter surveys different parameters and resources required to construct such a threat intelligence technique for an organization. Furthermore, the chapter discusses the various cases and models of an Intrusion Detection System (IDS) and Intrusion Response System (IRS) along with their comparison using the security resources collected during the construction of a Threat Intelligence model. All of this combined forms the threat intelligence technique. © 2023, The Author(s), under exclusive license to Springer Nature Switzerland AG.

Description

Keywords

IDS, Intrusions, IoC, IRS, Threat actors, Threat intelligence, TISPs, TTPs

Citation

Springer Proceedings in Mathematics and Statistics, 2023, Vol.403, , p. 341-355

Endorsement

Review

Supplemented By

Referenced By