A Survey on Threat Intelligence Techniques for Constructing, Detecting, and Reacting to Advanced Intrusion Campaigns

dc.contributor.authorAnand, A.
dc.contributor.authorSinghal, M.
dc.contributor.authorGuduru, S.
dc.contributor.authorChandavarkar, B.R.
dc.date.accessioned2026-02-06T06:34:58Z
dc.date.issued2023
dc.description.abstractThe rise of intrusion has increased the need for cybersecurity in various organizations. A set of these intrusions by an adversary against a particular organization are called intrusion campaigns. Threat intelligence techniques help detect and respond to intrusion attempts and help organizations set up a framework that can secure their services and interests. This chapter surveys different parameters and resources required to construct such a threat intelligence technique for an organization. Furthermore, the chapter discusses the various cases and models of an Intrusion Detection System (IDS) and Intrusion Response System (IRS) along with their comparison using the security resources collected during the construction of a Threat Intelligence model. All of this combined forms the threat intelligence technique. © 2023, The Author(s), under exclusive license to Springer Nature Switzerland AG.
dc.identifier.citationSpringer Proceedings in Mathematics and Statistics, 2023, Vol.403, , p. 341-355
dc.identifier.issn21941009
dc.identifier.urihttps://doi.org/10.1007/978-3-031-16178-0_23
dc.identifier.urihttps://idr.nitk.ac.in/handle/123456789/29570
dc.publisherSpringer
dc.subjectIDS
dc.subjectIntrusions
dc.subjectIoC
dc.subjectIRS
dc.subjectThreat actors
dc.subjectThreat intelligence
dc.subjectTISPs
dc.subjectTTPs
dc.titleA Survey on Threat Intelligence Techniques for Constructing, Detecting, and Reacting to Advanced Intrusion Campaigns

Files