Application of Artificial Intelligence and Machine Learning in Producing Actionable Cyber Threat Intelligence

View/ open
Author
Montasari, R.
Carroll, Fiona
Jahankhani, H.
Hosseinian-Far, A.
Daneshkhah, A.
Date
2021-01-07Acceptance date
2020-07-20
Type
Book chapter
Publisher
Springer
ISSN
1613-5113
Embargoed until
2100-01-01
Metadata
Show full item recordAbstract
Cyber Threat Intelligence (CTI) can be used by organisations to assist their security teams in safeguarding their networks against
cyber-attacks. This can be achieved by including threat data feeds into
their networks or systems. However, despite being an effective Cyber Security (CS) tool, many organisations do not sufficiently utilise CTI. This
is due to a number of reasons such as not fully understanding how to manage a daily flood of data filled with extraneous information across their
security systems. This adds an additional layer of complexity to the tasks
performed by their security teams who might not have the appropriate
tools or sufficient skills to determine what information to prioritise and
what information to disregard. Therefore, to help address the stated issue, this paper aims firstly to provide an in-depth understanding of what
CTI is and how it can benefit organisations, and secondly to deliver a
brief analysis of the application of Artificial Intelligence and Machine
Learning in generating actionable CTI. The key contribution of this paper is that it assists organisations in better understanding their approach to CTI, which in turn will enable them to make informed decisions in
relation to CTI
Journal/conference proceeding
Advanced Sciences and Technologies for Security Applications;
Citation
Montasari, R. Fiona, C., Jahankhani, H., Hosseinian-Far, A. and Daneshkhah, A. (2021). Application of Artificial Intelligence and Machine Learning in Producing Actionable Cyber Threat Intelligence. In Montasari, R., Jahankhani, H. Hill, R. and Parkinson, S. (eds.) Digital Forensic Investigation of Internet of Things (IoT) Devices. Springer. pp. 47-64
Description
Book chapter in book series Advanced Sciences and Technologies for Security Applications: Digital Forensic Investigation of Internet of Things (IoT) Devices available at https://doi.org/10.1007/978-3-030-60425-7
Sponsorship
Cardiff Metropolitan University (Grant ID: Cardiff Metropolian (Internal))