Bimonthly    Since 1986
ISSN 1004-9037
Publication Details
Edited by: Editorial Board of Journal of Data Acquisition and Processing
P.O. Box 2704, Beijing 100190, P.R. China
Sponsored by: Institute of Computing Technology, CAS & China Computer Federation
Undertaken by: Institute of Computing Technology, CAS
Published by: SCIENCE PRESS, BEIJING, CHINA
Distributed by:
China: All Local Post Offices
 
   
      July 2023, Volume 38 Issue 3
    Article

    ICTI: AN INTEGRATED CYBER THREAT INTELLIGENCE ARCHITECTURE FOR PROACTIVE DEFENSE AND ENHANCED INCIDENT RESPONSE
    A. Kanthimathinathan, Dr. S. Saravanan, Dr. G. Ramachandran
    Journal of Data Acquisition and Processing, 2023, 38 (3): 5873-5891 . 

    Abstract

    Cyber Threat Intelligence (CTI) is the process of collecting, analyzing, and utilizing information about potential cyber threats to an organization. The goal of CTI is to provide organizations with the knowledge and understanding the need to prevent, detect, and respond to cyber-attacks. CTI involves collecting and analyzing data from a variety of sources, including Open-Source Intelligence (OSINT), social media, and specialized intelligence feeds. The data is then used to create a comprehensive view of the current threat landscape, including information on the Tactics, Techniques, and Procedures (TTPs) used by attackers, as well as the types of attacks and vulnerabilities that are most commonly exploited. Organizations can use this information to improve their overall security posture, prioritize security investments, and respond more effectively to threats. Hence, this work proposes an integrated CTI (iCTI) architecture, which can also be used to develop proactive defense strategies and enhance incident response capabilities, helping organizations to better manage the risks posed by cyber threats. The proposed integrated Cyber Threat Intelligence (iCTI) architecture combines the systematic collection, analysis, and the utilization of CTI with proactive defense strategies and enhanced incident response capabilities. By leveraging diverse data sources, including OSINT, social media, and specialized feeds, the architecture provides organizations with a comprehensive understanding of the current threat landscape, enabling the identification of emerging trends, prevalent attack vectors, and attacker tactics. The architecture emphasizes the development of proactive defense strategies based on the analysis of attacker TTPs, allowing organizations to prevent, detect, and mitigate potential cyber attacks. Additionally, the CTI architecture strengthens incident response capabilities by providing timely and actionable intelligence, enabling organizations to respond swiftly and effectively to minimize the impact of cyber attacks. Through the integration of CTI, organizations can proactively defend against threats, optimize their security posture, and safeguard critical assets and information in the dynamic cyber security landscape.

    Keyword

    Cyber Threat Intelligence (CTI), integrated architecture, proactive defense, enhanced incident response, Open-Source Intelligence (OSINT), attacker Tactics, Techniques and Procedures (TTPs), incident response capabilities.


    PDF Download (click here)

SCImago Journal & Country Rank

ISSN 1004-9037

         

Home
Editorial Board
Author Guidelines
Subscription
Journal of Data Acquisition and Processing
Institute of Computing Technology, Chinese Academy of Sciences
P.O. Box 2704, Beijing 100190 P.R. China
E-mail: info@sjcjycl.cn
 
  Copyright ©2015 JCST, All Rights Reserved