A Systematic Literature Review on Cyber Threat Intelligence for Organizational Cybersecurity Resilience
Abstract
:1. Introduction
2. Materials and Methods
- The selected paper should focus on CTI in business organizations.
- The paper should be published between 2019 and 2023.
- All papers were journal articles or conference proceedings; any other publication type was excluded.
- Stage 1: The manuscript must be published in peer-reviewed journals or conference proceedings. Poster presentations, books, and blogs were left out due to quality concerns.
- Stage 2: The paper must be focused on the CTI domain that impacts organizations’ performance.
- Stage 3: The paper must be a case study, system application, or modeling implementation.
3. Results
3.1. Detection Model
3.2. Knowledge Sharing and Training
4. Discussion
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Lenka, A.; Goswami, M.; Singh, H.; Baskaran, H. Cybersecurity Disclosure and Corporate Reputation: Rising Popularity of Cybersecurity in the Business World. In Effective Cybersecurity Operations for Enterprise-Wide Systems; IGI Global: Hershey, PA, USA, 2023; pp. 169–183. [Google Scholar]
- Kotsias, J.; Ahmad, A.; Scheepers, R. Adopting and integrating cyber-threat intelligence in a commercial organisation. Eur. J. Inf. Syst. 2023, 32, 35–51. [Google Scholar] [CrossRef]
- Gately, H. Russian Organised Crime and Ransomware as a Service: State Cultivated Cybercrime. Doctoral Dissertation, Macquarie University, Sydney, Australia, 2023. [Google Scholar]
- Abu, M.S.; Selamat, S.R.; Ariffin, A.; Yusof, R. CTI–issue and challenges. Indones. J. Electr. Eng. Comput. Sci. 2018, 10, 371–379. [Google Scholar]
- Webb, J.; Maynard, S.; Ahmad, A.; Shanks, G. Information security risk management: An intelligence-driven approach. Australas. J. Inf. Syst. 2014, 18, 391–404. [Google Scholar] [CrossRef]
- Webb, J.; Maynard, S.; Ahmad, A.; Shanks, G. Towards an intelligence-driven information security risk management process for organisations. In Proceedings of the ACIS 2013 Proceedings, 52, Niigata, Japan, 16–20 June 2013. [Google Scholar]
- Schlette, D.; Caselli, M.; Pernul, G. A comparative study on cyber threat intelligence: The security incident response perspective. IEEE Commun. Surv. Tutor. 2021, 23, 2525–2556. [Google Scholar] [CrossRef]
- Kitchenham, B.; Charters, S. Guidelines for Performing Systematic Literature Reviews in Software Engineering; Technical Report, EBSE Technical Report EBSE-2007-0; Elsevier: London, UK, 2007. [Google Scholar]
- Page, M.J.; McKenzie, J.E.; Bossuyt, P.M.; Boutron, I.; Hoffmann, T.C.; Mulrow, C.D.; Moher, D. The PRISMA 2020 statement: An updated guideline for reporting systematic reviews. BMJ 2021, 372, n71. [Google Scholar] [CrossRef]
- Available online: https://ieeexplore.ieee.org/Xplore/home.jsp (accessed on 30 June 2023).
- Available online: https://dl.acm.org/ (accessed on 30 June 2023).
- Suryotrisongko, H.; Musashi, Y.; Tsuneda, A.; Sugitani, K. Robust botnet DGA detection: Blending XAI and OSINT for CTI sharing. IEEE Access 2022, 10, 34613–34624. [Google Scholar] [CrossRef]
- Moraliyage, H.; Sumanasena, V.; De Silva, D.; Nawaratne, R.; Sun, L.; Alahakoon, D. Multimodal classification of onion services for proactive CTI using explainable deep learning. IEEE Access 2022, 10, 56044–56056. [Google Scholar] [CrossRef]
- Irshad, E.; Siddiqui, A.B. Cyber threat attribution using unstructured reports in CTI. Egypt. Inform. J. 2023, 24, 43–59. [Google Scholar] [CrossRef]
- Zhang, H.; Shen, G.; Guo, C.; Cui, Y.; Jiang, C. Ex-action: Automatically extracting threat actions from CTI report based on multimodal learning. Secur. Commun. Netw. 2021, 2021, 1–12. [Google Scholar]
- Cha, J.; Singh, S.K.; Pan, Y.; Park, J.H. Blockchain-based CTI system architecture for sustainable computing. Sustainability 2020, 12, 6401. [Google Scholar] [CrossRef]
- Gong, S.; Lee, C. CTI framework for incident response in an energy cloud platform. Electronics 2021, 10, 239. [Google Scholar] [CrossRef]
- Ejaz, S.; Noor, U.; Rashid, Z. Visualizing Interesting Patterns in CTI Using Machine Learning Techniques. Cybern. Inf. Technol. 2022, 22, 96–113. [Google Scholar]
- Mendez Mena, D.; Yang, B. Decentralized actionable CTI for networks and the internet of things. IoT 2020, 2, 1–16. [Google Scholar] [CrossRef]
- Liu, J.; Yan, J.; Jiang, J.; He, Y.; Wang, X.; Jiang, Z.; Yang, P.; Li, N. TriCTI: An actionable CTI discovery system via trigger-enhanced neural network. Cybersecurity 2022, 5, 8. [Google Scholar] [CrossRef]
- Kiwia, D.; Dehghantanha, A.; Choo, K.K.R.; Slaughter, J. A cyber kill chain based taxonomy of banking Trojans for evolutionary computational intelligence. J. Comput. Sci. 2018, 27, 394–409. [Google Scholar] [CrossRef]
- Gong, S.; Lee, C. Blocis: Blockchain-based CTI sharing framework for sybil-resistance. Electronics 2020, 9, 521. [Google Scholar] [CrossRef]
- Borges Amaro, L.J.; Percilio Azevedo, B.W.; Lopes de Mendonca, F.L.; Giozza, W.F.; Albuquerque, R.D.O.; García Villalba, L.J. Methodological framework to collect, process, analyze and visualize CTI data. Appl. Sci. 2022, 12, 1205. [Google Scholar] [CrossRef]
- Al-Fawa’reh, M.; Al-Fayoumi, M.; Nashwan, S.; Fraihat, S. CTI using PCA-DNN model to detect abnormal network behavior. Egypt. Inform. J. 2022, 23, 173–185. [Google Scholar] [CrossRef]
- Sun, T.; Yang, P.; Li, M.; Liao, S. An automatic generation approach of the CTI records based on multi-source information fusion. Future Internet 2021, 13, 40. [Google Scholar] [CrossRef]
- Serketzis, N.; Katos, V.; Ilioudis, C.; Baltatzis, D.; Pangalos, G.J. Actionable threat intelligence for digital forensics readiness. Inf. Comput. Secur. 2019, 27, 273–291. [Google Scholar] [CrossRef]
- Raptis, G.E.; Katsini, C.; Alexakos, C.; Kalogeras, A.; Serpanos, D. CAVeCTIR: Matching CTI Reports on Connected and Autonomous Vehicles Using Machine Learning. Appl. Sci. 2022, 12, 11631. [Google Scholar] [CrossRef]
- Alsaedi, M.; Ghaleb, F.A.; Saeed, F.; Ahmad, J.; Alasli, M. CTI-based malicious url detection model using ensemble learning. Sensors 2022, 22, 3373. [Google Scholar] [CrossRef] [PubMed]
- Van Haastrecht, M.; Golpur, G.; Tzismadia, G.; Kab, R.; Priboi, C.; David, D.; Răcătăian, A.; Baumgartner, L.; Fricker, S.; Ruiz, J.F.; et al. A shared CTI solution for smes. Electronics 2021, 10, 2913. [Google Scholar] [CrossRef]
- Zhang, S.; Chen, P.; Bai, G.; Wang, S.; Zhang, M.; Li, S.; Zhao, C. An automatic assessment method of CTI combined with ATT&CK matrix. Wirel. Commun. Mob. Comput. 2022, 7875910. [Google Scholar]
- Mishra, S.; Albarakati, A.; Sharma, S.K. CTI for IoT Using Machine Leamrning. Processes 2022, 10, 2673. [Google Scholar] [CrossRef]
- Chatziamanetoglou, D.; Rantos, K. Blockchain-Based CTI Sharing Using Proof-of-Quality Consensus. Secur. Commun. Netw. 2023, 3303122. [Google Scholar]
- Li, Z.X.; Li, Y.J.; Liu, Y.W.; Liu, C.; Zhou, N.X. K-CTIAA: Automatic Analysis of CTI Based on a Knowledge Graph. Symmetry 2023, 15, 337. [Google Scholar] [CrossRef]
- Zhang, X.; Miao, X.; Xue, M. A Reputation-Based Approach Using Consortium Blockchain for CTI Sharing. Secur. Commun. Netw. 2022, 7760509. [Google Scholar] [CrossRef]
- Serketzis, N.; Katos, V.; Ilioudis, C.; Baltatzis, D.; Pangalos, G. Improving forensic triage efficiency through CTI. Future Internet 2019, 11, 162. [Google Scholar] [CrossRef]
- Afzaliseresht, N.; Miao, Y.; Michalska, S.; Liu, Q.; Wang, H. From logs to stories: Human-centred data mining for CTI. IEEE Access 2020, 8, 19089–19099. [Google Scholar] [CrossRef]
- Riesco, R.; Larriva-Novo, X.; Villagrá, V.A. Cybersecurity threat intelligence knowledge exchange based on blockchain: Proposal of a new incentive model based on blockchain and Smart contracts to foster the cyber threat and risk intelligence exchange of information. Telecommun. Syst. 2020, 73, 259–288. [Google Scholar] [CrossRef]
- Rana, M.U.; Ellahi, O.; Alam, M.; Webber, J.L.; Mehbodniya, A.; Khan, S. Offensive Security: CTI Enrichment With Counterintelligence and Counterattack. IEEE Access 2022, 10, 108760–108774. [Google Scholar] [CrossRef]
- Samtani, S.; Li, W.; Benjamin, V.; Chen, H. Informing CTI through dark Web situational awareness: The AZSecure hacker assets portal. Digit. Threats Res. Pract. (DTRAP) 2021, 2, 1–10. [Google Scholar] [CrossRef]
- Koloveas, P.; Chantzios, T.; Tryfonopoulos, C.; Skiadopoulos, S. A crawler architecture for harvesting the clear, social, and dark web for IoT-related cyber-threat intelligence. In Proceedings of the 2019 IEEE World Congress on Services (SERVICES), Milan, Italy, 8–13 July 2019; Volume 2642, pp. 3–8. [Google Scholar]
- Basheer, R.; Alkhatib, B. Threats from the dark: A review over dark web investigation research for CTI. J. Comput. Netw. Commun. 2021, 2021, 1–21. [Google Scholar] [CrossRef]
- Mundt, M.; Baier, H. Threat-based Simulation of Data Exfiltration Towards Mitigating Multiple Ransomware Extortions. Digit. Threats Res. Pract. 2022. [Google Scholar] [CrossRef]
- Sakellariou, G.; Fouliras, P.; Mavridis, I. SECDFAN: A CTI System for Discussion Forums Utilization. Eng 2023, 4, 615–634. [Google Scholar] [CrossRef]
- Sacher-Boldewin, D.; Leverett, E. The Intelligent Process Lifecycle of Active Cyber Defenders. Digit. Threats Res. Pract. (DTRAP) 2022, 3, 1–17. [Google Scholar] [CrossRef]
- Koloveas, P.; Chantzios, T.; Alevizopoulou, S.; Skiadopoulos, S.; Tryfonopoulos, C. Intime: A machine learning-based framework for gathering and leveraging web data to cyber-threat intelligence. Electronics 2021, 10, 818. [Google Scholar] [CrossRef]
- Riesco, R.; Villagrá, V.A. Leveraging CTI for a dynamic risk framework: Automation by using a semantic reasoner and a new combination of standards (STIX™, SWRL and OWL). Int. J. Inf. Secur. 2019, 18, 715–739. [Google Scholar] [CrossRef]
- Aljuhami, A.M.; Bamasoud, D.M. CTI in Risk Management. Int. J. Adv. Comput. Sci. Appl. 2021, 12, 156–164. [Google Scholar]
- Sakellariou, G.; Fouliras, P.; Mavridis, I.; Sarigiannidis, P. A reference model for CTI systems. Electronics 2022, 11, 1401. [Google Scholar] [CrossRef]
- Dulaunoy, A.; Huynen, J.L.; Thirion, A. Active and Passive Collection of SSH key material for CTI. Digit. Threats Res. Pract. (DTRAP) 2022, 3, 1–5. [Google Scholar] [CrossRef]
- Gao, P.; Liu, X.; Choi, E.; Soman, B.; Mishra, C.; Farris, K.; Song, D. A system for automated open-source threat intelligence gathering and management. In Proceedings of the 2021 International Conference on Management of Data, Xi’an, China, 20–25 June 2021; pp. 2716–2720. [Google Scholar]
- Al-Mohannadi, H.; Awan, I.; Al Hamar, J. Analysis of adversary activities using cloud-based web services to enhance CTI. Serv. Oriented Comput. Appl. 2020, 14, 175–187. [Google Scholar] [CrossRef]
- Sufi, F. A New Social Media-Driven CTI. Electronics 2023, 12, 1242. [Google Scholar] [CrossRef]
- Cristea, L.M. Risks Associated with Threats Related to Disruptive Technologies in the Current Financial Systems Context. Audit Financiar 2021, 1, 119–129. [Google Scholar] [CrossRef]
- Thach, N.N.; Hanh, H.T.; Huy, D.T.N.; Vu, Q.N. Technology quality management of the industry 4.0 and cybersecurity risk management on current banking activities in emerging markets-the case in Vietnam. Int. J. Qual. Res. 2021, 15, 840–856. [Google Scholar] [CrossRef]
- Tripodi, F.B. ReOpen demands as public health threat: A sociotechnical framework for understanding the stickiness of misinformation. Comput. Math. Organ. Theory 2022, 28, 321–334. [Google Scholar] [CrossRef]
- Odemis, M.; Yucel, C.; Koltuksuz, A. Detecting user behavior in CTI: Development of honeypsy system. Secur. Commun. Netw. arXiv 2022, arXiv:2304.07411. [Google Scholar] [CrossRef]
- Vevera, A.V.; Cirnu, C.E.; Radulescu, C.Z. A Multi-Attribute Approach for CTI Product and Services Selection. Stud. Inform. Control 2022, 31, 13–23. [Google Scholar] [CrossRef]
- Du, L.; Fan, Y.; Zhang, L.; Wang, L.; Sun, T. A summary of the development of cyber security threat intelligence sharing. Int. J. Digit. Crime Forensics (IJDCF) 2020, 12, 54–67. [Google Scholar] [CrossRef]
- Westerlund, M. The emergence of deepfake technology: A review. Technol. Innov. Manag. Rev. 2019, 9. Available online: https://timreview.ca/article/1282 (accessed on 30 June 2023). [CrossRef]
- Sarhan, M.; Layeghy, S.; Moustafa, N.; Portmann, M. CTI sharing scheme based on federated learning for network intrusion detection. J. Netw. Syst. Manag. 2023, 31, 3. [Google Scholar] [CrossRef]
- Ramsdale, A.; Shiaeles, S.; Kolokotronis, N. A comparative analysis of cyber-threat intelligence sources, formats and languages. Electronics 2020, 9, 824. [Google Scholar] [CrossRef]
- Oosthoek, K.; Doerr, C. CTI: A product without a process? Int. J. Intell. CounterIntell. 2021, 34, 300–315. [Google Scholar] [CrossRef]
- de Melo e Silva, A.; Costa Gondim, J.J.; de Oliveira Albuquerque, R.; García Villalba, L.J. A methodology to evaluate standards and platforms within CTI. Future Internet 2020, 12, 108. [Google Scholar] [CrossRef]
- Al Obaidan, F.; Saeed, S. Digital transformation and cybersecurity challenges: A study of malware detection using machine learning techniques. In Handbook of Research on Advancing Cybersecurity for Digital Transformation; IGI Global: Hershey, PA, USA, 2021; pp. 203–226. [Google Scholar]
- Saeed, S.; Bolívar, M.P.R.; Thurasamy, R. Pandemic, Lockdown, and Digital Transformation; Springer International Publishing: Cham, Switzerland, 2021. [Google Scholar]
- Naeem, H.; Ullah, F.; Naeem, M.R.; Khalid, S.; Vasan, D.; Jabbar, S.; Saeed, S. Malware detection in industrial internet of things based on hybrid image visualization and deep learning model. Ad Hoc Netw. 2020, 105, 102154. [Google Scholar] [CrossRef]
- Mekala, S.H.; Baig, Z.; Anwar, A.; Zeadally, S. Cybersecurity for industrial IoT (IIoT): Threats, countermeasures, challenges and future directions. Comput. Commun. 2023, 208, 294–320. [Google Scholar] [CrossRef]
- Saeed, S. Education, Online Presence and Cybersecurity Implications: A Study of Information Security Practices of Computing Students in Saudi Arabia. Sustainability 2023, 15, 9426. [Google Scholar] [CrossRef]
- Saeed, S. Digital Workplaces and Information Security Behavior of Business Employees: An Empirical Study of Saudi Arabia. Sustainability 2023, 15, 6019. [Google Scholar] [CrossRef]
- Kont, K.R. Libraries and cyber security: The importance of the human factor in preventing cyber attacks. Libr. Hi Tech News 2023. [Google Scholar] [CrossRef]
- Saeed, S. A Customer-Centric View of E-Commerce Security and Privacy. Appl. Sci. 2023, 13, 1020. [Google Scholar] [CrossRef]
- Gull, H.; Alabbad, D.A.; Saqib, M.; Iqbal, S.Z.; Nasir, T.; Saeed, S.; Almuhaideb, A.M. E-Commerce and Cybersecurity Challenges: Recent Advances and Future Trends. In Handbook of Research on Cybersecurity Issues and Challenges for Business and FinTech Applications; IGI Global: Hershey, PA, USA, 2023; pp. 91–111. [Google Scholar]
Ref. No. | Publication Year | Main Contribution | Technology/Method | Source of Data |
---|---|---|---|---|
[12] | 2022 | The paper develops a model based on statistical characteristics to detect DGA-based traffic and explores the application of artificial intelligence/machine learning (AI/ML) in CTI. | Random forest algorithm (ML) | DNS query logs from a campus network |
[13] | 2022 | The authors suggest a unique multimodal classification method based on understandable deep learning that categorizes onion services depending on their picture and text content. | Gradient-weighted Class Activation Mapping Convolutional Neural Network with a trained word-embedding algorithm with additive attention from Bahdanau | Dark web onion service images and texts |
[14] | 2022 | The paper describes how unstructured CTI data may be used to gather cyber threat intelligence. The authors developed a novel model called “Attack2vec” that outperforms other models. The detailed feature set used in the model TTP tools, target company, virus, and application are all included. The usage of a comprehensive feature set improves classification outcomes. | Novel Attack2vec embedding model | Unstructured cyber threat intelligence reports |
[15] | 2021 | In the research, an EX-Action framework for automatically extracting threat actions from natural language processing (NLP) technologies and a multimodal learning algorithm for creating CTI reports are developed. Utilizing a measure, the extracted activities were assessed for information completeness. The efficiency of the framework is compared to that of two state-of-the-art action extraction methods in terms of precision, recall, accuracy, and F1 score. In order to better defend against network threats, intelligence-based active defense sharing was improved. | NLP and multimodal learning algorithms | CTI reports consisting of sentences with complex structure |
[16] | 2020 | The authors propose a blockchain-based intelligence on cyber threat system architecture for long-term computing to handle dependability, confidentiality, scalability, and sustainability challenges in collecting and analyzing data to identify potential threats. The model was proposed to work with multiple feeds, provide a trustworthy dataset, minimize network congestion, and stimulate participation by quantifying companies’ contributions. Additionally, through experimental study, the proposed model’s success was assessed using various metrics, including dependability, privacy, scalability, and sustainability. | NLP and multimodal learning algorithms | IP information, domains, URLs, network artifacts, and aggregation |
[28] | 2022 | In order to build a cyber threat intelligence-based detection model, the article addresses a study that intends to improve the identification of hazardous URLs by applying two-stage ensemble learning. The suggested approach outperformed detection methods from prior research, improving accuracy by 7.8% and reducing false-positive rates by 6.7% when compared to conventional URL-based models. | Customized algorithm | Scholarly journal- malicious URL |
[29] | 2023 | The report offers a systematic evaluation that contends that SMEs may profit from threat information-sharing platforms like MISP if shared intelligence is transformed into useful insights. In order to evaluate MISP data, rank cybersecurity hazards for SMEs, and provide personalized advice, a prototype application is developed. | - | - |
[30] | 2022 | The authors of this paper used automatic classification based on feature extraction and integrated ATT&CK to identify attack methods associated with IOC. | CTI systems modeling | Community-sourced threat intelligence and open-source intelligence |
[31] | 2022 | This paper focuses on potential network attack identification, and countermeasures are recommended utilizing simulated data. Anomalies in IoT networks are detected using message queuing telemetry transport (MQTT) and machine-learning algorithms. | Mixed methods using quantitative and qualitative approaches | Al-Kasassbeh dataset |
[32] | 2023 | In this paper, the authors underscore the significance of acquiring advanced and in-depth information about cyber threats in Saudi universities. | Probabilistic approach | GitHub repository |
[33] | 2023 | In this paper, the authors propose an automatic CTI analysis method called K-CTIAA to address the challenges of analyzing these threats. K-CTIAA pre-trained algorithms and knowledge graphs were used to obtain threat actions from unorganized CTI and achieved high automatic threat intelligence analysis performance. | K-CTIAA/BERT analysis | An open-source APT |
[34] | 2018 | The authors of this paper present a collaborative cyber threat intelligence-sharing scheme to allow many enterprises to collaborate on the design, training, and evaluation of a powerful ML-based network intrusion detection system. | Consortium blockchain | CTI data |
[35] | 2019 | The paper proposes a DFR model that combines CTI and forensic preparedness to help increase Digital Forensics Readiness and minimize the time and expense of response to incidents and investigations. The model achieved high accuracy, precision, and recall rates while reducing the amount of information that investigators must study, demonstrating the effectiveness of combining CTI and digital forensics processes. | Digital Forensic Readiness | Local log dataset |
[27] | 2022 | This paper presents a unique technique for detecting commonalities amongst CTI reports describing harmful actions identified on CAVs. This unique model achieved 96% accuracy, 96.5% precision, 95.58% recall, and 95.75% F1 score, respectively. | Decision Tree, Random Forest, and Support Vector Machine are examples of machine-learning models. | Reports from the scientific community, security manufacturers, and a programmable Google search engine |
[22] | 2020 | In this study, the authors created a blockchain-based CTI framework that can swiftly identify and reject false data in order to defend against a Sybil attack and increase confidence in the source and content of data. The suggested architecture collects CTI via a process certified by smart contracts and stores data meta-information on a blockchain network. | Blockchain-based open architecture for exchanging cyber threat intelligence (BLOCIS) | Utilizes open-sourced intelligence as a route for data acquisition |
[23] | 2022 | The authors of this research created a platform to address situations in which a cybersecurity analyst may import threat data, analyze it, and generate a timeline to gain insight and properly contextualize a threat. The results demonstrate that knowledge is facilitated about the environment in which the threats are placed, making vulnerability mitigation more effective. | Timeline representation of danger details and analytical data insights | Multiple sources |
[17] | 2021 | The methodology used in this study examines potential danger indications gathered by smart meters and proposes a method for acquiring cyber threat information that focuses on the energy cloud. Through a mechanism for exchanging and distributing knowledge about cyber threats across the Advanced Metering Infrastructure (AMI) and cloud tiers, this research also provides a method for quickly deploying a security framework to a significant energy cloud architecture. | A setting that models an attacker model and an energy cloud system | Every second, threats employing energy item data and 20,480 IoC data instances are broadcast from a prosumer device. |
[24] | 2021 | This paper enhances IDS detection mechanisms by incorporating novel features for identifying threats based on two assumptions related to handling zero-day attacks with constrained computing power and resources, as well as a comprehensive approach for detection by combining DNN and principal component analysis (PCA) to enhance security and performance. | The accuracy rate of DNN using PCA and model was 98%. | Initial packet capture (PCAP) is a common method for collecting network traffic data. |
[18] | 2022 | In this paper, the authors highlight the use of effective visualizations for CTI. A preliminary analysis of the data of CTI reports was carried out to unearth and depict relevant cyber threat trends, allowing security professionals to reduce vulnerabilities and proactively forecast cyber-attacks in their networks. | Based on machine-learning approaches, a system for visually analyzing CTI data is developed. | TTP dataset |
[19] | 2021 | This article demonstrates a proof of concept (PoC) using blockchain technology to secure private networks, Internet of Things (IoT) devices, and internet service providers (ISPs). The findings back up the idea of decentralized cyber threat intelligence-sharing networks that are capable of protecting several stakeholders. | A proof of concept (PoC) using blockchain technology to secure home networks, Internet of Things (IoT) devices, and internet service providers | Data collected at the ISP and the customer premises, equipment (CPE) routers |
[20] | 2022 | This paper analyzes CTI VirusTotal (VT) large-scale field data. The authors discovered that the threat intelligence given by VT is inefficient, and the proposed method can improve CTI. | TriCTI is a trigger-enhanced system that discovers actionable threat intelligence, conveying a fuller context of IOCs by disclosing their campaign phases. | DS-1 (2013–2020) and DS-2 (2021) datasets are used. |
[25] | 2021 | This article offers an automated technique to produce CTI records by merging NLP, neural networks, and cyber threat intelligence expertise. | A method for utilizing cybersecurity threat intelligence data together with NLP, machine learning, and CTI records is automatically generated based on multi-type OSTIPs (GCO). | GCO was performed on the collected OSTIPs, yielding 24,835 articles published between 2010 and 2019. |
[26] | 2018 | In this paper, the authors highlight that CTI has become a common practice for preventing or detecting security incidents, especially in the digital forensics (DF) domain. | Creation of a unique methodology for boosting the efficacy of current digital forensic readiness (DFR) schemes by exploiting cyber threat information-sharing capabilities | Local IoC database |
[21] | 2017 | This article presents a banking Trojan feature taxonomy based on a cyber death chain. This danger intelligence-based taxonomy, which provides stage-by-stage operational knowledge of a cyber attack, can help security practitioners as well as aid in the construction of evolving artificial intelligence for Trojan detection and mitigation strategies. | A taxonomy that provides operational knowledge of a cyber-attack stage by stage | 127 financial transactions from the real world |
Ref. No. | Publication Year | Main Contribution | Technology/Method | Source of Data |
---|---|---|---|---|
[36] | 2019 | Using storytelling approaches, the authors suggest a mechanism that creates insights into the natural language from security data. | Log-driven storytelling model using narrative techniques and human-centered data mining | Security logs |
[38] | 2022 | The authors use novel methods for circumventing virtual private networks (VPN) and additional security measures to gather accurate source information. | The counterintelligence and counterattack approach employs an Elastic Sky X Integrated (ESXI) server in a data center, public and private pathways for accessing attacker logs, Cowrie and Windows honeypots with numerous open ports like Secure Shell (SSH) to confuse attackers, and a log server to store logs. | Attacker logs and Cowrie and Windows honeypots |
[49] | 2022 | The main benefits of the system described in this article include the fact that it allows for the storage and retrieval of SSH connections used to collect historical forensic artifacts and provides a Representational State Transfer (REST) API to aid in incident investigations and infrastructure monitoring. | The program maintains fingerprints in a Redis-compatible backend and offers an API that uses REST to put information into a datastore and obtain signatures. | Server banners, key types, and IP addresses |
[39] | 2021 | The primary goal of this study was to increase awareness of situations in cybersecurity by offering greater active inspection of possible dangers that are developing in cyberspace before an assault. The AZSecure Hacker Assets Portal (HAP) gathers, analyzes, and publishes on dark web data sources to provide a unique view of hackers and associated cybercriminal assets while adding CTI insights to increase awareness of the situation. | CTI, text, and data mining (key exchange algorithms, encryption algorithms, and message authentication code algorithms) | Dark web cyber-attack tools |
[42] | 2022 | The primary goal of this work was to offer an idea to accomplish targeted automated data exfiltration mitigation along with a preliminary assessment. The authors propose using international approaches and the MITRE ATT&CK framework to automatically recognize and simulate the most relevant data exfiltration risks, strictly focusing on mitigating these threats. | Mapped Building Security in Maturity Model (BSIMM) and threat-based security concepts | Automatic procedures based on the framework would be network traffic and persistent data. |
[50] | 2021 | This article describes SecurityKG, a system proposed to collect and manage open-source security threat intelligence (OSCTI) information. SecurityKG extracts high-fidelity information about threat behaviors using AI and machine learning and builds a security-knowing graph. | Artificial Intelligence and natural language processing techniques | OSCTI reports |
[44] | 2022 | The major goal of this study was to demonstrate how false-positive occurrences can be identified methodically for all services and the ways in which this data can be utilized to suggest areas for development. The study also focuses on recognizing and recording issues that arise while detecting and analyzing vulnerabilities and whenever the security operations center (SOC) attempts to add an inventory source for continuous monitoring. | Systematic categorization of possible failure states and building these into existing security workflows and tools | False positives, incorrect states, and cyber defense operations issues |
[37] | 2019 | The major goal of this work was to offer a novel CTI-sharing model that encourages all participants at all levels to communicate important information in real-time. The suggested solution uses the blockchain and guidelines such as Generalized Threat Information Transfer and World Wide Web Consortium (W3C) semantics web standards to allow for a workspace of information linked to behavioral threat intelligence patterns. This will aid in characterizing strategies, approaches, and processes while also rewarding CTI sharing via an Ethereum-based smart contract marketplace. | Ethereum blockchain smart contract marketplace | CTI data |
[45] | 2021 | This article presents IN TIME, a machine-learning-based architecture that provides a complete platform for managing cyber threat intelligence. The framework may be used by security analysts to swiftly find, acquire, assess, extract, integrate, and distribute information on cyberthreats from diverse online sources. It also supports the whole threat lifecycle through open standards and user-friendly interfaces, allowing for the quick deployment of data collection services and the automatic grading of acquired information. | Machine-learning-based framework called IN TIME | Internet sources |
[46] | 2019 | The article emphasizes the importance of risk management in organizations and the challenges they face in managing risks. It proposes a new architecture for dynamic risk assessment and management, which enables real-time risk management while ensuring ease of adoption by incorporating a mix of standards. The article demonstrates the effectiveness of the proposed framework in supporting decision making across different organizational levels using a leading cybersecurity organization. | Protegé | Semantic data model |
[52] | 2023 | The paper covers the possible damage that cyber-attacks may do to the world economy and the necessity of comprehending the danger level to modify cybersecurity measures at various levels. It suggests a modern technique for analyzing the context of social media posts on cyber-attacks and electronic warfare using AI and NLP. Seventy-five daily cyber threat indices for six countries are produced due to the technique’s validation utilizing real-time Twitter feeds. | Twitter feed, AI, and NLP | Social media |
[62] | 2021 | The article highlights the vulnerability of small- and medium-sized enterprises (SMEs) to cyber-attacks due to their lack of resources. It discusses the need to share CTI to assist SMEs in cybersecurity defense. However, existing shared intelligence approaches do not sufficiently meet SME requirements, and further investigation is necessary to enhance SME cybersecurity resilience. A prototype application was developed to process MISP data, prioritize cybersecurity threats for SMEs, and give customized recommendations. Future evaluations will refine the application and help SMEs to defend themselves against cyber-attacks more effectively. | The body of studies on intelligence draws on qualitative approaches used in social science. research. | Live social media feeds |
[47] | 2021 | The paper explores how CTI can reduce cyber risks in Saudi universities by improving risk management. It examines CTI concepts, challenges, and risk management practices in higher education. It concludes that integrating CTI into risk management can enhance defenders’ capacity to mitigate the risk of cyber threats. | - | - |
[48] | 2022 | In order to aid in the design of CTI systems, this study emphasizes a number of important CTI ideas and an eight-layer CTI reference model. A powerful ML-based network intrusion detection system may be designed, trained, and evaluated by several enterprises working together through a collaborative cyber threat intelligence-sharing scheme. | CTI model design methodology | Existing CTI platforms |
[43] | 2023 | The authors of this paper propose a semantic schema for organizing collected data. The SECDFAN system is introduced as a comprehensive approach for creating CTI products by analyzing forum content. | SECDFAN’s CTI reference architecture | Repository data |
[60] | 2023 | The authors present a strategy for collaborative cyber threat information sharing to allow several enterprises to collaborate on creating, training, and assessing an effective ML-based intrusion detection system. | Federated, centralized, and localized learning scenarios | Local data |
[61] | 2020 | In this paper, researchers explore ways to assist SMEs in their cybersecurity defense through CTI sharing. Existing shared intelligence approaches do not meet SMEs’ requirements; further investigation is needed to enhance cybersecurity resilience. | Methods and platforms for sharing CTI | CTI data |
[41] | 2021 | The article discusses the significance of analyzing dark web content for CTI to deter cybercrimes and understand criminal behavior. | The life cycle of CTI | Internal network data, external threat feeds, open-source intelligence (OSINT), human intelligence |
[63] | 2020 | In this paper, the authors emphasize that shared intelligence needs to be translated into actionable insights to be effective. A prototype application is created to process MISP data, prioritize cybersecurity threats, and give customized recommendations. | 5W3H method | Open-source TI platform |
[56] | 2022 | The writers of this work want to highlight the nuances of hackers’ personalities and competence to assist defense specialists of targeted institutions in developing cybersecurity tactics based on the hackers’ modus operandi. | The relationship between a hacker’s behavior/logs in a server and the hacker’s personality, skills, and psychology | Logs |
[57] | 2022 | A case study is investigated based on user assessments and reviews of security threat intelligence providers. The effect of VIseKriterijumska Optimizacija I Kompromisno Resenje (VIKOR) user parameter modification on CTI provider ranking is investigated. The suggested approach is a tool to help security program executives decide which CTI providers to use. It also assists CTI service providers in improving the quality of their goods and services. | Support tools for security program executives confronted with the issue of which CTI providers to choose. It also assists CTI service providers in improving the quality of their goods and services. | Security threat intelligence internet platform |
[51] | 2019 | To enable active threat intelligence, this study provides a threat intelligence framework for evaluating attack data acquired via a cloud-based web service. | Analyzing attack data acquired via cloud-based web services to provide active threat intelligence | Data cloud |
[58] | 2020 | The significance and value of threat intelligence are covered in the opening paragraphs of this article. A threat intelligence analysis model is then presented. Next, the study compiles and organizes the suppliers of threat intelligence as well as the threat intelligence-sharing policies. | The existing threat intelligence-sharing method has several major flaws. | - |
[40] | 2021 | The writers concentrate on the task of acquiring information in this study. They demonstrate a unique crawling architecture for openly gathering data from clear web security websites, social web security forums, and dark web hacker forums/marketplaces. The suggested architecture divides data collection into two phases. | Information-gathering task | - |
[59] | 2019 | The research includes a complete assessment of deep fakes and economic potential for cybersecurity and AI businesses battling multimedia fraud and fake news. | A comprehensive review of deep fakes | - |
[53] | 2021 | This article focuses on integrating, comparing, and examining disruptive technologies’ effects, presenting security threats and occurrences, and building risk management strategies. | Design measures to manage risk | _ |
[54] | 2020 | As the important financial sector adapts to greater autonomy, there is a risk of increasing vulnerabilities and amplification of the impact of cybersecurity threats. As a result, companies must possess the flexibility to invest in ICT and cybersecurity expenditures to adjust to unanticipated conditions swiftly and efficiently for improved technology quality management. | Risk management plans | - |
[55] | 2022 | This study provides a deeper knowledge of the main stories being shared by ReOpen members as well as the sources they use to back up their opinions. Members offered public safety solutions based on individualism and self-inquiry while trying to reinterpret data to reduce the danger of COVID. Members questioned the veracity of the fact checkers when the platform tried to uncover problematic content, highlighting the intimate connection between misinformation and epistemology. | It clarifies the primary narratives circulating among ReOpen members and the material they used to back up their claims. | Facebook groups |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Saeed, S.; Suayyid, S.A.; Al-Ghamdi, M.S.; Al-Muhaisen, H.; Almuhaideb, A.M. A Systematic Literature Review on Cyber Threat Intelligence for Organizational Cybersecurity Resilience. Sensors 2023, 23, 7273. https://doi.org/10.3390/s23167273
Saeed S, Suayyid SA, Al-Ghamdi MS, Al-Muhaisen H, Almuhaideb AM. A Systematic Literature Review on Cyber Threat Intelligence for Organizational Cybersecurity Resilience. Sensors. 2023; 23(16):7273. https://doi.org/10.3390/s23167273
Chicago/Turabian StyleSaeed, Saqib, Sarah A. Suayyid, Manal S. Al-Ghamdi, Hayfa Al-Muhaisen, and Abdullah M. Almuhaideb. 2023. "A Systematic Literature Review on Cyber Threat Intelligence for Organizational Cybersecurity Resilience" Sensors 23, no. 16: 7273. https://doi.org/10.3390/s23167273
APA StyleSaeed, S., Suayyid, S. A., Al-Ghamdi, M. S., Al-Muhaisen, H., & Almuhaideb, A. M. (2023). A Systematic Literature Review on Cyber Threat Intelligence for Organizational Cybersecurity Resilience. Sensors, 23(16), 7273. https://doi.org/10.3390/s23167273