Next Article in Journal
Analysis of Obstacle Avoidance Strategy for Dual-Arm Robot Based on Speed Field with Improved Artificial Potential Field Algorithm
Next Article in Special Issue
Data Transformation Schemes for CNN-Based Network Traffic Analysis: A Survey
Previous Article in Journal
A Hybrid Control Scheme with Fast Transient and Low Harmonic for Boost PFC Converter
Previous Article in Special Issue
Discussion on IoT Security Recommendations against the State-of-the-Art Solutions
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Analysis and Implementation of Threat Agents Profiles in Semi-Automated Manner for a Network Traffic in Real-Time Information Environment

1
School of Computer Science & Engineering, University of Hertfordshire, Hatfield Al10 9AB, UK
2
Indian Institute of Information Technology Lucknow (IIITL), Lucknow 226002, India
3
ABV-Indian Institute of Information Technology & Management, Gwalior 474015, India
*
Author to whom correspondence should be addressed.
Electronics 2021, 10(15), 1849; https://doi.org/10.3390/electronics10151849
Submission received: 2 July 2021 / Revised: 27 July 2021 / Accepted: 28 July 2021 / Published: 31 July 2021
(This article belongs to the Special Issue Cybersecurity and Data Science)

Abstract

Threat assessment is the continuous process of monitoring the threats identified in the network of the real-time informational environment of an organisation and the business of the companies. The sagacity and security assurance for the system of an organisation and company’s business seem to need that information security exercise to unambiguously and effectively handle the threat agent’s attacks. How is this unambiguous and effective way in the present-day state of information security practice working? Given the prevalence of threats in the modern information environment, it is essential to guarantee the security of national information infrastructure. However, the existing models and methodology are not addressing the attributes of threats like motivation, opportunity, and capability (C, M, O), and the critical threat intelligence (CTI) feed to the threat agents during the penetration process is ineffective, due to which security assurance arises for an organisation and the business of companies. This paper proposes a semi-automatic information security model, which can deal with situational awareness data, strategies prevailing information security activities, and protocols monitoring specific types of the network next to the real-time information environment. This paper looks over analyses and implements the threat assessment of network traffic in one particular real-time informational environment. To achieve this, we determined various unique attributes of threat agents from the Packet Capture Application Programming Interface (PCAP files/DataStream) collected from the network between the years 2012 and 2019. We used hypothetical and real-world examples of a threat agent to evaluate the three different factors of threat agents, i.e., Motivation, Opportunity, and Capability (M, O, C). Based on this, we also designed and determined the threat profiles, critical threat intelligence (CTI), and complexity of threat agents that are not addressed or covered in the existing threat agent taxonomies models and methodologies.
Keywords: threat agents; motivation; opportunity; capability; user profiling; implicit; modeling; real-time user monitoring; complexity threat agent; threat assessment threat agents; motivation; opportunity; capability; user profiling; implicit; modeling; real-time user monitoring; complexity threat agent; threat assessment

Share and Cite

MDPI and ACS Style

Sharma, G.; Vidalis, S.; Menon, C.; Anand, N.; Kumar, S. Analysis and Implementation of Threat Agents Profiles in Semi-Automated Manner for a Network Traffic in Real-Time Information Environment. Electronics 2021, 10, 1849. https://doi.org/10.3390/electronics10151849

AMA Style

Sharma G, Vidalis S, Menon C, Anand N, Kumar S. Analysis and Implementation of Threat Agents Profiles in Semi-Automated Manner for a Network Traffic in Real-Time Information Environment. Electronics. 2021; 10(15):1849. https://doi.org/10.3390/electronics10151849

Chicago/Turabian Style

Sharma, Gaurav, Stilianos Vidalis, Catherine Menon, Niharika Anand, and Somesh Kumar. 2021. "Analysis and Implementation of Threat Agents Profiles in Semi-Automated Manner for a Network Traffic in Real-Time Information Environment" Electronics 10, no. 15: 1849. https://doi.org/10.3390/electronics10151849

APA Style

Sharma, G., Vidalis, S., Menon, C., Anand, N., & Kumar, S. (2021). Analysis and Implementation of Threat Agents Profiles in Semi-Automated Manner for a Network Traffic in Real-Time Information Environment. Electronics, 10(15), 1849. https://doi.org/10.3390/electronics10151849

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop