Cyber threat intelligence mining for proactive cybersecurity defense: A survey and new perspectives

N Sun, M Ding, J Jiang, W Xu, X Mo… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Today's cyber attacks have become more severe and frequent, which calls for a new line of
security defenses to protect against them. The dynamic nature of new-generation threats …

[HTML][HTML] Evolving techniques in cyber threat hunting: A systematic review

A Mahboubi, K Luong, H Aboutorab, HT Bui… - Journal of Network and …, 2024 - Elsevier
In the rapidly changing cybersecurity landscape, threat hunting has become a critical
proactive defense against sophisticated cyber threats. While traditional security measures …

A survey of protocol fuzzing

X Zhang, C Zhang, X Li, Z Du, B Mao, Y Li… - ACM Computing …, 2024 - dl.acm.org
Communication protocols form the bedrock of our interconnected world, yet vulnerabilities
within their implementations pose significant security threats. Recent developments have …

Generic quantum blockchain-envisioned security framework for IoT environment: Architecture, security benefits and future research

M Wazid, AK Das, Y Park - IEEE Open Journal of the Computer …, 2024 - ieeexplore.ieee.org
Quantum cryptography has the potential to secure the infrastructures that are vulnerable to
various attacks, like classical attacks, including quantum-related attacks. Therefore, quantum …

Safety case template for frontier AI: A cyber inability argument

A Goemans, MD Buhl, J Schuett, T Korbak… - arxiv preprint arxiv …, 2024 - arxiv.org
Frontier artificial intelligence (AI) systems pose increasing risks to society, making it
essential for developers to provide assurances about their safety. One approach to offering …

OSTIS: A novel organization-specific threat intelligence system

DR Arikkat, P Vinod, RR KA, S Nicolazzo, A Nocera… - Computers & …, 2024 - Elsevier
With the increasing complexity and frequency of cyber attacks, organizations recognize the
need for a proactive and targeted approach to safeguard their digital assets and operations …

NLP-based techniques for cyber threat intelligence

M Arazzi, DR Arikkat, S Nicolazzo, A Nocera… - arxiv preprint arxiv …, 2023 - arxiv.org
In the digital era, threat actors employ sophisticated techniques for which, often, digital
traces in the form of textual data are available. Cyber Threat Intelligence~(CTI) is related to …

Sharing is caring: Hurdles and prospects of open, crowd-sourced cyber threat intelligence

V Jesus, B Bains, V Chang - IEEE Transactions on Engineering …, 2023 - ieeexplore.ieee.org
Cyber threat intelligence (CTI) is widely recognized as an important area in cybersecurity but
it remains an area showing silos and reserved for large organizations. For an area whose …

From sands to mansions: Enabling automatic full-life-cycle cyberattack construction with llm

L Wang, J Wang, K Jung, K Thiagarajan, E Wei… - arxiv preprint arxiv …, 2024 - arxiv.org
The escalating battles between attackers and defenders in cybersecurity make it imperative
to test and evaluate defense capabilities from the attackers' perspective. However …

From threat reports to continuous threat intelligence: a comparison of attack technique extraction methods from textual artifacts

MR Rahman, L Williams - arxiv preprint arxiv:2210.02601, 2022 - arxiv.org
The cyberthreat landscape is continuously evolving. Hence, continuous monitoring and
sharing of threat intelligence have become a priority for organizations. Threat reports …