A Novel Approach to Cyber Hazard Management Intelligence System

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    Detecting and defending against insider and outsider threats seems to be a major challenge for information security system. such that cyber-attacks pose a silent threat for a company with a havoc likely to be in billions, besides slaughtering investor confidence and denting brand image. Long-established and ongoing solutions target mainly to assimilate many known threats in the form of consistent information such as logical & physical address, etc. into detection and blocking techniques. Our proposed solution elongates forward by using Cyber threat intelligence (CTI) which is used to inform decisions timely regarding subject response to the menance or hazard, where the vulnerable systems are identified using honeypot, through integration of logs for detecting network, host intrusions using SIEM technology which would efficiently manage the occurrence of threat by using cyber hazard management to mitigate the cyber threat actions, fortify incident response efforts and enhance your overall security posture.

     

     


  • Keywords


    Cyber Threat Intelligence (CTI): Cyber Kill Chain Model: Intrusion Detection system (IDS): Security Information and Event Management (SIEM): Cyber Hazard Management.

  • References


      [1].http://www.ey.com/Publication/vwLUAssets/EY-cyber-threat-intelligence-how-to-get-ahead-of-cybercrime/$FILE/EY-cyber-threat-intelligence-how-to-get-ahead-of-cybercrime.pdf

      [2].http://www.hackmageddon.com/2016/01/11/2015-cyber-attacks-statistics/

      [3]/https://www.netskope.com/blog/september-2016-cloud-report-43-7-percent-cloud-malware-ransomware-delivery-vehicles/

      [4].https://www.consumer.ftc.gov/blog/2017/09/equifax-data-breach-what-do

      [5].https://www.symantec.com/about/newsroom/press-releases/2017/symantec_0426_01

      [6].https://www.tripwire.com/state-of-security/security-data-protection/cyber-threat-intelligence/

      [7].https://ebrary.net/26640/computer_science/security_threats

      [8].http://searchsecurity.techtarget.com/definition/zero-day-vulnerability

      [9].http://searchsecurity.techtarget.com/definition/advanced-persistent-threat-APT

      [10].https://www.tripwire.com/state-of-security/security-data-protection/cyber-threat-intelligence/

      [11].https://www.sans.org/reading-room/whitepapers/analyst/cyberthreat-intelligence-how-35767

      [12].https://www.cisecurity.org/what-is-cyber-threat-intelligence/

      [13].http://www.securityweek.com/ciso-perspective-how-tactical-cyber-threat-intelligence-fits-your-security-program-

      [14].https://www.csoonline.com/article/3203804/security/know-your-enemy-understanding-threat-actors.html

      [15].https://www.lockheedmartin.com/us/what-we-do/aerospace-defense/cyber/cyber-kill-chain.html

      [16].https://arxiv.org/ftp/arxiv/papers/1712/1712.00841.pdf

      [17].http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.464.2990&rep=rep1&type=pdf

      [18].https://www.researchgate.net/publication/299666817_Detecting_and_Preventing_Data_Exfiltration_Executive_Summary

      [19].https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Securitysituation/IT-Security-Situation-in-Germany-2015.pdf?__blob=publicationFile&v=2

      [20].https://en.wikipedia.org/wiki/Intrusion_detection_system

      [21].https://en.wikipedia.org/wiki/Host-based_intrusion_detection_system

      [22].https://www.tripwire.com/state-of-security/incident-detection/log-management-siem/what-is-a-siem/

      [23].https://www.ioctm.org/What-is-Cyber-Threat-Management

      [24].http://breachlevelindex.com/

      [25].http://www.it-docs.net/ddata/792.pdf

      [26].http://www.omnisecu.com/security/infrastructure-and-email-security/low-interaction-honeypots-and-high-interaction-honeypots.php

      [27].https://www.digitalocean.com/community/tutorials/how-to-install-kippo-an-ssh-honeypot-on-an-ubuntu-cloud-server

      [28].https://suricata-ids.org/

      [29].https://www.aldeid.com/wiki/Suricata-vs-snort

      [30].https://media.readthedocs.org/pdf/suricata/latest/suricata.pdf

      [31].https://webtechdevx.qualcomm.com/swe/docs/articles/en/web-defender.html

      [32].https://webtechdevx.qualcomm.com/swe/docs/articles/en/web-defender.html

      [33].https://www.splunk.com/

      [34].https://en.wikipedia.org/wiki/FTP_bounce_attack

      [35].https://en.wikipedia.org/wiki/SMBRelay

      [36].https://en.wikipedia.org/wiki/Heartbleed

      [37] Vudatha, C.P., Nalliboena, S., Jammalamadaka, S.K.R., Duvvuri, B.K.K., Reddy, L.S.S., Automated generation of test cases from output domain of an embedded system using Genetic algorithms, ICECT 2011 - 2011 3rd International Conference on Electronics Computer Technology
      5,5941989, pp. 216-220

      [38] Sastry, J.K.R., Ganesh, J.V., Bhanu, J.S., I2C based networking for implementing heterogeneous microcontroller based distributed embedded systems, Indian Journal of Science and Technology, Volume 8, Issue 15, 2015

      [39] Sastry, J.K.R., Naga Sai Tejasvi, T., Aparna, J., Dynamic scheduling of message flow within a distributed embedded system connected through a RS485 network, ARPN Journal of Engineering and Applied Sciences, Volume 12, Issue 9, 1 May 2017, Pages 2809-2817

      [40] Sastry, J.K.R., Suresh, A., Bhanu, S.J., Building heterogeneous distributed embedded systems through rs485 communication protocol, ARPN Journal of Engineering and Applied Sciences, 2015, 10(16), pp. 6793-6803


 

View

Download

Article ID: 10866
 
DOI: 10.14419/ijet.v7i2.7.10866




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.