Show simple item record

dc.contributor.authorVoutilainen, Janne
dc.contributor.authorKari, Martti
dc.contributor.editorEze, Thaddeus
dc.contributor.editorSpeakman, Lee
dc.contributor.editorOnwubiko, Cyril
dc.date.accessioned2021-02-04T08:36:17Z
dc.date.available2021-02-04T08:36:17Z
dc.date.issued2020
dc.identifier.citationVoutilainen, J., & Kari, M. (2020). Strategic cyber threat intelligence : Building the situational picture with emerging technologies. In T. Eze, L. Speakman, & C. Onwubiko (Eds.), <i>ECCWS 2020 : Proceedings of the 19th European Conference on Cyber Warfare and Security</i> (pp. 545-553). Academic Conferences International. Proceedings of the European conference on information warfare and security. <a href="https://doi.org/10.34190/EWS.20.030" target="_blank">https://doi.org/10.34190/EWS.20.030</a>
dc.identifier.otherCONVID_47132696
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/73976
dc.description.abstractIn 2019, e-criminals adopted new tactics to demand enormous ransoms from large organizations by using ransomware, a phenomenon known as “big game hunting.” Big game hunting is an excellent example of a sophisticated and coordinated modern cyber-attack that has a significant impact on the target. Cyber threat intelligence (CTI) increases the possibilities to detect and prevent cyber-attacks and gives defenders more time to act. CTI is a combination of incident response and traditional intelligence. Intelligence modifies raw data into information for decision-making and action. CTI consists of strategic, operational, or tactical intelligence on cyber threats. Security event monitoring, event-based response, and anomaly and signature-based detection can create the basis of the situation in cyberspace. To achieve a uniform situational picture, long-term assessment is required. Strategic CTI informs broad or long-term issues and provides situation awareness as well as an analyzed overview of the threat landscape and early warning of cyber threats. This paper describes how the implementation of artificial intelligence (AI) and machine learning (ML) can be utilized in strategic CTI. The results were arrived at using the design science research methodology. We propose a solution that uses AI as a component of strategic CTI. Furthermore, the paper is a literature survey, integrating research literature on intelligence, cybersecurity, and AI. The paper presents the concept of CTI and its relation to the situational picture of cyberspace. It also addresses the possibilities of natural language understanding for large-scale content analysis and introduces a solution in which an existing enriched dataset provided valuable strategic-level information about an ongoing malicious cyber event. The paper is part of Ph.D. research concerning comprehensive CTI. Other articles in the dissertation discuss emerging technologies in operational and tactical CTI.en
dc.format.mimetypeapplication/pdf
dc.languageeng
dc.language.isoeng
dc.publisherAcademic Conferences International
dc.relation.ispartofECCWS 2020 : Proceedings of the 19th European Conference on Cyber Warfare and Security
dc.relation.ispartofseriesProceedings of the European conference on information warfare and security
dc.rightsIn Copyright
dc.subject.otherArtificial Intelligence
dc.subject.othermachine learning
dc.subject.otherStrategic Cyber Threat Intelligence
dc.titleStrategic cyber threat intelligence : Building the situational picture with emerging technologies
dc.typeconferenceObject
dc.identifier.urnURN:NBN:fi:jyu-202102041423
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.contributor.oppiaineTietotekniikkafi
dc.contributor.oppiaineMathematical Information Technologyen
dc.type.urihttp://purl.org/eprint/type/ConferencePaper
dc.relation.isbn978-1-912764-61-7
dc.description.reviewstatuspeerReviewed
dc.format.pagerange545-553
dc.relation.issn2048-8602
dc.type.versionacceptedVersion
dc.rights.copyright© Authors, 2020
dc.rights.accesslevelopenAccessfi
dc.relation.conferenceEuropean Conference on Cyber Warfare and Security
dc.subject.ysoverkkohyökkäykset
dc.subject.ysotiedustelu
dc.subject.ysotekoäly
dc.subject.ysokoneoppiminen
dc.subject.ysokyberturvallisuus
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p27466
jyx.subject.urihttp://www.yso.fi/onto/yso/p13152
jyx.subject.urihttp://www.yso.fi/onto/yso/p2616
jyx.subject.urihttp://www.yso.fi/onto/yso/p21846
jyx.subject.urihttp://www.yso.fi/onto/yso/p26189
dc.rights.urlhttp://rightsstatements.org/page/InC/1.0/?language=en
dc.relation.doi10.34190/EWS.20.030


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

In Copyright
Except where otherwise noted, this item's license is described as In Copyright