dc.contributor.author | Voutilainen, Janne | |
dc.contributor.author | Kari, Martti | |
dc.contributor.editor | Eze, Thaddeus | |
dc.contributor.editor | Speakman, Lee | |
dc.contributor.editor | Onwubiko, Cyril | |
dc.date.accessioned | 2021-02-04T08:36:17Z | |
dc.date.available | 2021-02-04T08:36:17Z | |
dc.date.issued | 2020 | |
dc.identifier.citation | Voutilainen, J., & Kari, M. (2020). Strategic cyber threat intelligence : Building the situational picture with emerging technologies. In T. Eze, L. Speakman, & C. Onwubiko (Eds.), <i>ECCWS 2020 : Proceedings of the 19th European Conference on Cyber Warfare and Security</i> (pp. 545-553). Academic Conferences International. Proceedings of the European conference on information warfare and security. <a href="https://doi.org/10.34190/EWS.20.030" target="_blank">https://doi.org/10.34190/EWS.20.030</a> | |
dc.identifier.other | CONVID_47132696 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/73976 | |
dc.description.abstract | In 2019, e-criminals adopted new tactics to demand enormous ransoms from large organizations by using ransomware, a phenomenon known as “big game hunting.” Big game hunting is an excellent example of a sophisticated and coordinated modern cyber-attack that has a significant impact on the target. Cyber threat intelligence (CTI) increases the possibilities to detect and prevent cyber-attacks and gives defenders more time to act. CTI is a combination of incident response and traditional intelligence. Intelligence modifies raw data into information for decision-making and action. CTI consists of strategic, operational, or tactical intelligence on cyber threats. Security event monitoring, event-based response, and anomaly and signature-based detection can create the basis of the situation in cyberspace. To achieve a uniform situational picture, long-term assessment is required. Strategic CTI informs broad or long-term issues and provides situation awareness as well as an analyzed overview of the threat landscape and early warning of cyber threats. This paper describes how the implementation of artificial intelligence (AI) and machine learning (ML) can be utilized in strategic CTI. The results were arrived at using the design science research methodology. We propose a solution that uses AI as a component of strategic CTI. Furthermore, the paper is a literature survey, integrating research literature on intelligence, cybersecurity, and AI. The paper presents the concept of CTI and its relation to the situational picture of cyberspace. It also addresses the possibilities of natural language understanding for large-scale content analysis and introduces a solution in which an existing enriched dataset provided valuable strategic-level information about an ongoing malicious cyber event. The paper is part of Ph.D. research concerning comprehensive CTI. Other articles in the dissertation discuss emerging technologies in operational and tactical CTI. | en |
dc.format.mimetype | application/pdf | |
dc.language | eng | |
dc.language.iso | eng | |
dc.publisher | Academic Conferences International | |
dc.relation.ispartof | ECCWS 2020 : Proceedings of the 19th European Conference on Cyber Warfare and Security | |
dc.relation.ispartofseries | Proceedings of the European conference on information warfare and security | |
dc.rights | In Copyright | |
dc.subject.other | Artificial Intelligence | |
dc.subject.other | machine learning | |
dc.subject.other | Strategic Cyber Threat Intelligence | |
dc.title | Strategic cyber threat intelligence : Building the situational picture with emerging technologies | |
dc.type | conferenceObject | |
dc.identifier.urn | URN:NBN:fi:jyu-202102041423 | |
dc.contributor.laitos | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Faculty of Information Technology | en |
dc.contributor.oppiaine | Tietotekniikka | fi |
dc.contributor.oppiaine | Mathematical Information Technology | en |
dc.type.uri | http://purl.org/eprint/type/ConferencePaper | |
dc.relation.isbn | 978-1-912764-61-7 | |
dc.type.coar | http://purl.org/coar/resource_type/c_5794 | |
dc.description.reviewstatus | peerReviewed | |
dc.format.pagerange | 545-553 | |
dc.relation.issn | 2048-8602 | |
dc.type.version | acceptedVersion | |
dc.rights.copyright | © Authors, 2020 | |
dc.rights.accesslevel | openAccess | fi |
dc.relation.conference | European Conference on Cyber Warfare and Security | |
dc.subject.yso | verkkohyökkäykset | |
dc.subject.yso | tiedustelu | |
dc.subject.yso | tekoäly | |
dc.subject.yso | koneoppiminen | |
dc.subject.yso | kyberturvallisuus | |
dc.format.content | fulltext | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p27466 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p13152 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p2616 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p21846 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p26189 | |
dc.rights.url | http://rightsstatements.org/page/InC/1.0/?language=en | |
dc.relation.doi | 10.34190/EWS.20.030 | |
dc.type.okm | A4 | |