Development of a Cyber-Threat Intelligence-Sharing Model from Big Data Sources

Abstract:

As data in cyberspace continues to grow because of the ubiquity of Information Communication Technologies (ICT), it is becoming challenging to obtain context-aware, actionable information from Big Data to timely detect and respond to cyberattacks that are increasing in severity, complexity, and frequency. In fact, cybercriminals are developing and sharing advanced techniques for their cyber espionage, reconnaissance missions, and ultimately devastating attacks. In order to reduce cybersecurity risks and strengthen cyber resilience, strategic cybersecurity information-sharing is a necessity. This article discusses one way of handling large volumes of unstructured data that have been generated by multiple sources across different sectors into a cyber-threat intelligence-sharing model.


AUTHORS

Photo of Dr. Jabu Mtsweni

Council of Scientific and Industrial Research (CSIR) Defence, Peace, Safety, and Security Pretoria,
South Africa

Dr. Jabu Mtsweni is a Head of Information and Cyber Security Centre at the Council for Scientific and Industrial Research (CSIR) focusing on secure identity systems, cybersecurity systems, data security and analytics, including governance, privacy, and trust.

 

Photo of Muyowa Mutemwa

Council of Scientific and Industrial Research (CSIR) Defence, Peace, Safety, and Security Pretoria,
South Africa

Muyowa Mutemwa is currently a Senior Cyber Security Researcher at the Council of Scientific and Industrial Research, where he runs a Security Operations Centre.

Photo of Njabulo Mkhonto

Council of Scientific and Industrial Research (CSIR) Defence, Peace, Safety, and Security Pretoria,
South Africa

Njabulo Mkhonto is a researcher and software developer for the Cyber Defense team at the Council for Scientific and Industrial Research (CSIR). He has an interest in the applications of Artificial Intelligence research and techniques in solving real-world problems. He studied at the University of Johannesburg where he completed his BSc and BSc Hons in Information Technology, focusing on the use of swarming technologies for improved image processing. Since joining the CSIR, his focus has been on cyber security, where he has been involved in research efforts involving cyber threat intelligence, mobile security, and network security.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

P

PDA

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com