Development of a Cyber-Threat Intelligence-Sharing Model from Big Data Sources
Abstract:
As data in cyberspace continues to grow because of the ubiquity of Information Communication Technologies (ICT), it is becoming challenging to obtain context-aware, actionable information from Big Data to timely detect and respond to cyberattacks that are increasing in severity, complexity, and frequency. In fact, cybercriminals are developing and sharing advanced techniques for their cyber espionage, reconnaissance missions, and ultimately devastating attacks. In order to reduce cybersecurity risks and strengthen cyber resilience, strategic cybersecurity information-sharing is a necessity. This article discusses one way of handling large volumes of unstructured data that have been generated by multiple sources across different sectors into a cyber-threat intelligence-sharing model.
AUTHORS
Council of Scientific and Industrial Research (CSIR) Defence, Peace, Safety, and Security Pretoria,
South Africa
Dr. Jabu Mtsweni is a Head of Information and Cyber Security Centre at the Council for Scientific and Industrial Research (CSIR) focusing on secure identity systems, cybersecurity systems, data security and analytics, including governance, privacy, and trust.
Council of Scientific and Industrial Research (CSIR) Defence, Peace, Safety, and Security Pretoria,
South Africa
Muyowa Mutemwa is currently a Senior Cyber Security Researcher at the Council of Scientific and Industrial Research, where he runs a Security Operations Centre.
Council of Scientific and Industrial Research (CSIR) Defence, Peace, Safety, and Security Pretoria,
South Africa
Njabulo Mkhonto is a researcher and software developer for the Cyber Defense team at the Council for Scientific and Industrial Research (CSIR). He has an interest in the applications of Artificial Intelligence research and techniques in solving real-world problems. He studied at the University of Johannesburg where he completed his BSc and BSc Hons in Information Technology, focusing on the use of swarming technologies for improved image processing. Since joining the CSIR, his focus has been on cyber security, where he has been involved in research efforts involving cyber threat intelligence, mobile security, and network security.
Published In
Journal of Information Warfare
The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.
Quick Links
Archive