QR-SACP: Quantitative Risk-based Situational Awareness Calculation and Projection through Threat Information Sharing

04/28/2023
by   Mahdieh Safarzadehvahed, et al.
0

When a threat is observed, one of the most important challenges is to choose the most appropriate and adequate timely decisions in response to the current and near future situation in order to have the least consequences and costs. Making the appropriate and sufficient decisions requires knowing what situations the threat has engendered or may engender. In this paper, we propose a quantitative risk-based method called QR-SACP to calculate and project situational awareness in a network based on threat information sharing. In this method, we investigate a threat from different aspects and evaluate the threat's effects through dependency weight among a network's services. We calculate the definite effect of a threat on a service and the cascading propagation of the threat's definite effect on other dependent services to that service. In addition, we project the probability of a threat propagation or recurrence of the threat in other network services in three ways: procedurally, network connections and similar infrastructure or services. Experimental results demonstrate that the QR-SACP method can calculate and project definite and probable threats' effects across the entire network and reveal more details about the threat's current and near future situations.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/15/2022

ProAPT: Projection of APT Threats with Deep Reinforcement Learning

The highest level in the Endsley situation awareness model is called pro...
research
12/19/2021

Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers

Threat information sharing is considered as one of the proactive defensi...
research
04/23/2021

Collaborative Information Sharing for ML-Based Threat Detection

Recently, coordinated attack campaigns started to become more widespread...
research
01/09/2023

A Cyber Threat Intelligence Management Platform for Industrial Environments

Developing intelligent, interoperable Cyber Threat Information (CTI) sha...
research
04/29/2020

Big Fish, Little Fish, Critical Infrastructure: An Analysis of Phineas Fisher and the 'Hacktivist' Threat to Critical Infrastructure

The hacktivist threat actor is listed in many risk decision documents. Y...
research
11/26/2022

Quantitative Method for Security Situation of the Power Information Network Based on the Evolutionary Neural Network

Cybersecurity is the security cornerstone of digital transformation of t...
research
04/03/2019

Processing Tweets for Cybersecurity Threat Awareness

Receiving timely and relevant security information is crucial for mainta...

Please sign up or login with your details

Forgot password? Click here to reset