Araştırma Makalesi

Graph Visualization of Cyber Threat Intelligence Data for Analysis of Cyber Attacks

Cilt: 10 Sayı: 3 30 Temmuz 2022
PDF İndir
EN

Graph Visualization of Cyber Threat Intelligence Data for Analysis of Cyber Attacks

Öz

Threat intelligence enables us to make faster, more informed, data-backed security decisions and change their behavior from reactive to proactive in the fight against threat actors. Cyber threat intelligence sources include open-source intelligence, social media intelligence, human intelligence, technical intelligence, device log files, forensically acquired data or intelligence from the internet traffic, and data derived for the deep and dark web. In this study, graph visualization is discussed for the intelligible and accurate analysis of complex cyber threat intelligence data, including network attacks. The processes of collecting, cleaning, organizing, and visualizing cyber intelligence data in different formats and contents on a single platform are given step by step. Dynamic graphs play an active role in these systems, where the attack locations and targets from different points are constantly variable. Therefore, research on dynamic graph solutions and visualization in the visual analysis of cyberattacks is presented.

Anahtar Kelimeler

Kaynakça

  1. [1] Y. Bu ̈rhan and R. Das ̧, “Co-author link prediction from academic databases,” Gazi University, Journal of Polytechnic, vol. 20, no. 4, pp. 787–800, Dec. 2017. [Online]. Available: http://dergipark.gov.tr/ download/article- file/387477
  2. [2] L. Yang, E. Cheng, and Z. M. O ̈zsoyog ̆lu, “Efficient path-based computations on pedigree graphs with compact encodings,” BMC Bioinformatics, vol. 13, no. S3, p. S14, Dec. 2012. [Online]. Available: https://bmcbioinformatics.biomedcentral. com/articles/10.1186/1471- 2105- 13- S3- S14
  3. [3] Q. Guo, X. Qiu, X. Xue, and Z. Zhang, “Syntax-guided text generation via graph neural network,” Science China Information Sciences, vol. 64, no. 5, p. 152102, May 2021. [Online]. Available: http://link.springer.com/10.1007/s11432-019-2740-1
  4. [4] B. Xie, C. Qi, H. Ben, and W. Yu, “The applications of graph theory in electric network,” in 2019 International Conference on Sensing, Diagnostics, Prognostics, and Control (SDPC). Beijing, China: IEEE, Aug. 2019, pp. 780–784. [Online]. Available: https: //ieeexplore.ieee.org/document/9168962/
  5. [5] D. P. Sinha, “A pairing between graphs and trees,” arXiv:math/0502547, Oct. 2006, arXiv: math/0502547. [Online]. Available: http://arxiv.org/ abs/math/0502547
  6. [6] S. A. M. A. Junid, N. M. Tahir, Z. A. Majid, and M. F. M. Idros, “Potential of graph theory algorithm approach for DNA sequence alignment and comparison,” in 2012 Third International Conference on Intelligent Systems Modelling and Simulation. Kota Kinabalu, Malaysia: IEEE, Feb. 2012, pp. 187–190. [Online]. Available: http://ieeexplore.ieee.org/document/6169697/
  7. [7] J. Zhao, Q. Yan, J. Li, M. Shao, Z. He, and B. Li, “TIMiner: Automatically extracting and analyzing categorized cyber threat intelligence from social data,” Computers & Security, vol. 95, p. 101867, Aug. 2020. [Online]. Available: https://linkinghub.elsevier.com/ retrieve/pii/S0167404820301395
  8. [8] OASIS, “STIXTM version 2.0. part 3: Cyber observable core concepts.”

Ayrıntılar

Birincil Dil

İngilizce

Konular

Yazılım Testi, Doğrulama ve Validasyon

Bölüm

Araştırma Makalesi

Yayımlanma Tarihi

30 Temmuz 2022

Gönderilme Tarihi

19 Mart 2022

Kabul Tarihi

28 Temmuz 2022

Yayımlandığı Sayı

Yıl 2022 Cilt: 10 Sayı: 3

Kaynak Göster

APA
Sülü, M., & Daş, R. (2022). Graph Visualization of Cyber Threat Intelligence Data for Analysis of Cyber Attacks. Balkan Journal of Electrical and Computer Engineering, 10(3), 300-306. https://doi.org/10.17694/bajece.1090145
AMA
1.Sülü M, Daş R. Graph Visualization of Cyber Threat Intelligence Data for Analysis of Cyber Attacks. Balkan Journal of Electrical and Computer Engineering. 2022;10(3):300-306. doi:10.17694/bajece.1090145
Chicago
Sülü, Mücahit, ve Resul Daş. 2022. “Graph Visualization of Cyber Threat Intelligence Data for Analysis of Cyber Attacks”. Balkan Journal of Electrical and Computer Engineering 10 (3): 300-306. https://doi.org/10.17694/bajece.1090145.
EndNote
Sülü M, Daş R (01 Temmuz 2022) Graph Visualization of Cyber Threat Intelligence Data for Analysis of Cyber Attacks. Balkan Journal of Electrical and Computer Engineering 10 3 300–306.
IEEE
[1]M. Sülü ve R. Daş, “Graph Visualization of Cyber Threat Intelligence Data for Analysis of Cyber Attacks”, Balkan Journal of Electrical and Computer Engineering, c. 10, sy 3, ss. 300–306, Tem. 2022, doi: 10.17694/bajece.1090145.
ISNAD
Sülü, Mücahit - Daş, Resul. “Graph Visualization of Cyber Threat Intelligence Data for Analysis of Cyber Attacks”. Balkan Journal of Electrical and Computer Engineering 10/3 (01 Temmuz 2022): 300-306. https://doi.org/10.17694/bajece.1090145.
JAMA
1.Sülü M, Daş R. Graph Visualization of Cyber Threat Intelligence Data for Analysis of Cyber Attacks. Balkan Journal of Electrical and Computer Engineering. 2022;10:300–306.
MLA
Sülü, Mücahit, ve Resul Daş. “Graph Visualization of Cyber Threat Intelligence Data for Analysis of Cyber Attacks”. Balkan Journal of Electrical and Computer Engineering, c. 10, sy 3, Temmuz 2022, ss. 300-6, doi:10.17694/bajece.1090145.
Vancouver
1.Mücahit Sülü, Resul Daş. Graph Visualization of Cyber Threat Intelligence Data for Analysis of Cyber Attacks. Balkan Journal of Electrical and Computer Engineering. 01 Temmuz 2022;10(3):300-6. doi:10.17694/bajece.1090145

Cited By

All articles published by BAJECE are licensed under the Creative Commons Attribution 4.0 International License. This permits anyone to copy, redistribute, remix, transmit and adapt the work provided the original work and source is appropriately cited.Creative Commons Lisans