A Novel Approach to Cyber Hazard Management Intelligence System
-
2018-03-18 https://doi.org/10.14419/ijet.v7i2.7.10866 -
Cyber Threat Intelligence (CTI), Cyber Kill Chain Model, Intrusion Detection system (IDS), Security Information and Event Management (SIEM), Cyber Hazard Management. -
Abstract
Detecting and defending against insider and outsider threats seems to be a major challenge for information security system. such that cyber-attacks pose a silent threat for a company with a havoc likely to be in billions, besides slaughtering investor confidence and denting brand image. Long-established and ongoing solutions target mainly to assimilate many known threats in the form of consistent information such as logical & physical address, etc. into detection and blocking techniques. Our proposed solution elongates forward by using Cyber threat intelligence (CTI) which is used to inform decisions timely regarding subject response to the menance or hazard, where the vulnerable systems are identified using honeypot, through integration of logs for detecting network, host intrusions using SIEM technology which would efficiently manage the occurrence of threat by using cyber hazard management to mitigate the cyber threat actions, fortify incident response efforts and enhance your overall security posture.
Â
Â
-
References
[2].http://www.hackmageddon.com/2016/01/11/2015-cyber-attacks-statistics/
[4].https://www.consumer.ftc.gov/blog/2017/09/equifax-data-breach-what-do
[5].https://www.symantec.com/about/newsroom/press-releases/2017/symantec_0426_01
[6].https://www.tripwire.com/state-of-security/security-data-protection/cyber-threat-intelligence/
[7].https://ebrary.net/26640/computer_science/security_threats
[8].http://searchsecurity.techtarget.com/definition/zero-day-vulnerability
[9].http://searchsecurity.techtarget.com/definition/advanced-persistent-threat-APT
[10].https://www.tripwire.com/state-of-security/security-data-protection/cyber-threat-intelligence/
[11].https://www.sans.org/reading-room/whitepapers/analyst/cyberthreat-intelligence-how-35767
[12].https://www.cisecurity.org/what-is-cyber-threat-intelligence/
[14].https://www.csoonline.com/article/3203804/security/know-your-enemy-understanding-threat-actors.html
[15].https://www.lockheedmartin.com/us/what-we-do/aerospace-defense/cyber/cyber-kill-chain.html
[16].https://arxiv.org/ftp/arxiv/papers/1712/1712.00841.pdf
[17].http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.464.2990&rep=rep1&type=pdf
[20].https://en.wikipedia.org/wiki/Intrusion_detection_system
[21].https://en.wikipedia.org/wiki/Host-based_intrusion_detection_system
[22].https://www.tripwire.com/state-of-security/incident-detection/log-management-siem/what-is-a-siem/
[23].https://www.ioctm.org/What-is-Cyber-Threat-Management
[24].http://breachlevelindex.com/
[25].http://www.it-docs.net/ddata/792.pdf
[28].https://suricata-ids.org/
[29].https://www.aldeid.com/wiki/Suricata-vs-snort
[30].https://media.readthedocs.org/pdf/suricata/latest/suricata.pdf
[31].https://webtechdevx.qualcomm.com/swe/docs/articles/en/web-defender.html
[32].https://webtechdevx.qualcomm.com/swe/docs/articles/en/web-defender.html
[34].https://en.wikipedia.org/wiki/FTP_bounce_attack
[35].https://en.wikipedia.org/wiki/SMBRelay
[36].https://en.wikipedia.org/wiki/Heartbleed
[37] Vudatha, C.P., Nalliboena, S., Jammalamadaka, S.K.R., Duvvuri, B.K.K., Reddy, L.S.S., Automated generation of test cases from output domain of an embedded system using Genetic algorithms, ICECT 2011 - 2011 3rd International Conference on Electronics Computer Technology
5,5941989, pp. 216-220[38] Sastry, J.K.R., Ganesh, J.V., Bhanu, J.S., I2C based networking for implementing heterogeneous microcontroller based distributed embedded systems, Indian Journal of Science and Technology, Volume 8, Issue 15, 2015
[39] Sastry, J.K.R., Naga Sai Tejasvi, T., Aparna, J., Dynamic scheduling of message flow within a distributed embedded system connected through a RS485 network, ARPN Journal of Engineering and Applied Sciences, Volume 12, Issue 9, 1 May 2017, Pages 2809-2817
[40] Sastry, J.K.R., Suresh, A., Bhanu, S.J., Building heterogeneous distributed embedded systems through rs485 communication protocol, ARPN Journal of Engineering and Applied Sciences, 2015, 10(16), pp. 6793-6803
-
Downloads
-
How to Cite
Bala Bharathi, B., & Suresh Babu, E. (2018). A Novel Approach to Cyber Hazard Management Intelligence System. International Journal of Engineering & Technology, 7(2.7), 473-479. https://doi.org/10.14419/ijet.v7i2.7.10866Received date: 2018-04-01
Accepted date: 2018-04-01
Published date: 2018-03-18