Nov. 4, 2022, 1:20 a.m. | Md Tanvirul Alam, Dipkamal Bhusal, Youngja Park, Nidhi Rastogi

cs.CR updates on arXiv.org arxiv.org

Public and commercial companies extensively share cyber threat intelligence
(CTI) to prepare systems to defend against emerging cyberattacks. Most used
intelligence thus far has been limited to tracking known threat indicators such
as IP addresses and domain names as they are easier to extract using regular
expressions. Due to the limited long-term usage and difficulty of performing a
long-term analysis on indicators, we propose using significantly more robust
threat intelligence signals called attack patterns. However, extracting attack
patterns at scale …

attack beyond cti iocs patterns

Information Security Engineers

@ D. E. Shaw Research | New York City

Cybersecurity Architect III

@ JPMorgan Chase & Co. | Columbus, OH, United States

Senior DevSecOps Engineer

@ Marlabs | Chennai, IN

Consultant Cyber Sécurité H/F

@ Hifield | Lyon, France

Cyber Security Consultant (Remote, US)

@ Crosslake Technologies | Remote (US)

PE Hub- SAP GRC/ IAG Consultant

@ SAP | Bengaluru, IN, 560066