{"title":"数据泄露指标选择方法","authors":"V. Kartak, Nail Bashmakov","doi":"10.1109/SIBCON56144.2022.10002962","DOIUrl":null,"url":null,"abstract":"This work is devoted to the consideration of the use of indicators of compromise at the process of cyber intelligence. When used correctly, lists of indicators of compromise (feeds) can reveal malicious activity in the infrastructure. Nevertheless, to achieve their effective implementation is not easy-there are certain limitations and subtleties. The paper proposes a method for generating a set of indicators of compromise applicable to the infrastructure, and an experiment is carried out. Its results indicate that a set of feeds and indicators must be selected for each infrastructure, depending on its composition and tasks set during the implementation of the cyber threat intelligence process.","PeriodicalId":265523,"journal":{"name":"2022 International Siberian Conference on Control and Communications (SIBCON)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Method for Selecting Indicators of Data Compromise\",\"authors\":\"V. Kartak, Nail Bashmakov\",\"doi\":\"10.1109/SIBCON56144.2022.10002962\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This work is devoted to the consideration of the use of indicators of compromise at the process of cyber intelligence. When used correctly, lists of indicators of compromise (feeds) can reveal malicious activity in the infrastructure. Nevertheless, to achieve their effective implementation is not easy-there are certain limitations and subtleties. The paper proposes a method for generating a set of indicators of compromise applicable to the infrastructure, and an experiment is carried out. Its results indicate that a set of feeds and indicators must be selected for each infrastructure, depending on its composition and tasks set during the implementation of the cyber threat intelligence process.\",\"PeriodicalId\":265523,\"journal\":{\"name\":\"2022 International Siberian Conference on Control and Communications (SIBCON)\",\"volume\":\"115 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-11-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 International Siberian Conference on Control and Communications (SIBCON)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SIBCON56144.2022.10002962\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Siberian Conference on Control and Communications (SIBCON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SIBCON56144.2022.10002962","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Method for Selecting Indicators of Data Compromise
This work is devoted to the consideration of the use of indicators of compromise at the process of cyber intelligence. When used correctly, lists of indicators of compromise (feeds) can reveal malicious activity in the infrastructure. Nevertheless, to achieve their effective implementation is not easy-there are certain limitations and subtleties. The paper proposes a method for generating a set of indicators of compromise applicable to the infrastructure, and an experiment is carried out. Its results indicate that a set of feeds and indicators must be selected for each infrastructure, depending on its composition and tasks set during the implementation of the cyber threat intelligence process.