Measuring and visualizing cyber threat intelligence quality
The very raison d’être of cyber threat intelligence (CTI) is to provide meaningful knowledge about cyber security threats. The exchange and collaborative generation of CTI by the means of sharing platforms has proven to be an important aspect of practical application. It is evident to infer that ina...
Uloženo v:
| Vydáno v: | International journal of information security Ročník 20; číslo 1; s. 21 - 38 |
|---|---|
| Hlavní autoři: | , , , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
Berlin/Heidelberg
Springer Berlin Heidelberg
01.02.2021
Springer Nature B.V |
| Témata: | |
| ISSN: | 1615-5262, 1615-5270 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | The very raison d’être of cyber threat intelligence (CTI) is to provide meaningful knowledge about cyber security threats. The exchange and collaborative generation of CTI by the means of sharing platforms has proven to be an important aspect of practical application. It is evident to infer that inaccurate, incomplete, or outdated threat intelligence is a major problem as only high-quality CTI can be helpful to detect and defend against cyber attacks. Additionally, while the amount of available CTI is increasing it is not warranted that quality remains unaffected. In conjunction with the increasing number of available CTI, it is thus in the best interest of every stakeholder to be aware of the quality of a CTI artifact. This allows for informed decisions and permits detailed analyses. Our work makes a twofold contribution to the challenge of assessing threat intelligence quality. We first propose a series of relevant quality dimensions and configure metrics to assess the respective dimensions in the context of CTI. In a second step, we showcase the extension of an existing CTI analysis tool to make the quality assessment transparent to security analysts. Furthermore, analysts’ subjective perceptions are, where necessary, included in the quality assessment concept. |
|---|---|
| AbstractList | The very raison d’être of cyber threat intelligence (CTI) is to provide meaningful knowledge about cyber security threats. The exchange and collaborative generation of CTI by the means of sharing platforms has proven to be an important aspect of practical application. It is evident to infer that inaccurate, incomplete, or outdated threat intelligence is a major problem as only high-quality CTI can be helpful to detect and defend against cyber attacks. Additionally, while the amount of available CTI is increasing it is not warranted that quality remains unaffected. In conjunction with the increasing number of available CTI, it is thus in the best interest of every stakeholder to be aware of the quality of a CTI artifact. This allows for informed decisions and permits detailed analyses. Our work makes a twofold contribution to the challenge of assessing threat intelligence quality. We first propose a series of relevant quality dimensions and configure metrics to assess the respective dimensions in the context of CTI. In a second step, we showcase the extension of an existing CTI analysis tool to make the quality assessment transparent to security analysts. Furthermore, analysts’ subjective perceptions are, where necessary, included in the quality assessment concept. |
| Author | Böhm, Fabian Caselli, Marco Pernul, Günther Schlette, Daniel |
| Author_xml | – sequence: 1 givenname: Daniel orcidid: 0000-0002-4847-522X surname: Schlette fullname: Schlette, Daniel organization: University of Regensburg – sequence: 2 givenname: Fabian orcidid: 0000-0002-0023-6051 surname: Böhm fullname: Böhm, Fabian email: Fabian.Boehm@ur.de organization: University of Regensburg – sequence: 3 givenname: Marco surname: Caselli fullname: Caselli, Marco organization: Siemens AG – sequence: 4 givenname: Günther surname: Pernul fullname: Pernul, Günther organization: University of Regensburg |
| BookMark | eNp9kE9LxDAQxYOs4O7qF_BU8FydpGnS4kkW_8GKFz2HNE3WLDXdTVKhfnpbKwoe9vJmBt5vZngLNHOt0widY7jEAPwqYCDA00FSAFpC2h-hOWY4T3PCYfbbM3KCFiFsAQiGEs_R9ZOWofPWbRLp6uTDhk429nOcVV9pn8Q3r2VMrIu6aexGO6WT_eiJ_Sk6NrIJ-uynLtHr3e3L6iFdP98_rm7WqaLAYlpXylSmhEyVuqAFNazCWNYVraEsjalILblSUuZFVipT6JobApgzqggfnCRbootp7863-06HKLZt591wUhDKC8ZYXtDBVUwu5dsQvDZC2SijbV300jYCgxijElNUYhDxHZXoB5T8Q3fevkvfH4ayCQq7MT7t_746QH0BaZd_ZA |
| CitedBy_id | crossref_primary_10_1007_s10207_024_00869_1 crossref_primary_10_3390_electronics14091826 crossref_primary_10_1016_j_jisa_2024_103786 crossref_primary_10_32604_cmc_2022_025310 crossref_primary_10_1007_s10207_025_01080_6 crossref_primary_10_1007_s10207_020_00528_1 crossref_primary_10_3390_s21144890 crossref_primary_10_1016_j_cose_2024_104079 crossref_primary_10_1016_j_cosrev_2025_100765 crossref_primary_10_3390_electronics10232913 crossref_primary_10_1007_s10207_025_01033_z crossref_primary_10_1109_COMST_2021_3117338 crossref_primary_10_3390_electronics13214329 crossref_primary_10_1080_0960085X_2022_2088414 crossref_primary_10_1365_s43439_024_00117_1 crossref_primary_10_1016_j_cose_2021_102482 crossref_primary_10_1155_2023_3303122 crossref_primary_10_3390_electronics14163251 crossref_primary_10_1109_COMST_2023_3273282 crossref_primary_10_3390_electronics12143185 crossref_primary_10_3390_app15084327 crossref_primary_10_1109_ACCESS_2024_3351108 crossref_primary_10_3390_app122211631 crossref_primary_10_3390_app14166872 crossref_primary_10_1016_j_cose_2024_103972 crossref_primary_10_1016_j_ijinfomgt_2025_102902 crossref_primary_10_1109_ACCESS_2025_3550378 crossref_primary_10_1145_3484202 crossref_primary_10_1145_3530809 crossref_primary_10_1007_s10207_025_01006_2 crossref_primary_10_3390_app12031205 crossref_primary_10_1109_ACCESS_2025_3606477 |
| Cites_doi | 10.1145/3319535.3354239 10.1145/2994539.2994546 10.1016/j.cose.2017.09.001 10.1016/j.cose.2017.10.009 10.1007/978-3-319-24106-7 10.1145/1541880.1541883 10.1145/3029806.3029811 10.1016/j.inffus.2017.12.006 10.1145/505248.506010 10.1016/S1361-3723(14)70469-5 10.1109/69.404034 10.1007/s10207-019-00433-2 10.1186/s42400-018-0017-4 10.1080/07421222.1996.11518099 10.1109/FiCloud.2015.82 10.1016/j.dss.2005.05.019 10.1145/240455.240479 10.1016/j.cose.2016.04.003 10.1145/2663876.2663882 |
| ContentType | Journal Article |
| Copyright | The Author(s) 2020 The Author(s) 2020. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| Copyright_xml | – notice: The Author(s) 2020 – notice: The Author(s) 2020. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| DBID | C6C AAYXX CITATION 0-V 3V. 7SC 7WY 7WZ 7XB 87Z 88F 8AL 8AM 8AO 8FD 8FE 8FG 8FK 8FL ABUWG AFKRA ALSLI ARAPS AZQEC BENPR BEZIV BGLVJ BGRYB CCPQU DWQXO FRNLG F~G GNUQQ HCIFZ JQ2 K60 K6~ K7- K7. L.- L7M L~C L~D M0C M0N M0O M1Q P5Z P62 PHGZM PHGZT PKEHL PQBIZ PQBZA PQEST PQGLB PQQKQ PQUKI PRINS PRQQA Q9U |
| DOI | 10.1007/s10207-020-00490-y |
| DatabaseName | Springer Nature OA Free Journals CrossRef ProQuest Social Sciences Premium Collection ProQuest Central (Corporate) Computer and Information Systems Abstracts ABI/INFORM Collection ABI/INFORM Global (PDF only) ProQuest Central (purchase pre-March 2016) ABI/INFORM Collection Military Database (Alumni Edition) Computing Database (Alumni Edition) Criminal Justice Database (Alumni Edition) ProQuest Pharma Collection Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) (purchase pre-March 2016) ABI/INFORM Collection (Alumni) ProQuest Central (Alumni) ProQuest Central UK/Ireland Social Science Premium Collection Advanced Technologies & Computer Science Collection ProQuest Central Essentials ProQuest Central Business Premium Collection Technology Collection Criminology Collection ProQuest One Community College ProQuest Central Korea Business Premium Collection (Alumni) ABI/INFORM Global (Corporate) ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection ProQuest Business Collection (Alumni Edition) ProQuest Business Collection Computer Science Database ProQuest Criminal Justice (Alumni) ABI/INFORM Professional Advanced Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional ABI/INFORM Global Computing Database Criminal Justice Database Military Database Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic (New) ProQuest One Academic Middle East (New) ProQuest One Business ProQuest One Business (Alumni) ProQuest One Academic Eastern Edition (DO NOT USE) One Applied & Life Sciences ProQuest One Academic (retired) ProQuest One Academic UKI Edition ProQuest Central China ProQuest One Social Sciences ProQuest Central Basic |
| DatabaseTitle | CrossRef ProQuest Business Collection (Alumni Edition) Computer Science Database ProQuest Central Student ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection Computer and Information Systems Abstracts SciTech Premium Collection ProQuest Military Collection ProQuest Central China ABI/INFORM Complete ProQuest One Applied & Life Sciences ProQuest Central (New) Advanced Technologies & Aerospace Collection Business Premium Collection Social Science Premium Collection ABI/INFORM Global ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest Business Collection Criminology Collection Criminal Justice Periodicals (Alumni Edition) ProQuest Social Sciences Premium Collection ProQuest One Academic UKI Edition ProQuest One Academic ProQuest One Academic (New) ABI/INFORM Global (Corporate) ProQuest One Business Technology Collection Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest One Academic Middle East (New) ProQuest Central (Alumni Edition) ProQuest One Community College ProQuest Pharma Collection ProQuest Central ABI/INFORM Professional Advanced ProQuest Criminal Justice ProQuest Central Korea Advanced Technologies Database with Aerospace ABI/INFORM Complete (Alumni Edition) ProQuest Computing ProQuest One Social Sciences ABI/INFORM Global (Alumni Edition) ProQuest Central Basic ProQuest Computing (Alumni Edition) ProQuest Military Collection (Alumni Edition) ProQuest SciTech Collection Computer and Information Systems Abstracts Professional Advanced Technologies & Aerospace Database ProQuest Criminal Justice (Alumni) ProQuest One Business (Alumni) ProQuest Central (Alumni) Business Premium Collection (Alumni) |
| DatabaseTitleList | ProQuest Business Collection (Alumni Edition) CrossRef |
| Database_xml | – sequence: 1 dbid: BENPR name: ProQuest Central url: https://www.proquest.com/central sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 1615-5270 |
| EndPage | 38 |
| ExternalDocumentID | 10_1007_s10207_020_00490_y |
| GrantInformation_xml | – fundername: Horizon 2020 grantid: 830927 funderid: http://dx.doi.org/10.13039/501100007601 |
| GroupedDBID | -59 -5G -BR -EM -Y2 -~C .4S .86 .DC .VR 0-V 06D 0R~ 0VY 1N0 1SB 203 29J 2J2 2JN 2JY 2KG 2LR 2P1 2VQ 2~H 30V 3V. 4.4 406 408 409 40D 40E 5GY 5VS 67Z 6KP 6NX 7WY 8AO 8FE 8FG 8FL 8FW 8TC 8VB 95- 95. 95~ 96X AAAVM AABHQ AACDK AAHNG AAIAL AAJBT AAJKR AANZL AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYQN AAYTO AAYZH ABAKF ABBBX ABBXA ABDBF ABDZT ABECU ABFTD ABFTV ABHQN ABJNI ABJOX ABKCH ABKTR ABMNI ABMQK ABNWP ABQBU ABQSL ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABUWG ABWNU ABXPI ACAOD ACBXY ACDTI ACGFS ACHSB ACHXU ACKNC ACMDZ ACMLO ACOKC ACOMO ACPIV ACSNA ACUHS ACZOJ ADHHG ADHIR ADINQ ADKNI ADKPE ADMLS ADRFC ADTPH ADURQ ADYFF ADZKW AEBTG AEFQL AEGNC AEJHL AEJRE AEKMD AEMOZ AEMSY AENEX AEOHA AEPYU AESKC AETLH AEVLU AEXYK AFBBN AFGCZ AFKRA AFLOW AFQWF AFWTZ AFZKB AGAYW AGDGC AGJBK AGMZJ AGQEE AGQMX AGRTI AGWIL AGWZB AGYKE AHAVH AHBYD AHKAY AHQJS AHSBF AHYZX AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO AJZVZ AKVCP ALMA_UNASSIGNED_HOLDINGS ALSLI ALWAN AMKLP AMXSW AMYLF AMYQR AOCGG ARALO ARAPS ARCSS ARMRJ ASPBG AVWKF AXYYD AYJHY AZFZN AZQEC B-. B0M BA0 BDATZ BENPR BEZIV BGLVJ BGNMA BGRYB BPHCQ BSONS C6C CAG CCPQU COF CS3 CSCUP DDRTE DL5 DNIVK DPUIP DU5 DWQXO EAD EAP EBA EBLON EBR EBS EBU ECS EDO EIOEI EIS EJD EMK EPL ESBYG EST ESX FEDTE FERAY FFXSO FIGPU FIL FINBP FNLPD FRNLG FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNUQQ GNWQR GQ6 GQ7 GQ8 GROUPED_ABI_INFORM_COMPLETE GXS H13 HCIFZ HF~ HG5 HG6 HLICF HMJXF HQYDN HRMNR HVGLF HZ~ I-F I09 IHE IJ- IKXTQ ITM IWAJR IXC IXE IZIGR IZQ I~X I~Z J-C J0Z JBSCW JCJTX JZLTJ K1G K60 K6V K6~ K7- KDC KOV LAS LLZTM M0C M0N M0O M1Q M4Y MA- N2Q NB0 NPVJJ NQJWS NU0 O9- O93 O9J P2P P62 P9O PF0 PQBIZ PQBZA PQQKQ PROAC PT4 Q2X QOS QWB R89 R9I RNS ROL RPX RSV S16 S1Z S27 S3B SAP SCO SDH SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 TH9 TN5 TSG TSK TSV TUC TUS U2A UG4 UOJIU UTJUX UZXMN VC2 VFIZW W23 W48 WK8 YLTOR Z45 Z5O Z7R Z7X Z81 Z83 Z88 ZL0 ZMTXR ~8M ~A9 AAPKM AAYXX ABBRH ABDBE ABFSG ABRTQ ACSTC ADHKG AEZWR AFDZB AFFHD AFHIU AFOHR AGQPQ AHPBZ AHWEU AIXLP ATHPR AYFIA CITATION PHGZM PHGZT PQGLB PRQQA 7SC 7XB 8AL 8FD 8FK JQ2 K7. L.- L7M L~C L~D PKEHL PQEST PQUKI PRINS Q9U |
| ID | FETCH-LOGICAL-c406t-dbcfbf903c9e8484f6b11adb4d099ffb2da7ccaa5839cf8ed7f201764c27b1123 |
| IEDL.DBID | K7- |
| ISICitedReferencesCount | 47 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000517716000001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1615-5262 |
| IngestDate | Thu Nov 20 04:31:54 EST 2025 Sat Nov 29 02:59:45 EST 2025 Tue Nov 18 21:56:36 EST 2025 Fri Feb 21 02:37:21 EST 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 1 |
| Keywords | Data quality Threat intelligence formats Cyber threat intelligence Threat intelligence sharing Information security visualization |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c406t-dbcfbf903c9e8484f6b11adb4d099ffb2da7ccaa5839cf8ed7f201764c27b1123 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0002-4847-522X 0000-0002-0023-6051 |
| OpenAccessLink | https://link.springer.com/10.1007/s10207-020-00490-y |
| PQID | 2478666584 |
| PQPubID | 43999 |
| PageCount | 18 |
| ParticipantIDs | proquest_journals_2478666584 crossref_citationtrail_10_1007_s10207_020_00490_y crossref_primary_10_1007_s10207_020_00490_y springer_journals_10_1007_s10207_020_00490_y |
| PublicationCentury | 2000 |
| PublicationDate | 2021-02-01 |
| PublicationDateYYYYMMDD | 2021-02-01 |
| PublicationDate_xml | – month: 02 year: 2021 text: 2021-02-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationPlace | Berlin/Heidelberg |
| PublicationPlace_xml | – name: Berlin/Heidelberg – name: Heidelberg |
| PublicationTitle | International journal of information security |
| PublicationTitleAbbrev | Int. J. Inf. Secur |
| PublicationYear | 2021 |
| Publisher | Springer Berlin Heidelberg Springer Nature B.V |
| Publisher_xml | – name: Springer Berlin Heidelberg – name: Springer Nature B.V |
| References | Batini, C., Palmonari, M., Viscusi, G.: The many faces of information and their impact on information quality. In: Proceedings of the 17th International Conference in Information Quality (ICIQ 2012), pp. 212–228. MIT, Cambridge (2012) WangRYStoreyVCFirthCPA framework for analysis of data quality researchIEEE Trans. Knowl. Data Eng.19957462310.1109/69.404034 LazarJFengJHHochheiserHResearch Methods in Human–Computer Interaction2010BurlingtonMorgan Kaufmann Dandurand, L., Serrano, O.S.: Towards improved cyber security information sharing. In: 2013 5th International Conference on Cyber Conflict (CYCON 2013). IEEE Computer Society Press, Los Alamitos (2013) Sauerwein, C., Sillaber, C., Mussmann, A., Breu, R.: Threat intelligence sharing platforms: an exploratory study of software vendors and research perspectives. In: Proceedings of the 13th International Conference on Wirtschaftsinformatik, pp. 837–851. Springer, Heidelberg (2017) Piazza, R., Wunder, J., Jordan, B.: StixTM version 2.0. part 2: Stix objects (2017). https://docs.oasis-open.org/cti/ stix/v2.0/stix-v2.0-part2-stix-objects.html RiescoRVillagráVALeveraging cyber threat intelligence fora dynamic risk frameworkInt. J. Inf. Secur.20191871573910.1007/s10207-019-00433-2 JøsangAIsmailRBoydCA survey of trust and reputation systems for online service provisionDecis. Support Syst.200743261810.1016/j.dss.2005.05.019 Serrano, O., Dandurand, L., Brown, S.: On the design of a cyber security data sharing system. In: Proceedings of the 2014 ACM Workshop on Information Sharing & Collaborative Security - WISCS ’14, pp. 61–69. ACM, New York (2014) Kokulu, F.B. Soneji, A. Bao, T., Shoshitaishvili, Y., Zhao, Z., Doupé, A., Ahn G.J.: Matched and mismatched socs: a qualitative study on security operations center issues. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (Association for Computing Machinery, New York, NY, USA, 2019), CCS ’19, pp. 1955–1970. https://doi.org/10.1145/3319535.3354239 WandYWangRYAnchoring data quality dimensions in ontological foundationsCommun. ACM199639118610.1145/240455.240479 PipinoLLLeeYWWangRYData quality assessmentCommun. ACM200245421110.1145/505248.506010 MengesFPernulGA comparative analysis of incident reporting formatsComput. Secur.2018738710110.1016/j.cose.2017.10.009 Gascon, H., Grobauer, B., Schreck, T., Rist, L., Arp, D., Rieck, K.: Mining attributed graphs for threat intelligence. In: Proceedings of the 7th ACM on Conference on Data and Application Security and Privacy, pp. 15–22. ACM, New York (2017) Böhm, F., Menges, F., Pernul, G.: Graph-based visual analytics for cyber threat intelligence. Cybersecurity (Cybersecurity) 1, 1 (2018) Piazza, R., Wunder, J., Jordan, B.: StixTM version 2.0. part 1: Stix core concepts (2017). https://docs.oasis-open.org/ cti/stix/v2.0/stix-v2.0-part1-stix-core.html Ponemon Institute LLC.: Live threat intelligence impact report 2013 (2013). https://www.ponemon.org/blog/ live-threat-intelligence-impact-report-2013-1 BatiniCScannapiecoMData and Information Quality: Dimensions, Principles and Techniques2016ChamSpringer10.1007/978-3-319-24106-7 Heinrich, B. Kaiser, M. Klier, M.: How to measure data quality? A metric-based approach. In: ICIS 2007 Proceedings pp. 108–122 (2007) RingTThreat intelligence: Why people don’t shareComput. Fraud Secur.201420143510.1016/S1361-3723(14)70469-5 Sillaber, C., Sauerwein, C., Mussmann, A., Breu, R.: Data quality challenges and future research directions in threat intelligence sharing practice. In: Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security - WISCS’16, pp. 65–70. ACM, New York (2016) SkopikFSettanniGFiedlerRA problem shared is a problem halved: a survey on the dimensions of collective cyber defense through security information sharingComputers & Security20166015417610.1016/j.cose.2016.04.003 SängerJRichthammerCPernulGReusable components for online reputation systemsJ. Trust Manag.2015251 JuranJMGrynaFMJuran’s Quality Control Handbook19884New YorkMcGraw-Hill RedmanTCData Quality for the Information Age1996NorwoodArtech House Publishers Symantec Corporation.: Internet security threat report 2019 (2019). https://www.symantec.com/content/dam/ symantec/docs/reports/istr-24-2019-en.pdf Umbrich, J., Neumaier, S., Polleres, A.: Quality assessment and evolution of open data portals. In: 2015 3rd International Conference on Future Internet of Things and Cloud (FiCloud), pp. 404–411. IEEE Computer Society Press, Los Alamitos (2015) Sillaber, C., Sauerwein, C., Mussmann, A., Breu, R.: Towards a maturity model for inter-organizational cyber threat intelligence sharing: A case study of stakeholder’s expectations and willingness to share. In: Proceedings of Multikonferenz Wirtschaftsinformatik (MKWI 2018), pp. 6–9. Springer, Heidelberg (2018) BatiniCCappielloCFrancalanciCMaurinoAMethodologies for data quality assessment and improvementACM Comput. Surv.2009413110.1145/1541880.1541883 ChaturvediICambriaEWelschREHerreraFDistinguishing between facts and opinions for sentiment analysis: survey and challengesInf. Fus.2018446510.1016/j.inffus.2017.12.006 WangRYStrongDMBeyond accuracy: What data quality means to data consumersJ. Manag. Inf. Syst.1996124510.1080/07421222.1996.11518099 TounsiWRaisHA survey on technical threat intelligence in the age of sophisticated cyber attacksComput. Secur.20187221223310.1016/j.cose.2017.09.001 490_CR11 490_CR10 T Ring (490_CR4) 2014; 2014 490_CR31 490_CR30 490_CR15 J Lazar (490_CR32) 2010 F Menges (490_CR14) 2018; 73 490_CR13 490_CR12 Y Wand (490_CR19) 1996; 39 J Sänger (490_CR26) 2015; 2 RY Wang (490_CR20) 1996; 12 LL Pipino (490_CR24) 2002; 45 R Riesco (490_CR2) 2019; 18 490_CR22 C Batini (490_CR16) 2009; 41 F Skopik (490_CR17) 2016; 60 490_CR25 W Tounsi (490_CR7) 2018; 72 490_CR3 RY Wang (490_CR23) 1995; 7 490_CR29 490_CR5 490_CR6 490_CR27 C Batini (490_CR18) 2016 I Chaturvedi (490_CR28) 2018; 44 490_CR1 TC Redman (490_CR21) 1996 JM Juran (490_CR8) 1988 A Jøsang (490_CR9) 2007; 43 |
| References_xml | – reference: RiescoRVillagráVALeveraging cyber threat intelligence fora dynamic risk frameworkInt. J. Inf. Secur.20191871573910.1007/s10207-019-00433-2 – reference: Dandurand, L., Serrano, O.S.: Towards improved cyber security information sharing. In: 2013 5th International Conference on Cyber Conflict (CYCON 2013). IEEE Computer Society Press, Los Alamitos (2013) – reference: RingTThreat intelligence: Why people don’t shareComput. Fraud Secur.201420143510.1016/S1361-3723(14)70469-5 – reference: SängerJRichthammerCPernulGReusable components for online reputation systemsJ. Trust Manag.2015251 – reference: Heinrich, B. Kaiser, M. Klier, M.: How to measure data quality? A metric-based approach. In: ICIS 2007 Proceedings pp. 108–122 (2007) – reference: PipinoLLLeeYWWangRYData quality assessmentCommun. ACM200245421110.1145/505248.506010 – reference: Sauerwein, C., Sillaber, C., Mussmann, A., Breu, R.: Threat intelligence sharing platforms: an exploratory study of software vendors and research perspectives. In: Proceedings of the 13th International Conference on Wirtschaftsinformatik, pp. 837–851. Springer, Heidelberg (2017) – reference: Sillaber, C., Sauerwein, C., Mussmann, A., Breu, R.: Towards a maturity model for inter-organizational cyber threat intelligence sharing: A case study of stakeholder’s expectations and willingness to share. In: Proceedings of Multikonferenz Wirtschaftsinformatik (MKWI 2018), pp. 6–9. Springer, Heidelberg (2018) – reference: Piazza, R., Wunder, J., Jordan, B.: StixTM version 2.0. part 2: Stix objects (2017). https://docs.oasis-open.org/cti/ stix/v2.0/stix-v2.0-part2-stix-objects.html – reference: RedmanTCData Quality for the Information Age1996NorwoodArtech House Publishers – reference: Batini, C., Palmonari, M., Viscusi, G.: The many faces of information and their impact on information quality. In: Proceedings of the 17th International Conference in Information Quality (ICIQ 2012), pp. 212–228. MIT, Cambridge (2012) – reference: LazarJFengJHHochheiserHResearch Methods in Human–Computer Interaction2010BurlingtonMorgan Kaufmann – reference: WangRYStrongDMBeyond accuracy: What data quality means to data consumersJ. Manag. Inf. Syst.1996124510.1080/07421222.1996.11518099 – reference: ChaturvediICambriaEWelschREHerreraFDistinguishing between facts and opinions for sentiment analysis: survey and challengesInf. Fus.2018446510.1016/j.inffus.2017.12.006 – reference: BatiniCCappielloCFrancalanciCMaurinoAMethodologies for data quality assessment and improvementACM Comput. Surv.2009413110.1145/1541880.1541883 – reference: Sillaber, C., Sauerwein, C., Mussmann, A., Breu, R.: Data quality challenges and future research directions in threat intelligence sharing practice. In: Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security - WISCS’16, pp. 65–70. ACM, New York (2016) – reference: Böhm, F., Menges, F., Pernul, G.: Graph-based visual analytics for cyber threat intelligence. Cybersecurity (Cybersecurity) 1, 1 (2018) – reference: Ponemon Institute LLC.: Live threat intelligence impact report 2013 (2013). https://www.ponemon.org/blog/ live-threat-intelligence-impact-report-2013-1 – reference: WandYWangRYAnchoring data quality dimensions in ontological foundationsCommun. ACM199639118610.1145/240455.240479 – reference: Gascon, H., Grobauer, B., Schreck, T., Rist, L., Arp, D., Rieck, K.: Mining attributed graphs for threat intelligence. In: Proceedings of the 7th ACM on Conference on Data and Application Security and Privacy, pp. 15–22. ACM, New York (2017) – reference: SkopikFSettanniGFiedlerRA problem shared is a problem halved: a survey on the dimensions of collective cyber defense through security information sharingComputers & Security20166015417610.1016/j.cose.2016.04.003 – reference: Piazza, R., Wunder, J., Jordan, B.: StixTM version 2.0. part 1: Stix core concepts (2017). https://docs.oasis-open.org/ cti/stix/v2.0/stix-v2.0-part1-stix-core.html – reference: BatiniCScannapiecoMData and Information Quality: Dimensions, Principles and Techniques2016ChamSpringer10.1007/978-3-319-24106-7 – reference: MengesFPernulGA comparative analysis of incident reporting formatsComput. Secur.2018738710110.1016/j.cose.2017.10.009 – reference: TounsiWRaisHA survey on technical threat intelligence in the age of sophisticated cyber attacksComput. Secur.20187221223310.1016/j.cose.2017.09.001 – reference: Kokulu, F.B. Soneji, A. Bao, T., Shoshitaishvili, Y., Zhao, Z., Doupé, A., Ahn G.J.: Matched and mismatched socs: a qualitative study on security operations center issues. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (Association for Computing Machinery, New York, NY, USA, 2019), CCS ’19, pp. 1955–1970. https://doi.org/10.1145/3319535.3354239 – reference: Umbrich, J., Neumaier, S., Polleres, A.: Quality assessment and evolution of open data portals. In: 2015 3rd International Conference on Future Internet of Things and Cloud (FiCloud), pp. 404–411. IEEE Computer Society Press, Los Alamitos (2015) – reference: Serrano, O., Dandurand, L., Brown, S.: On the design of a cyber security data sharing system. In: Proceedings of the 2014 ACM Workshop on Information Sharing & Collaborative Security - WISCS ’14, pp. 61–69. ACM, New York (2014) – reference: WangRYStoreyVCFirthCPA framework for analysis of data quality researchIEEE Trans. Knowl. Data Eng.19957462310.1109/69.404034 – reference: JuranJMGrynaFMJuran’s Quality Control Handbook19884New YorkMcGraw-Hill – reference: JøsangAIsmailRBoydCA survey of trust and reputation systems for online service provisionDecis. Support Syst.200743261810.1016/j.dss.2005.05.019 – reference: Symantec Corporation.: Internet security threat report 2019 (2019). https://www.symantec.com/content/dam/ symantec/docs/reports/istr-24-2019-en.pdf – ident: 490_CR12 doi: 10.1145/3319535.3354239 – ident: 490_CR25 – ident: 490_CR6 – ident: 490_CR5 doi: 10.1145/2994539.2994546 – volume: 72 start-page: 212 year: 2018 ident: 490_CR7 publication-title: Comput. Secur. doi: 10.1016/j.cose.2017.09.001 – volume: 73 start-page: 87 year: 2018 ident: 490_CR14 publication-title: Comput. Secur. doi: 10.1016/j.cose.2017.10.009 – volume-title: Data and Information Quality: Dimensions, Principles and Techniques year: 2016 ident: 490_CR18 doi: 10.1007/978-3-319-24106-7 – volume-title: Data Quality for the Information Age year: 1996 ident: 490_CR21 – volume: 41 start-page: 1 issue: 3 year: 2009 ident: 490_CR16 publication-title: ACM Comput. Surv. doi: 10.1145/1541880.1541883 – ident: 490_CR31 – ident: 490_CR10 – ident: 490_CR3 – ident: 490_CR27 doi: 10.1145/3029806.3029811 – volume: 44 start-page: 65 year: 2018 ident: 490_CR28 publication-title: Inf. Fus. doi: 10.1016/j.inffus.2017.12.006 – ident: 490_CR1 – volume: 2 start-page: 1 issue: 5 year: 2015 ident: 490_CR26 publication-title: J. Trust Manag. – volume: 45 start-page: 211 issue: 4 year: 2002 ident: 490_CR24 publication-title: Commun. ACM doi: 10.1145/505248.506010 – volume: 2014 start-page: 5 issue: 3 year: 2014 ident: 490_CR4 publication-title: Comput. Fraud Secur. doi: 10.1016/S1361-3723(14)70469-5 – volume: 7 start-page: 623 issue: 4 year: 1995 ident: 490_CR23 publication-title: IEEE Trans. Knowl. Data Eng. doi: 10.1109/69.404034 – volume: 18 start-page: 715 year: 2019 ident: 490_CR2 publication-title: Int. J. Inf. Secur. doi: 10.1007/s10207-019-00433-2 – ident: 490_CR29 doi: 10.1186/s42400-018-0017-4 – volume-title: Juran’s Quality Control Handbook year: 1988 ident: 490_CR8 – ident: 490_CR15 – volume: 12 start-page: 5 issue: 4 year: 1996 ident: 490_CR20 publication-title: J. Manag. Inf. Syst. doi: 10.1080/07421222.1996.11518099 – ident: 490_CR22 doi: 10.1109/FiCloud.2015.82 – volume: 43 start-page: 618 issue: 2 year: 2007 ident: 490_CR9 publication-title: Decis. Support Syst. doi: 10.1016/j.dss.2005.05.019 – volume-title: Research Methods in Human–Computer Interaction year: 2010 ident: 490_CR32 – volume: 39 start-page: 86 issue: 11 year: 1996 ident: 490_CR19 publication-title: Commun. ACM doi: 10.1145/240455.240479 – volume: 60 start-page: 154 year: 2016 ident: 490_CR17 publication-title: Computers & Security doi: 10.1016/j.cose.2016.04.003 – ident: 490_CR11 doi: 10.1145/2663876.2663882 – ident: 490_CR30 – ident: 490_CR13 |
| SSID | ssj0021091 |
| Score | 2.4790418 |
| Snippet | The very raison d’être of cyber threat intelligence (CTI) is to provide meaningful knowledge about cyber security threats. The exchange and collaborative... |
| SourceID | proquest crossref springer |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 21 |
| SubjectTerms | Best interests Coding and Information Theory Collaboration Communications Engineering Computer Communication Networks Computer Science Cryptology Cybersecurity Decision analysis Evaluation Information gathering Intelligence Intelligence gathering Internet Management of Computing and Information Systems Networks Operating Systems Quality assessment Quality control Regular Contribution Security Subject specialists Subjectivity Threat evaluation Threats |
| SummonAdditionalLinks | – databaseName: SpringerLINK Contemporary 1997-Present dbid: RSV link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8NAEB60evBifWK1Sg7edKHZbLMbPIlYvFjEF72FfWJBqjSxEH-9s2nSVlFBL4GQyRJmd_J9szsPgGPkBHFsI0VwsRjCujYmwomQINQ5aZmOqFVlswne74vBILmpksKyOtq9PpIs_9QLyW7Ub6tRnwnNkg4plmEF4U54c7y9e5y5Wb7UpXezEKvRzYpplSrz_Rif4WjOMb8ci5Zo02v-7zs3YL1il8H5dDlswpIdbUGz7twQVIa8DWfX5dYgDhvIkQkmw8znVr77e10olMyfPJkMhgsFO4Np_mWxAw-9y_uLK1K1USAa0TonRmmnXNKJdGIFE8zFKgylUcwgO3ROUSM5zqPsIlfSTljDHbICHjNNOUrSaBcao5eR3YNAR4mkwhkdJx75mex2NEcnV4bIariyLQhrbaa6qjHuW108p_PqyF47KV7SUjtp0YKT2Tuv0wobv0q360lKK2vLUsq4QDcMuVQLTutJmT_-ebT9v4kfwBr1IS1l0HYbGvn4zR7Cqp7kw2x8VK7CD1VI1uo priority: 102 providerName: Springer Nature |
| Title | Measuring and visualizing cyber threat intelligence quality |
| URI | https://link.springer.com/article/10.1007/s10207-020-00490-y https://www.proquest.com/docview/2478666584 |
| Volume | 20 |
| WOSCitedRecordID | wos000517716000001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAVX databaseName: SpringerLINK Contemporary 1997-Present customDbUrl: eissn: 1615-5270 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0021091 issn: 1615-5262 databaseCode: RSV dateStart: 20010801 isFulltext: true titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22 providerName: Springer Nature |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LSwMxEB5s68GL9YnVWvbgTYPdbLrZxYOoKIK01nf1smxeWJBWbS3UX-9km7Uq6MXLwLJJCJlJ5ptJZgZgCzFBGOpAEBQWRVhDhyQykU9Q1ZlUMxlQLbJiE7zVijqduO0cbgP3rDI_E7ODWvWl9ZHvUsYjhNqoL_efX4itGmVvV10JjQKUfEp9K-dnnHwaXDbppTW4UGujwRVSFzTjQueoddJRG1fN4joZf1dMU7T544I00zsn5f_OeAHmHeL0DiYisggzurcE5byag-c29zLsNTN3IU7CS3vKG3UHNt7y3X7LscCWw0cLML3ulySe3iQmc7wCNyfH10enxJVWIBI1-JAoIY0wcT2QsY5YxEwofD9VgilEjMYIqlKOvE0biJ-kibTiBpECD5mkHFvSYBWKvX5Pr4EngzilkVEyjC0aYGmjLjkavqmPSIcLXQE_X9dEurzjtvzFUzLNmGx5kSBJMl4k4wpsf_Z5nmTd-LN1NWdA4nbgIJmufgV2chZOf_8-2vrfo23AHLXPWrKH21UoDl_f9CbMytGwO3itQYHf3degdHjcal_WMmlE2qwfZfTcUv8CabvxgPTy6vYDIv7npg |
| linkProvider | ProQuest |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1ZS8NAEB5EBX3xFuuZB33SxWa7zYGIiAdKa_Ghgm8xe2FB6tGqxB_lb3QmR6OCfeuDL4GQzcLuzM58MzsHwDZiAs8zNcmQWTQTdeOxwAYuQ1VnYyNUjRuZNpvwW63g9ja8HoPPIheGwioLmZgKav2oyEe-z4UfINRGfXn09MyoaxTdrhYtNDK2aJjkHU223uHlKdJ3h_Pzs_bJBcu7CjCFyqvPtFRW2rBaU6EJRCCsJ1031lJoBEvWSq5jH5cV1xE6KBsY7VtUkr4nFPdxJBU6QJE_IQQeBwoVrJ4MDDwqskkGHqIENPA8nifp5Kl6nJyCnPK4RVhlyU9FWKLbXxeyqZ47n_1vOzQHMzmido6zIzAPY6a7ALNFtwonF16LcHCVukNx0U7c1c5bp0f5pB_0rhKJI_v3BKCdzrcipU6Wc5oswc1IlrAM493HrlkBR9XCmAdWKy8ktCPielX5aNjHLiI5X5oKuAUdI5XXVaf2Hg9RWRGaaB_hI0ppHyUV2B3885RVFRk6er0geJRLmF5UUrsCewXLlJ__nm11-GxbMHXRvmpGzctWYw2mOYXwpEHq6zDef3k1GzCp3vqd3stmyvsO3I2alb4AWCJAVw |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1LS8NAEB5ERbz4FuszBz3pYrPdZhNERNRiqZYeFMRLzL6wILXaqsSf5q9zJk2sCnrz4CUQslnYndmZb2bnAbCJmCAIbEUxZBbDRNUGLHShz1DVucQKXeFWZc0mZLMZXl1FrRF4K3JhKKyykImZoDb3mnzku1zIEKE26stdl4dFtI5rB90HRh2k6Ka1aKcxYJGGTV_QfOvt14-R1luc104ujk5Z3mGAaVRkfWaUdspF5YqObChC4QLl-4lRwiBwck5xk0hcYlJFGKFdaI10qDBlIDSXOJKKHqD4H5NoY5Lh16pefxh7VHCTjD1EDGjsBTxP2MnT9jg5CDnldIuozNKvSnGIdL9dzmY6rzb9n3drBqZypO0dDo7GLIzYzhxMF10svFyozcPeeeYmxQ3wko7xnts9yjN9pXedKhzZvyVg7bU_FS_1Brmo6QJc_skSFmG0c9-xS-DpSpTw0BkdRISCRFIta4kGf-IjwpPKlsAvaBrrvN46tf24i4eVookPYnzEGR_EaQm2P_7pDqqN_Dp6tSB-nEueXjykfAl2CvYZfv55tuXfZ9uACeSg-KzebKzAJKfInix2fRVG-49Pdg3G9XO_3Xtcz46BBzd_zUnvNo5JaA |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Measuring+and+visualizing+cyber+threat+intelligence+quality&rft.jtitle=International+journal+of+information+security&rft.au=Schlette%2C+Daniel&rft.au=B%C3%B6hm+Fabian&rft.au=Caselli%2C+Marco&rft.au=Pernul+G%C3%BCnther&rft.date=2021-02-01&rft.pub=Springer+Nature+B.V&rft.issn=1615-5262&rft.eissn=1615-5270&rft.volume=20&rft.issue=1&rft.spage=21&rft.epage=38&rft_id=info:doi/10.1007%2Fs10207-020-00490-y&rft.externalDBID=HAS_PDF_LINK |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1615-5262&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1615-5262&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1615-5262&client=summon |