Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

Practical Cyber Threat and OSINT Analysis based on Implementation of CTI Sharing Platform

Version 1 : Received: 3 May 2024 / Approved: 6 May 2024 / Online: 6 May 2024 (09:34:59 CEST)

A peer-reviewed article of this Preprint also exists.

Alzahrani, I.Y.; Lee, S.; Kim, K. Enhancing Cyber-Threat Intelligence in the Arab World: Leveraging IoC and MISP Integration. Electronics 2024, 13, 2526. Alzahrani, I.Y.; Lee, S.; Kim, K. Enhancing Cyber-Threat Intelligence in the Arab World: Leveraging IoC and MISP Integration. Electronics 2024, 13, 2526.

Abstract

Cybercrime Threat Intelligence (CTI) allows us to change our actions from reactive to proactive in the fight against threat actors, and to make more informed, data-driven security decisions. Thus this study proposes the practical implementation of CTI in the Arab world. This study focuses on strengthening CTI by integrating Indicators of Compromise (IoCs) and collecting realistic security alerts from honeypot systems and open source intelligence. The collected data is stored in the Malware Information Sharing Platform (MISP), an open source platform that allows users to create and share IoCs with other organizations while staying informed about new threats. It features an intuitive interface for data analysis and threat identification, facilitating sharing, storage, and correlation of IoCs. Therefore, we leveraged MISP to generate IoCs based on the collected data and analyzed the results to identify potential cyber threats. The implemented platform aims to provide organizations with actionable information to prevent, detect and respond to cybercrime. This study presents a practical approach to strengthening CTI in the Arab world and provides an opportunity to strengthen the region’s security posture.

Keywords

Cybercrime; Cyber investigation; Cyber Threat Intelligence; Indicator of compromised; Malware Information Sharing Platform; Intelligence Sharing Platform

Subject

Computer Science and Mathematics, Security Systems

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.