Advanced Threat Intelligence Modeling for Proactive Cyber Defense Systems
Abstract
Today’s cyber threat landscape is characterized by a broad spectrum of attacks with significant impact on businesses, societies, and nations. Most of these attacks involve espionage, cybercrime, or hacktivism. The key actors are well-known: the state in many countries, organized crime groups, and a loose coalition of hacktivists, self-styled idealists, etc. In addition to espionage and cybercrime, groups seeking fame, infamy or monetary gain are also involved; this introduces a recreational motivation to the threat landscape. Recently published reports provide valuable insights into the current threat intelligence landscape as well as emerging trends. However, ever-increasing budget constraints, the omnipresence of targeted threat, scarcity of first-hand threat intelligence, trustworthiness, veracity, up-to- dateness, timeframe, and underlying data sources have created dilemmas and challenges for organizations seeking timely, rel- evant, accurate, and helpful threat intelligence. Regardless of which type of threat actors an organization faces, most defensive tactics and counter-measures are generally well known. State- of-the-art proactive approaches may even allow defenders to anticipate, predict and proactively neutralize highly sophisti- cated and destructive cyber-attacks before the attackers have finalized their preparations. Developing such proactive cyber- defence capabilities requires aligning the defence life-cycle with the attack life-cycle and utilizing threat intelligence to support the defence life-cycle functions of real-time threat assessment, prediction, simulation and scoring. The success of these functions in mitigating imminent threats hinges on the freshness, accuracy, relevance, completeness, scale, quality and explainability of the threat intelligence involved.
Letters in High Energy Physics (LHEP) is an open access journal. The articles in LHEP are distributed according to the terms of the creative commons license CC-BY 4.0. Under the terms of this license, copyright is retained by the author while use, distribution and reproduction in any medium are permitted provided proper credit is given to original authors and sources.
Terms of Submission
By submitting an article for publication in LHEP, the submitting author asserts that:
1. The article presents original contributions by the author(s) which have not been published previously in a peer-reviewed medium and are not subject to copyright protection.
2. The co-authors of the article, if any, as well as any institution whose approval is required, agree to the publication of the article in LHEP.

