Zacharis, A., Katos, V. and Patsakis, C., 2024. Integrating AI-driven threat intelligence and forecasting in the cyber security exercise content generation lifecycle. International Journal of Information Security, 23, 2691-2710.
Full text available as:
|
PDF (OPEN ACCESS ARTICLE)
s10207-024-00860-w.pdf - Published Version Available under License Creative Commons Attribution. 1MB | |
PDF (OPEN ACCESS ARTICLE)
s10207-024-00860-w.pdf - Published Version Restricted to Repository staff only Available under License Creative Commons Attribution. 1MB | ||
Copyright to original material in this document is with the original owner(s). Access to this content through BURO is granted on condition that you use it only for research, scholarly or other non-commercial purposes. If you wish to use it for any other purposes, you must contact BU via BURO@bournemouth.ac.uk. Any third party copyright material in this document remains the property of its respective owner(s). BU grants no licence for further use of that third party material. |
DOI: 10.1007/s10207-024-00860-w
Abstract
The escalating complexity and impact of cyber threats require organisations to rehearse responses to cyber-attacks by routinely conducting cyber security exercises. However, the effectiveness of these exercises is limited by the exercise planners’ ability to replicate real-world scenarios in a timely manner that is, most importantly, tailored to the training audience and sector impacted. To address this issue, we propose the integration of AI-driven sectorial threat intelligence and forecasting to identify emerging and relevant threats and anticipate their impact in different industries. By incorporating such automated analysis and forecasting into the design of cyber security exercises, organisations can simulate real-world scenarios more accurately and assess their ability to respond to emerging threats. Fundamentally, our approach enhances the effectiveness of cyber security exercises by tailoring the scenarios to reflect the threats that are more relevant and imminent to the sector of the targeted organisation, thereby enhancing its preparedness for cyber attacks. To assess the efficacy of our forecasting methodology, we conducted a survey with domain experts and report their feedback and evaluation of the proposed methodology.
Item Type: | Article |
---|---|
ISSN: | 1615-5262 |
Uncontrolled Keywords: | Cyber security exercise scenarios; Machine learning; Threat intelligence; Threat forecasting |
Group: | Faculty of Science & Technology |
ID Code: | 39831 |
Deposited By: | Symplectic RT2 |
Deposited On: | 15 May 2024 12:14 |
Last Modified: | 06 Aug 2024 12:08 |
Downloads
Downloads per month over past year
Repository Staff Only - |