Buch, Englisch, 112 Seiten, Format (B × H): 178 mm x 254 mm, Gewicht: 417 g
Knowledge Extraction and Classification for Advanced Cyber Threat Intelligence
Buch, Englisch, 112 Seiten, Format (B × H): 178 mm x 254 mm, Gewicht: 417 g
ISBN: 978-1-032-83210-4
Verlag: CRC Press
Through detailed chapters, the book explores the process of applying semantic annotation to a specialized corpus comprising CVE prose descriptions linked to known ransomware threats. This approach not only organizes but also deeply analyzes these descriptions, uncovering patterns and vulnerabilities within ransomware operations. The book presents a pioneering methodology that integrates CVE descriptions with ATT&CK frameworks, significantly refining the granularity of threat intelligence.
The insights gained from a pattern-based analysis of vulnerability-related documentation are structured into a hierarchical model within an ontology framework, enhancing the capability for predictive operations. This model prepares cybersecurity professionals to anticipate and mitigate risks associated with new vulnerabilities as they are cataloged in the CVE list, by identifying recurrent characteristics tied to specific ransomware and related vulnerabilities.
With real-world examples, this book empowers its readers to implement these methodologies in their environments, leading to improved prediction and prevention strategies in the face of growing ransomware challenges.
Zielgruppe
Professional Practice & Development, Professional Reference, and Professional Training
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Kryptographie, Datenverschlüsselung
- Technische Wissenschaften Bauingenieurwesen Gebäudesicherheit
- Geisteswissenschaften Architektur Gestaltung, Darstellung, Bautechnik
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Schadprogramme (Viren, Trojaner etc.)
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Datensicherheit, Datenschutz
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung Netzwerksicherheit
Weitere Infos & Material
Foreword. Preface. Authors. List of Figures. List of Tables. 1. Classification and knowledge representation. 2. Cyber threat knowledge. 3. Building a ransomware knowledge base. 4. Semantic modelling and knowledge classification. 5. Conclusion. Bibliography.