ANALYSIS OF THREAT INTELLIGENCE SYSTEMS
https://doi.org/10.53360/2788-7995-2024-4(16)-7
Abstract
Threat Intelligence (TI) is information about current or emerging threats to information security that is used to enhance the protection of organizations. TI systems collect and analyze data from various sources, including open sources, closed sources, as well as data obtained from partners and clients. Analysis of TI systems is the process of evaluating the effectiveness of these systems in data collection and analysis, as well as in providing useful information for decision-making in the field of information security. In the modern digital world, where information security threats are becoming increasingly complex and sophisticated, the analysis of Threat Intelligence (TI) systems is becoming crucial for ensuring the security of information resources. Threat Intelligence is the process of collecting, analyzing, and interpreting data on information security threats aimed at identifying threats to information security. In this context, the analysis of TI systems serves as an important tool for effectively understanding threats and taking measures to prevent them. This article is dedicated to examining the features, advantages, and disadvantages of Threat Intelligence system analysis. For example, TI analysis can be used to evaluate the effectiveness of an intrusion detection system. (IDS). Analysis can identify which types of attacks an IDS can detect and which it cannot. Based on the analysis results, a decision can be made regarding the need to upgrade the IDS system or to add additional protective measures.
About the Authors
T. M. MehdiyevKazakhstan
Turaj Mehmanogly Mehdiyev – 2st year master’s degree; specialty of information security
010000, Republic of Kazakhstan, Astana, Satpayev Str., 2
A. K. Shaykhanova
Kazakhstan
Aigul Kairulayevna Shaykhanova – professor of the department of Information Security
010000, Republic of Kazakhstan, Astana, Satpayev Str., 2
G. B. Bekeshova
Kazakhstan
Gulvira Baurzhanovna Bekeshova – Senior Lecturer
010000, Republic of Kazakhstan, Astana, Satpayev Str., 2
References
1. M. Lee Cyber Threat Intelligence / M. Lee; Wiley, 2023. – 304 r. (In English).
2. Ozkaya E. Practical Cyber Threat Intelligence: Gather, Process, and Analyze Threat Actor Motives, Targets, and Attacks with Cyber Intelligence Practices / E. Ozkaya, 2022. (In English).
3. Moore R.O. III Cyber Intelligence-Driven Risk / R.O. Moore; Wiley, 2020. – 192 r. (In English).
4. Cyber A.R. Threat Intelligence / A.R. Cyber; Apress, 2021. – 207 r. (In English).
5. Hunting V.T. Cyber Criminals / V.T. Hunting; Wiley, 2020 . – 58 r. (In English).
6. Cloutier M. OSINT for Cybersecurity / M. Cloutier; Draft2digital, 2023. (In English).
7. Anomali Threat Intelligence Platform // URL: https://www.anti-malware.ru/products/anomalithreat-intelligence-platform (data obrashcheniya: 04.03.2023). (In Russian).
8. Obzor rynka platform i servisov kiberrazvedki (Threat Intelligence) v Rossii i v mire // URL: https://www.anti-malware.ru/analytics/Market_Analysis/Threat-Intelligence (data obrashcheniya: 01.03.2023). (In Russian).
9. Kratkii analiz rynka Threat Intelligence Platforms // URL: https://blog.volgablob.ru/?p=1842 (data obrashcheniya: 08.12.2023). (In Russian).
10. Skillicorn D.B. Uwe Glässer Open Source Intelligence and Cyber Crime / D.B. Skillicorn, M.A. Tayebi; Springer International Publishing, 2020. – 251 r. (In English).
11. Martinez R. Incident Response with Threat Intelligence / R. Martinez; Packt Publishing, 2022. – 468 r. (In English).
12. Bou-Harb E. Cyber Threat Intelligence for the Internet of Things / E. Bou-Harb, N. Neshenko; Springer International Publishing, 2020. – 89 r. (In English).
Review
For citations:
Mehdiyev T.M., Shaykhanova A.K., Bekeshova G.B. ANALYSIS OF THREAT INTELLIGENCE SYSTEMS. Bulletin of Shakarim University. Technical Sciences. 2024;1(4(16)):49-57. (In Russ.) https://doi.org/10.53360/2788-7995-2024-4(16)-7