Mohammed A Althamir, Jawhara Z. Boodai, Mohammad Sohel Rahman
{"title":"A Mini Literature Review on Challenges and Opportunity in Threat Intelligence","authors":"Mohammed A Althamir, Jawhara Z. Boodai, Mohammad Sohel Rahman","doi":"10.1109/ICAIIC57133.2023.10067080","DOIUrl":null,"url":null,"abstract":"Cybersecurity worldwide has become a challenge for organisations and individuals to be protected against all attacks and malware. Working closely and directly with cyber-attacks and attackers has become a challenge to be updated with all new zero-day threats and vulnerabilities. The cybersecurity teams have been facing challenges in examining the advisory tactics, techniques, and procedures (TTP) and what are Indicators of Compromise (IOCs) can be used in addressing these issues. Other than this, incorporating the most suitable cyber security framework can assist in dealing with these technological threats. A direct relationship exists between threat intelligence and artificial intelligence, which contributes to addressing technological threats and protecting the necessary assets and information. Cyberspace and other technological software highly contribute to addressing this issue.","PeriodicalId":105769,"journal":{"name":"2023 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAIIC57133.2023.10067080","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Cybersecurity worldwide has become a challenge for organisations and individuals to be protected against all attacks and malware. Working closely and directly with cyber-attacks and attackers has become a challenge to be updated with all new zero-day threats and vulnerabilities. The cybersecurity teams have been facing challenges in examining the advisory tactics, techniques, and procedures (TTP) and what are Indicators of Compromise (IOCs) can be used in addressing these issues. Other than this, incorporating the most suitable cyber security framework can assist in dealing with these technological threats. A direct relationship exists between threat intelligence and artificial intelligence, which contributes to addressing technological threats and protecting the necessary assets and information. Cyberspace and other technological software highly contribute to addressing this issue.