{"title":"阻止网络攻击","authors":"Clement Guitton","doi":"10.1109/CyberSecPODS.2017.8074853","DOIUrl":null,"url":null,"abstract":"The article attempts to analyse at a conceptual and practical level whether it is possible to foresee and foil cyber attacks. It argues that cyber threat intelligence is a sensitive and novel approach to doing so in that it departs from the traditional more reactive options used until now. The article posits that threat intelligence falls between strategic and practical approaches, between deterrence and technical solutions. Furthermore, the article suggests that cyber threat intelligence faces difficulties that differ from those traditionally dealt with by intelligence services. Its greatest challenge lies in the collection of precise and actionable intelligence. By contrast, the evaluation and dissemination phases of the intelligence cycle usually account for security apparatuses failing to foil upcoming plots.","PeriodicalId":203945,"journal":{"name":"2017 International Conference on Cyber Security And Protection Of Digital Services (Cyber Security)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Foiling cyber attacks\",\"authors\":\"Clement Guitton\",\"doi\":\"10.1109/CyberSecPODS.2017.8074853\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The article attempts to analyse at a conceptual and practical level whether it is possible to foresee and foil cyber attacks. It argues that cyber threat intelligence is a sensitive and novel approach to doing so in that it departs from the traditional more reactive options used until now. The article posits that threat intelligence falls between strategic and practical approaches, between deterrence and technical solutions. Furthermore, the article suggests that cyber threat intelligence faces difficulties that differ from those traditionally dealt with by intelligence services. Its greatest challenge lies in the collection of precise and actionable intelligence. By contrast, the evaluation and dissemination phases of the intelligence cycle usually account for security apparatuses failing to foil upcoming plots.\",\"PeriodicalId\":203945,\"journal\":{\"name\":\"2017 International Conference on Cyber Security And Protection Of Digital Services (Cyber Security)\",\"volume\":\"18 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 International Conference on Cyber Security And Protection Of Digital Services (Cyber Security)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CyberSecPODS.2017.8074853\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Cyber Security And Protection Of Digital Services (Cyber Security)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CyberSecPODS.2017.8074853","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The article attempts to analyse at a conceptual and practical level whether it is possible to foresee and foil cyber attacks. It argues that cyber threat intelligence is a sensitive and novel approach to doing so in that it departs from the traditional more reactive options used until now. The article posits that threat intelligence falls between strategic and practical approaches, between deterrence and technical solutions. Furthermore, the article suggests that cyber threat intelligence faces difficulties that differ from those traditionally dealt with by intelligence services. Its greatest challenge lies in the collection of precise and actionable intelligence. By contrast, the evaluation and dissemination phases of the intelligence cycle usually account for security apparatuses failing to foil upcoming plots.