Graph Visualization of Cyber Threat Intelligence Data for Analysis of Cyber Attacks

dc.contributor.authorSülü, Mücahit
dc.contributor.authorDaş, Resul
dc.date.accessioned2024-08-04T19:42:49Z
dc.date.available2024-08-04T19:42:49Z
dc.date.issued2022
dc.departmentİnönü Üniversitesien_US
dc.description.abstractThreat intelligence enables us to make faster, more informed, data-backed security decisions and change their behavior from reactive to proactive in the fight against threat actors. Cyber threat intelligence sources include open-source intelligence, social media intelligence, human intelligence, technical intelligence, device log files, forensically acquired data or intelligence from the internet traffic, and data derived for the deep and dark web. In this study, graph visualization is discussed for the intelligible and accurate analysis of complex cyber threat intelligence data, including network attacks. The processes of collecting, cleaning, organizing, and visualizing cyber intelligence data in different formats and contents on a single platform are given step by step. Dynamic graphs play an active role in these systems, where the attack locations and targets from different points are constantly variable. Therefore, research on dynamic graph solutions and visualization in the visual analysis of cyberattacks is presented.en_US
dc.identifier.doi10.17694/bajece.1090145
dc.identifier.endpage306en_US
dc.identifier.issn2147-284X
dc.identifier.issue3en_US
dc.identifier.startpage300en_US
dc.identifier.trdizinid1114394en_US
dc.identifier.urihttps://doi.org/10.17694/bajece.1090145
dc.identifier.urihttps://search.trdizin.gov.tr/yayin/detay/1114394
dc.identifier.urihttps://hdl.handle.net/11616/88710
dc.identifier.volume10en_US
dc.indekslendigikaynakTR-Dizinen_US
dc.language.isoenen_US
dc.relation.ispartofBalkan Journal of Electrical and Computer Engineeringen_US
dc.relation.publicationcategoryMakale - Ulusal Hakemli Dergi - Kurum Öğretim Elemanıen_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.titleGraph Visualization of Cyber Threat Intelligence Data for Analysis of Cyber Attacksen_US
dc.typeArticleen_US

Dosyalar