Analysis and Implementation of Threat Agents Profiles in Semi-Automated Manner for a Network Traffic in Real-Time Information Environment
Situation Awareness
Information assurance
Information security management
Threat
DOI:
10.3390/electronics10151849
Publication Date:
2021-08-01T21:51:07Z
AUTHORS (5)
ABSTRACT
Threat assessment is the continuous process of monitoring threats identified in network real-time informational environment an organisation and business companies. The sagacity security assurance for system company’s seem to need that information exercise unambiguously effectively handle threat agent’s attacks. How this unambiguous effective way present-day state practice working? Given prevalence modern environment, it essential guarantee national infrastructure. However, existing models methodology are not addressing attributes like motivation, opportunity, capability (C, M, O), critical intelligence (CTI) feed agents during penetration ineffective, due which arises This paper proposes a semi-automatic model, can deal with situational awareness data, strategies prevailing activities, protocols specific types next environment. looks over analyses implements traffic one particular To achieve this, we determined various unique from Packet Capture Application Programming Interface (PCAP files/DataStream) collected between years 2012 2019. We used hypothetical real-world examples agent evaluate three different factors agents, i.e., Motivation, Opportunity, Capability (M, O, C). Based on also designed profiles, (CTI), complexity addressed or covered taxonomies methodologies.
SUPPLEMENTAL MATERIAL
Coming soon ....
REFERENCES (33)
CITATIONS (14)
EXTERNAL LINKS
PlumX Metrics
RECOMMENDATIONS
FAIR ASSESSMENT
Coming soon ....
JUPYTER LAB
Coming soon ....