2021 IEEE International Conference on Cyber Security and Resilience

Full Program

Summary:

Considering the diverse nature of connected and automated vehicles and the amount of data they collect process and exchange they attract malicious activities that jeopardize security and safety aspects. Therefore the successful confrontation of such activities is crucial. When detecting such activities information about the incoming threat is collected and analyzed during and after the incident. Organizations and security experts use cyber threat intelligence to organize such information. Considering that threats can be related to each other it is important to provide the security experts with tools that would help them identify and attribute the threats. Towards this direction in this paper we present a tool that automatically matches cyber threat intelligence reports based on cluster analysis. Through this tool the security experts can correlate an incoming attack with previously reported ones and follow similar techniques to analyze it aiming to speed up the attack attribution process.

Author(s):

George E. Raptis    
Industrial Systems Institute, ATHENA RC
Greece

Christina Katsini    
Industrial Systems Institute, ATHENA RC
Greece

Christos Alexakos    
Industrial Systems Institute, ATHENA RC
Greece

 


Copyright © 2021 SUMMIT-TEC GROUP LTD