Reference Hub6
A Summary of the Development of Cyber Security Threat Intelligence Sharing

A Summary of the Development of Cyber Security Threat Intelligence Sharing

Lili Du, Yaqin Fan, Lvyang Zhang, Lianying Wang, Tianhang Sun
Copyright: © 2020 |Volume: 12 |Issue: 4 |Pages: 14
ISSN: 1941-6210|EISSN: 1941-6229|EISBN13: 9781799805823|DOI: 10.4018/IJDCF.2020100105
Cite Article Cite Article

MLA

Du, Lili, et al. "A Summary of the Development of Cyber Security Threat Intelligence Sharing." IJDCF vol.12, no.4 2020: pp.54-67. http://doi.org/10.4018/IJDCF.2020100105

APA

Du, L., Fan, Y., Zhang, L., Wang, L., & Sun, T. (2020). A Summary of the Development of Cyber Security Threat Intelligence Sharing. International Journal of Digital Crime and Forensics (IJDCF), 12(4), 54-67. http://doi.org/10.4018/IJDCF.2020100105

Chicago

Du, Lili, et al. "A Summary of the Development of Cyber Security Threat Intelligence Sharing," International Journal of Digital Crime and Forensics (IJDCF) 12, no.4: 54-67. http://doi.org/10.4018/IJDCF.2020100105

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

In recent years, the sharing of cybersecurity threat intelligence (hereinafter referred to as threat intelligence) has received increasing attention from national network security management organizations and network security enterprises. Academia and industry have conducted research on threat intelligence analysis and sharing. This paper first introduces the value and significance of threat intelligence. Then it introduces the commonly used threat intelligence analysis model. Then it organizes and classifies the threat intelligence sharing norms and threat intelligence vendors. Then it starts from the main problems faced by threat intelligence sharing. A solution to build regional network security capabilities is presented; finally, the future research direction of threat intelligence sharing is explored.