Sensors 23 07273
Sensors 23 07273
Review
A Systematic Literature Review on Cyber Threat Intelligence
for Organizational Cybersecurity Resilience
Saqib Saeed 1, * , Sarah A. Suayyid 2 , Manal S. Al-Ghamdi 2 , Hayfa Al-Muhaisen 2
and Abdullah M. Almuhaideb 3
1 SAUDI ARAMCO Cybersecurity Chair, Department of Computer Information Systems, College of Computer
Science and Information Technology, Imam Abdulrahman Bin Faisal University, P.O. Box 1982,
Dammam 31441, Saudi Arabia
2 Department of Computer Information Systems, College of Computer Science and Information Technology,
Imam Abdulrahman Bin Faisal University, P.O. Box 1982, Dammam 31441, Saudi Arabia;
2230500091@iau.edu.sa (H.A.-M.)
3 SAUDI ARAMCO Cybersecurity Chair, Department of Networks and Communications, College of Computer
Science and Information Technology, Imam Abdulrahman Bin Faisal University, P.O. Box 1982,
Dammam 31441, Saudi Arabia
* Correspondence: sbsaed@iau.edu.sa
identification and analysis of cyber threats. However, subscribing to different threat intelli-
gence sources can lead to information overload. A Threat Intelligence-Sharing Platform
(TISP) can take cyber threat information data and turn it into actionable intelligence that can
be fed into multiple technologies to help in incident response. Information security firms
and the ecosystem currently offer TISP solutions in two categories: content aggregation,
which provides numerous threat data feeds, and threat intelligence management, which
generates economic value from the data obtained [4].
CTI is a process of gathering, analyzing, and distributing information to identify,
monitor, and anticipate cyber threats. CTI can help businesses become more proactive in
cybersecurity by identifying vulnerabilities before attackers exploit them [5]. For example,
suppose a particular threat actor has been known to target companies using a specific
malware or attack method. In this case, CTI could help to identify this pattern early on
so that intrusion detection systems can be assigned to look for those patterns specifically.
CTI also plays an essential role in detecting attacks by setting intrusion detection systems
based on practices associated with certain threat actors or types of attacks identified by
analyzing gathered intelligence data. Furthermore, CTI provides specific security plans
tailored toward countering the mannerisms used by cyber threat actors, making it an
essential tool for organizations looking at preventing, detecting, and responding effectively
against potential cyber-attacks [2].
As a response to the benefits it provides and the present market trend, CTI has attracted
the attention of most organizations. Consequently, CTI alters the organization’s processes
and actions as it faces various issues [6,7]. Therefore, the current research will document
state-of-the-art cyber threat intelligence. We have conducted a systematic literature review
based on the scientific literature published in the last five years to highlight how evolving
procedures and technology have helped organizations to improve the cybersecurity of
their critical infrastructures by improving CTI. Based on the review, we have outlined a
layered CTI framework for organizations to improve their cybersecurity resilience. This
model provides a starting point for other researchers to deploy and test applications in
organizations to improve their CTI.
This paper’s structure is as follows: Section 2 defines the procedures for selecting pri-
mary studies for systematic analysis. Section 3 explains the results of all of the designated
significant research. Section 4 considers the findings in connection to the previously indi-
cated research subjects. Section 5 concludes the analysis and makes some recommendations
for further study.
From the first database keyword searches, we identified 294 research works, of which
eight were duplicates. After we checked the title and keywords on each paper under the
Sensors 2023, 23, 7273 3 of 27
inclusion/exclusion criteria, we found that 70 papers were not journal or conference pub-
lications. Also, 153 papers could not be retrieved. As a result, the number of papers avail-
able to review was left at 63. After reading the 63 articles in full and using the inclusion/ex-
publications. Also,
clusion criteria, we153 papers
settled could
on 52 notfor
papers be inclusion
retrieved.inAs oura result,
study. To theverify
number thatofextracted
papers
available to review was left at 63. After reading the 63 articles in
data passed an assessment of quality, they underwent a test to assess that the data were full and using the
inclusion/exclusion criteria, we settled on 52 papers for inclusion
complete and relevant, and subsequently, this assessment to determine the accuracy ofin our study. To verify
that
the extracted
information data passed in
included anthese
assessment
studies.ofThe
quality,
processtheyof underwent
identifying the a test to assess
extracted that
studies
the data were complete and relevant, and subsequently, this assessment
went through several stages to have a group of papers that passed the following quality to determine
the accuracy stages.
assessment of the information included in these studies. The process of identifying the
extracted studies went through several stages to have a group of papers that passed the
● Stage
following 1: Theassessment
quality manuscriptstages.
must be published in peer-reviewed journals or conference
proceedings. Poster presentations, books, and blogs were left out due to quality
• Stage 1: The manuscript must be published in peer-reviewed journals or conference
concerns.
● proceedings.
Stage 2: ThePoster
paperpresentations,
must be focusedbooks,onand
theblogs
CTI were
domain left that
out due to quality
impacts concerns.
organizations’
• Stage 2: The
performance. paper must be focused on the CTI domain that impacts organizations’
● performance.
Stage 3: The paper must be a case study, system application, or modeling
• Stage 3: The paper must be a case study, system application, or modeling implementation.
implementation.
AAquality
qualityevaluation
evaluationchecklist
checklistwas
wasused
usedtotoevaluate
evaluate the thepapers
papers that
thatwere
werefound.
found.
Eleven
Eleven studies were excluded from the analysis, because they did not meet thechecklist
studies were excluded from the analysis, because they did not meet the checklist
elements’
elements’criteria.
criteria.The
Theinformation
informationand anddata
dataextracted
extractedfromfromeacheachpaper
paperwerewerestored
storedininaa
table
table containing important information for the classification of each paper. Figure11shows
containing important information for the classification of each paper. Figure shows
the distribution of the publication year of the paper. In contrast, Figure
the distribution of the publication year of the paper. In contrast, Figure 2 presents the total 2 presents the
total number of accepted articles that went through the review process,
number of accepted articles that went through the review process, starting from the selec- starting from the
selection of keywords in the selected databases to
tion of keywords in the selected databases to the last stage. the last stage.
19
13
6 6
Figure1.1.Annual
Figure Annualtotal
totalofoforiginal
originalresearch
researcharticles.
articles.
Sensors 2023, 23, x FOR PEER REVIEW 4 of 24
Sensors 2023, 23, 7273 4 of 27
yields excellent accuracy rates of 96 percent accuracy, 96.4 percent precision, 95.58 percent
recall, and 95.75 percent F1 measure (which combines precision and recall) [14].
Finding and deriving threat actions from unstructured CTI information is a difficult
task. The current methods rely on semantic dependency and ontology, but they have
limitations in accurately extracting all key threat actions and measuring their information
content. Zhang et al. [15] proposed a new approach called EX-Action to address this issue.
It is a multimodal learning approach that uses mutual information and natural language
processing (NLP) methods to classify threat actions from unstructured CTI records. The
framework consists of two main steps: 1. Threat actions are extracted by matching syntactic
rules based on the sentence structure in the CTI report. 2. Extracted threats are identified
using multimodal learning algorithms. Normalized mutual information (NMI) is used
as an evaluation indicator to evaluate the completeness of extracted information content.
The proposed method was tested on 243 unstructured CTI reports, with excellent accuracy
reaching 79 percent [15].
In addition, the significance of cyber-physical systems is critical in developing a
maintainable computing ecosystem for scalable and secure network design. Cha et al. [16]
proposed a methodology that involved collecting data from network devices, extracting
meaningful information such as file hash values and IP addresses, and distributing this
information with a centralized institution called a cloud server (CS) to build a credible
dataset. Duplicate data generated by multiple feeds were removed when the authors
created their datasets. Blockchain technology was used to protect the integrity of CS’s
centralized data and rewarded companies that contributed to creating trustworthy datasets.
This system reduced network load while ensuring reliability, privacy, scalability, and
sustainability for large-scale IoT systems that generate big data communication efficiently.
In confined test settings, employing the IP addresses of open-source intelligence CTI feeds
saved roughly 15% of storage space relative to total network resources [16].
Gong and Lee [17] proposed a framework intended to assist enterprises in real-time
detection, analysis, and response to cyber threats and reduce the effect of cyber-attacks
on business operations. The framework was comprised of four stages: threat intelligence
collection, threat analysis and triage, incident response planning, and execution. The
research provides a complete account of each step and discusses the tools and techniques
that can be used to implement them. Furthermore, the study’s authors conducted several
evaluation experiments on the effectiveness of the proposed framework in detecting and
responding to cyber threats in an energy cloud platform. The results showed that the
framework could detect and respond to cyber threats in real time and significantly reduce
the time taken to detect and mitigate cyber-attacks. Overall, the CTI framework proposed
in this study offers a comprehensive approach to incident response in an energy cloud
platform. The framework can assist firms in proactively detecting and responding to
cyber-attacks, lowering the risk of disruption to their operations, and improving the
overall security posture of the energy cloud platform. The study also highlights several
challenges related to CTI. One of the main challenges is the difficulty in obtaining high-
quality intelligence relevant to the organization’s specific needs. Developing artificial
intelligence requires significant resources and expertise to collect, analyze, and validate
intelligence data. Another challenge is the lack of standardization in intelligence collection,
analysis, and sharing, which makes it difficult to compare and evaluate intelligence from
different sources. Additionally, the study highlights the need for organizations to balance
the benefits of sharing intelligence with the risks of sharing sensitive information with third
parties. Finally, the fast speed of technological progress and the changing character of cyber
threats mean that organizations must continually adapt and update their CTI strategies to
stay ahead of the threats [17].
Ejaz et al. [18] explored the applications of machine learning (ML) in visualizing
patterns in CTI data to improve cybersecurity. The study highlights the importance of
CTI in protecting organizations against cyber threats and using ML techniques to analyze
and visualize large volumes of CTI data. Organizations can take proactive measures to
Sensors 2023, 23, 7273 6 of 27
protect their systems from potential attacks by identifying patterns in the data. The article
also identified several challenges related to CTI, including the complexity and volume of
data, the lack of standardization in data collection and sharing, and the need for skilled
personnel to analyze and interpret the data. The study suggests that addressing these
issues could enhance the effectiveness of CTI and cybersecurity measures. Overall, the
article focuses on the potential of ML techniques to improve the visualization and analysis
of CTI data and strengthen cybersecurity measures in organizations. There are several
challenges related to CTI, including the fact that the quality of the data used to generate
CTI can vary widely. Incomplete or inaccurate data can lead to flawed threat assessments
and ineffective security measures. Additionally, information overload, or the volume
of data related to cybersecurity threats, can be overwhelming, creating difficulties for
organizations in identifying and prioritizing the most relevant threats. Also, practical
CTI requires specialized skills and knowledge, which can be difficult for organizations to
acquire and maintain. Collaboration and information sharing about cyber threats across
organizations can be challenging, as it requires trust and cooperation between different
entities. Building and maintaining a robust CTI capability can be expensive, particularly
for smaller organizations with limited resources [18].
Mendez Mena and Yang [19] developed a framework for decentralized threat intel-
ligence that can be applied to traditional networks and the Internet of Things (IoT). The
authors argue that traditional centralized threat intelligence approaches are insufficient for
the rapidly evolving threat landscape and the growing number of connected IoT devices.
The proposed framework includes several components: distributed threat data collection
and analysis, decentralized threat intelligence sharing, and autonomous threat response.
The article discusses the advantages of a decentralized approach to threat intelligence,
including improved scalability, resiliency, and privacy. The authors also highlight the
challenges that must be addressed, such as ensuring trust and consensus among distributed
nodes and addressing potential performance bottlenecks. Overall, the article provides a
comprehensive overview of the proposed framework for decentralized threat intelligence
and its potential applications in securing networks and IoT devices [19].
Liu et al. [20] highlighted how current threat intelligence systems rely heavily on
manual analysis, which is time-consuming and prone to errors. Therefore, they proposed a
machine-learning-based system that automatically identifies relevant threat intelligence
and provides actionable insights. The proposed approach, TriCTI, uses a combination of
neural networks and trigger detection algorithms to identify patterns in threat intelligence
data. The system was trained on a large dataset of CTI reports and could automatically
extract relevant indicators of compromise (IOCs) and identify potential threat actors. The
authors evaluate TriCTI’s performance on several datasets and compare it to other state-
of-the-art threat intelligence systems. They show that TriCTI outperforms other systems
regarding precision and recall, indicating that it can effectively identify relevant threat
intelligence. The article also discusses the potential applications of TriCTI in cybersecurity
operations, such as incident response and threat hunting. The authors argue that TriCTI can
significantly reduce the time and effort required to identify and respond to cyber threats.
Overall, the article presents a comprehensive overview of TriCTI, a machine-learning-based
system for CTI discovery [20].
Kiwia et al. [21] presented a taxonomy for banking trojans based on the cyber kill
chain model, a framework used to describe the stages of a cyber-attack. The taxonomy
structures the characteristics and behavior of banking trojans and develops more effective
countermeasures. The authors use an evolutionary computational intelligence approach
to identify the standard features and behavior of banking trojans and cluster them into
different categories based on the stages of the cyber kill chain. The resulting taxonomy is
comprised of six categories: intelligence gathering, weaponization, delivery, exploitation,
installation, and command and control. The study also analyzes the characteristics and
behavior of each category of a banking trojan, including the techniques they use to evade
detection and spread, the types of information they target, and the impact they can have
Sensors 2023, 23, 7273 7 of 27
on the victims. The authors argue that understanding the behavior and characteristics of
banking trojans is crucial for developing effective countermeasures to protect against these
types of attacks. Overall, this study provides a valuable framework for understanding
the behavior and characteristics of banking trojans and highlights the need for ongoing
research and development of countermeasures to protect against these attacks [21].
Gong and Lee [22] presented the BLOCIS framework, which addresses the limitations
of existing CTI-sharing systems, such as the vulnerability to Sybil attacks and the lack of
privacy and accountability. The authors use a combination of blockchain technology and
game theory to create a decentralized and trustless system for sharing CTI. The system
allows participants to contribute threat intelligence anonymously while ensuring that other
participants validate and verify the information before being added to the blockchain. The
study also provides a detailed analysis of the BLOCIS framework, including its architecture,
algorithms, and protocols. The authors evaluate the framework’s effectiveness using simu-
lation experiments and compare it to existing CTI-sharing systems. The study results show
that the BLOCIS framework effectively prevents Sybil attacks and ensures participants’
privacy and accountability. The authors conclude that the BLOCIS framework can improve
the effectiveness and efficiency of CTI sharing and enhance the overall security of the digital
ecosystem. This study proposes a novel blockchain-based framework for sharing CTI in
a Sybil-resistant manner, providing enhanced privacy and accountability. The BLOCIS
framework could revolutionize the field of CTI sharing and contribute to a more secure
digital ecosystem [22].
Borges Amaro et al. [23] designed a framework to address the challenges of managing
the increasing amount of data generated by cyber threats and to provide organizations
with a structured approach to making sense of the information. The proposed framework
is comprised of six stages: data collection, data processing, data analysis, threat intelligence
production, dissemination, and consumption. The study also discusses the various tools
and techniques that can be used to implement each stage of the framework. Furthermore,
the study emphasizes the importance of visualizing CTI data to aid in decision making
and recommends the use of interactive dashboards and heat maps. The proposed method-
ological framework provides a comprehensive and structured approach to managing and
utilizing CTI data for effective organizational decision making [23].
Al-Fawa’reh et al. [24] proposed a PCADNN model that combines principal com-
ponent analysis (PCA) and deep neural network (DNN) algorithms to analyze network
traffic data and detect anomalous behavior. The PCA algorithm was used to reduce the
dimensionality of the input data, and the DNN algorithm was used to classify the data
and identify abnormal patterns. The study’s authors conducted several experiments to
evaluate the effectiveness of the proposed approach. The results showed that the PCADNN
model could accurately detect anomalous network behavior with high precision and recall.
Overall, the PCADNN model presented in this study provides a powerful tool for detecting
cyber threats and improving organizations’ overall security posture. The method uses
deep-learning algorithms to examine network activity data and find aberrant patterns,
allowing enterprises to identify and react to cyber-attacks [24] rapidly.
In another study, Sun et al. [25] developed a technique based on automated intelligence
production for cyber threat records using multi-source information fusion. The proposed
approach integrates different data types, such as network traffic, system logs, and external
threat intelligence feeds, to generate more comprehensive and accurate threat intelligence
records. To show the viability of the suggested strategy, the authors created a prototype
system. The study’s findings demonstrate that the technique may provide reliable threat
intelligence records and boost the effectiveness of threat intelligence analysis. CTI has access
to a wide range of data sources, including social media, the dark web, and open-source
information, and it can analyze and keep track of these to gain vital insights regarding
future cyber-attacks and their techniques. It enables businesses to actively reduce risks and
safeguard their resources, systems, and networks. Moreover, CTI can provide situational
awareness by informing organizations about emerging cyber threats and trends. It enables
Sensors 2023, 23, 7273 8 of 27
organizations to stay ahead of cyber attackers and respond more effectively to potential
cyber incidents. The main challenges related to CTI include data quality, data overload,
lack of standardization, and skill shortages. Thus, it can be challenging for organizations
to build and maintain a CTI capability in-house. Implementing CTI can be expensive,
particularly for smaller organizations with limited resources, which can make it difficult
for them to justify the investment in CTI [25].
Serketzis et al. [26] highlighted organizations’ need for an effective incident response
plan to deal with potential cyber-attacks. The authors also provide insights into how digital
forensics can detect and investigate cyber-attacks and how actionable threat intelligence can
improve the accuracy and speed of digital forensics investigations. The paper highlights
the challenges faced by organizations in collecting and analyzing threat intelligence and
provides recommendations for overcoming these challenges to achieve practical digital
forensics measures [26].
Raptis et al. [27] highlighted that Connected and Autonomous Vehicles (CAVs) are
becoming increasingly common, and thus cyber-attacks targeting them are also increasing.
The authors developed a machine-learning-based framework called CAVeCTIR to address
this issue. This framework utilizes natural language processing techniques and semantic
analysis to match CTIRs with high accuracy. CAVeCTIR also includes a new feature
selection method called “Minimum Redundancy Maximum Relevance” to select the most
relevant features for matching CTIRs. The authors evaluated the performance of CAVeCTIR
using a dataset of real-world CTIRs and compared it with two existing methods. The results
showed that CAVeCTIR outperformed the current techniques, achieving an accuracy of
87.67%. The authors also conducted a sensitivity analysis and demonstrated the robustness
of CAVeCTIR against different parameter settings. In conclusion, CAVeCTIR provides an
effective solution for matching CTIRs related to CAVs, which can improve threat detection
and response in the CAV ecosystem. The research shows the promise of machine-learning-
based techniques to solve cybersecurity concerns in developing technology [27].
In another study, Alsaedi et al. [28] enhanced the accuracy of identifying harmful
Uniform Resource Locators (URLs) by creating a detection model that uses CTI and two-
stage ensemble learning. The model utilizes attributes extracted from internet searches and
features based on CTI to enhance detection performance. The model proposed in this study
demonstrates better results than other detection models, with an accuracy improvement of
7.8% and a reduction of 6.7% in false-positive rates compared to conventional URL-based
models [28]. On the other hand, Van Haastrecht [29] highlighted that sharing platforms
like the Malware Information Sharing Platform (MISP) could be helpful for SMEs if the
shared intelligence is actionable. Therefore, a prototype application was developed to
process MISP data, prioritize cybersecurity threats for SMEs, and provide customized
recommendations. Further evaluations will refine the application and help SMEs to defend
themselves against cyber-attacks more effectively [29]. Zhang et al. [30] proposed a solution
called the CTI Automated Assessment Model (TIAM). TIAM evaluates sparsely populated
threat intelligence from multiple perspectives. It utilizes automatic classification through
feature extraction and integrates Adversarial Tactics, Techniques, and Common Knowledge
(ATT&CK) to recognize attack methods linked with an Indicator of Compromise or IOC.
The experiment demonstrates that TIAM could assess threat intelligence more efficiently,
offering security managers valuable CTI [30].
In a study by Mishra et al. [31], anomalies in IoT networks were detected using
message queuing telemetry transport (MQTT) and machine-learning algorithms, with
a dataset of 4998 records and 34 features. Among the various classifiers employed, the
random forest classifier demonstrated the highest level of accuracy at 99.94% [31].
The importance of sharing and promptly acting on high-quality CTI with the appro-
priate stakeholders is vital. To achieve this, Chatziamanetoglou and Rantos [32] proposed a
blockchain-based system architecture for CTI that captures, evaluates, stores, and shares
CTI while assessing its quality against predefined standards. The suggested system chooses
validators and rates CTI inputs using a reputation- and trust-based method. The data are
Sensors 2023, 23, 7273 9 of 27
stored in a secure ledger that includes objective evaluation and validator performance and
can be used to assess the reputation of CTI sources. The system’s dependability, consis-
tency, and resistance to malicious activities were evaluated through a theoretical analysis
using a probabilistic simulation, demonstrating an acceptable tolerance against malicious
validators [32].
To overcome network security challenges, Li et al. [33] proposed an automatic CTI
analysis method called K-CTIAA, which utilizes pre-trained models and knowledge graphs
to identify threat actions from unstructured CTI data. K-CTIAA lessens the negative
impacts of knowledge insertion, maps associated countermeasures using digital artifacts,
and adds related knowledge in knowledge graphs to the corresponding place in CTI. In
testing, K-CTIAA achieved an F1 score of 0.941 [33].
Sharing and exchanging CTI through blockchain technology can enhance protection
measures, but existing models are susceptible to attacks and false reporting. Zhang et al. [34]
proposed a novel blockchain-based CTI paradigm that integrates consortium blockchain
and distributed reputation management systems for automated analysis and reaction to
threat intelligence to overcome these problems. “Proof-of-Reputation” (PoR) consensus, a
novel consensus method, satisfies the demand for a high transaction rate while establishing
a reputation model for reliable network consensus. Experimental testing of the suggested
model and consensus process revealed that it is safe and effective [34].
Data quantities have increased even more because of the proliferation of security de-
vices and the growing complexity of information technology, causing difficulties for digital
forensics and information security regulations. To solve this, Serketzis et al. [35] introduced
the Digital Forensic Readiness (DFR) paradigm, which previously separated the concepts
of forensic preparation and CTI. The model, which has good accuracy, precision, and recall
rates and requires less data for analysis by researchers, is evaluated through experiments.
The study indicates the value of integrating CTI and digital forensics procedures, offering a
productive way to enhance operational DFR [35]. In addition, we have summarized the
main contributions of each study. Table 1 summarizes the primary information from all
papers relevant to detection model.
Ref. Publication
Main Contribution Technology/Method Source of Data
No. Year
The paper develops a model based on statistical
characteristics to detect DGA-based traffic and Random forest DNS query logs from a
[12] 2022
explores the application of artificial algorithm (ML) campus network
intelligence/machine learning (AI/ML) in CTI.
Gradient-weighted Class
Activation Mapping
The authors suggest a unique multimodal
Convolutional Neural
classification method based on understandable Dark web onion service
[13] 2022 Network with a trained
deep learning that categorizes onion services images and texts
word-embedding
depending on their picture and text content.
algorithm with additive
attention from Bahdanau
The paper describes how unstructured CTI data
may be used to gather cyber threat intelligence.
The authors developed a novel model called
Unstructured cyber
“Attack2vec” that outperforms other models. The Novel Attack2vec
[14] 2022 threat intelligence
detailed feature set used in the model TTP tools, embedding model
reports
target company, virus, and application are all
included. The usage of a comprehensive feature set
improves classification outcomes.
Sensors 2023, 23, 7273 10 of 27
Table 1. Cont.
Ref. Publication
Main Contribution Technology/Method Source of Data
No. Year
In the research, an EX-Action framework for
automatically extracting threat actions from natural
language processing (NLP) technologies and a
multimodal learning algorithm for creating CTI
reports are developed. Utilizing a measure, the
CTI reports consisting
extracted activities were assessed for information NLP and multimodal
[15] 2021 of sentences with
completeness. The efficiency of the framework is learning algorithms
complex structure
compared to that of two state-of-the-art action
extraction methods in terms of precision, recall,
accuracy, and F1 score. In order to better defend
against network threats, intelligence-based active
defense sharing was improved.
The authors propose a blockchain-based
intelligence on cyber threat system architecture for
long-term computing to handle dependability,
confidentiality, scalability, and sustainability
challenges in collecting and analyzing data to
IP information,
identify potential threats. The model was proposed
NLP and multimodal domains, URLs,
[16] 2020 to work with multiple feeds, provide a trustworthy
learning algorithms network artifacts,
dataset, minimize network congestion, and
and aggregation
stimulate participation by quantifying companies’
contributions. Additionally, through experimental
study, the proposed model’s success was assessed
using various metrics, including dependability,
privacy, scalability, and sustainability.
In order to build a cyber threat intelligence-based
detection model, the article addresses a study that
intends to improve the identification of hazardous
URLs by applying two-stage ensemble learning.
Scholarly journal-
[28] 2022 The suggested approach outperformed detection Customized algorithm
malicious URL
methods from prior research, improving accuracy
by 7.8% and reducing false-positive rates by 6.7%
when compared to conventional URL-based
models.
The report offers a systematic evaluation that
contends that SMEs may profit from threat
information-sharing platforms like MISP if shared
[29] 2023 intelligence is transformed into useful insights. In - -
order to evaluate MISP data, rank cybersecurity
hazards for SMEs, and provide personalized
advice, a prototype application is developed.
The authors of this paper used automatic
Community-sourced
classification based on feature extraction and
[30] 2022 CTI systems modeling threat intelligence and
integrated ATT&CK to identify attack methods
open-source intelligence
associated with IOC.
This paper focuses on potential network attack
identification, and countermeasures are
Mixed methods using
recommended utilizing simulated data. Anomalies
[31] 2022 quantitative and Al-Kasassbeh dataset
in IoT networks are detected using message
qualitative approaches
queuing telemetry transport (MQTT) and
machine-learning algorithms.
In this paper, the authors underscore the
significance of acquiring advanced and in-depth
[32] 2023 Probabilistic approach GitHub repository
information about cyber threats in
Saudi universities.
Sensors 2023, 23, 7273 11 of 27
Table 1. Cont.
Ref. Publication
Main Contribution Technology/Method Source of Data
No. Year
In this paper, the authors propose an automatic CTI
analysis method called K-CTIAA to address the
challenges of analyzing these threats. K-CTIAA
[33] 2023 pre-trained algorithms and knowledge graphs were K-CTIAA/BERT analysis An open-source APT
used to obtain threat actions from unorganized CTI
and achieved high automatic threat intelligence
analysis performance.
The authors of this paper present a collaborative
cyber threat intelligence-sharing scheme to allow
[34] 2018 many enterprises to collaborate on the design, Consortium blockchain CTI data
training, and evaluation of a powerful ML-based
network intrusion detection system.
The paper proposes a DFR model that combines
CTI and forensic preparedness to help increase
Digital Forensics Readiness and minimize the time
and expense of response to incidents and
Digital Forensic
[35] 2019 investigations. The model achieved high accuracy, Local log dataset
Readiness
precision, and recall rates while reducing the
amount of information that investigators must
study, demonstrating the effectiveness of
combining CTI and digital forensics processes.
This paper presents a unique technique for Decision Tree, Random
Reports from the
detecting commonalities amongst CTI reports Forest, and Support
scientific community,
describing harmful actions identified on CAVs. Vector Machine are
[27] 2022 security manufacturers,
This unique model achieved 96% accuracy, 96.5% examples of
and a programmable
precision, 95.58% recall, and 95.75% F1 score, machine-learning models.
Google search engine
respectively.
In this study, the authors created a
blockchain-based CTI framework that can swiftly
identify and reject false data in order to defend Blockchain-based open
Utilizes open-sourced
against a Sybil attack and increase confidence in the architecture for
[22] 2020 intelligence as a route
source and content of data. The suggested exchanging cyber threat
for data acquisition
architecture collects CTI via a process certified by intelligence (BLOCIS)
smart contracts and stores data meta-information
on a blockchain network.
The authors of this research created a platform to
address situations in which a cybersecurity analyst
may import threat data, analyze it, and generate a Timeline representation
timeline to gain insight and properly contextualize of danger details and
[23] 2022 Multiple sources
a threat. The results demonstrate that knowledge is analytical data insights
facilitated about the environment in which the
threats are placed, making vulnerability mitigation
more effective.
The methodology used in this study examines
potential danger indications gathered by smart
meters and proposes a method for acquiring cyber Every second, threats
threat information that focuses on the energy cloud. employing energy item
A setting that models an
Through a mechanism for exchanging and data and 20,480 IoC
[17] 2021 attacker model and an
distributing knowledge about cyber threats across data instances are
energy cloud system
the Advanced Metering Infrastructure (AMI) and broadcast from a
cloud tiers, this research also provides a method for prosumer device.
quickly deploying a security framework to a
significant energy cloud architecture.
Sensors 2023, 23, 7273 12 of 27
Table 1. Cont.
Ref. Publication
Main Contribution Technology/Method Source of Data
No. Year
This paper enhances IDS detection mechanisms by
incorporating novel features for identifying threats
based on two assumptions related to handling Initial packet capture
The accuracy rate of
zero-day attacks with constrained computing (PCAP) is a common
[24] 2021 DNN using PCA and
power and resources, as well as a comprehensive method for collecting
model was 98%.
approach for detection by combining DNN and network traffic data.
principal component analysis (PCA) to enhance
security and performance.
In this paper, the authors highlight the use of
effective visualizations for CTI. A preliminary Based on
analysis of the data of CTI reports was carried out machine-learning
[18] 2022 to unearth and depict relevant cyber threat trends, approaches, a system for TTP dataset
allowing security professionals to reduce visually analyzing CTI
vulnerabilities and proactively forecast data is developed.
cyber-attacks in their networks.
This article demonstrates a proof of concept (PoC) A proof of concept (PoC)
using blockchain technology to secure private using blockchain
Data collected at the
networks, Internet of Things (IoT) devices, and technology to secure
ISP and the customer
[19] 2021 internet service providers (ISPs). The findings back home networks, Internet
premises, equipment
up the idea of decentralized cyber threat of Things (IoT) devices,
(CPE) routers
intelligence-sharing networks that are capable of and internet
protecting several stakeholders. service providers
TriCTI is a
trigger-enhanced system
This paper analyzes CTI VirusTotal (VT) large-scale that discovers actionable
DS-1 (2013–2020) and
field data. The authors discovered that the threat threat intelligence,
[20] 2022 DS-2 (2021) datasets
intelligence given by VT is inefficient, and the conveying a fuller
are used.
proposed method can improve CTI. context of IOCs by
disclosing their
campaign phases.
A method for utilizing
cybersecurity threat
intelligence data together GCO was performed
This article offers an automated technique to with NLP, machine on the collected OSTIPs,
[25] 2021 produce CTI records by merging NLP, neural learning, and CTI records yielding 24,835 articles
networks, and cyber threat intelligence expertise. is automatically published between
generated based on 2010 and 2019.
multi-type
OSTIPs (GCO).
Creation of a unique
methodology for
In this paper, the authors highlight that CTI has boosting the efficacy of
become a common practice for preventing or current digital forensic
[26] 2018 Local IoC database
detecting security incidents, especially in the readiness (DFR) schemes
digital forensics (DF) domain. by exploiting cyber threat
information-sharing
capabilities
This article presents a banking Trojan feature
taxonomy based on a cyber death chain. This
A taxonomy that
danger intelligence-based taxonomy, which
provides operational 127 financial
provides stage-by-stage operational knowledge of a
[21] 2017 knowledge of a transactions from the
cyber attack, can help security practitioners as well
cyber-attack stage real world
as aid in the construction of evolving artificial
by stage
intelligence for Trojan detection and
mitigation strategies.
Sensors 2023, 23, 7273 13 of 27
architecture effectively collects and processes cyber threat intelligence related to IoT from
the clear, social, and dark web. Security analysts and researchers can use the proposed
architecture to identify and analyze IoT threats and develop effective countermeasures to
protect IoT devices and networks [40].
Basheer and Alkhatib [41] wrote a review article to outline the importance of testing
and checking the dark web for CTI to prevent crimes and gain insight into criminal activities.
The review includes recent research in the area, examining techniques, tools, methods,
approaches, and outcomes. It also addresses technical hurdles, ethical considerations, and
potential future developments [41].
Mundt and Baier [42] described an adaptive approach that uses CTI from the MITRE
ATT&CK framework to simulate potential threats and identify weaknesses before they
can be exploited. The process involves two main steps: automatically deriving the most
critical threats for a business via CTI and designing a simulation gear based on attacks
extracted from the MITRE ATT&CK framework to assess their impact. The aim is to enable
companies to take proactive measures against data theft and double extortion attacks by
simulating harmful technologies before they occur in operational environments [42].
On the other hand, Sakellariou et al. [43] emphasized using discussion forums as the
raw data source for CTI and suggested a semantic schema for organizing the gathered
data. The paper introduces the SECDFAN system, a comprehensive method for generating
CTI products by analyzing forum content. Furthermore, a reference architecture was
created systematically to address all CTI-related concerns, including product sharing and
collaboration among security experts [43].
Sacher-Boldewin and Leverett [44] improved cyber defense by systematically catego-
rizing and documenting possible failure states in a company’s security operations process.
The system divides vulnerability management into three parts, starting from when a vul-
nerability is detected and rated as relevant, then asking whether prevention measures can
be activated on time or if any signs of exploitation can be detected. The authors recommend
using dimensions related to business processes, such as people, products, partners, etc.
These dimensions are used to calculate the possible resolution categories by multiplying
them by involved parties. The suggested system also highlights a direct connection between
cybersecurity and risk quantification so that external and internal risks can be managed
effectively and efficiently. It recommends building feedback options into existing processes
by systematically categorizing possible failure states to help optimize workflows while
delivering valuable metrics [44].
Koloveas et al. [45] introduced the “Integrated Framework for Threat Intelligence
Mining and Extraction” system, INTIME. INTIME is a framework based on machine learn-
ing that gives a holistic perspective of the cyber threat intelligence process. It enables
security experts to collect, evaluate, and exchange cyber threat data from various online
sources, such as clear/deep/dark websites, forums, and social networks. Vulnerabili-
ties/exploits/threat actors/cyber crime tools are among the information retrieved and
managed via an integrated platform called MISP (Malware Information Sharing Platform),
designed specifically for storing/sharing threat-related information across different orga-
nizations. One of the critical features of INTIME is its ability to gather CTI not only from
structured sources like known security databases but also unstructured ones like deep
net [45].
The importance of risk management in organizations is crucial, and real-time security
threats can harm risk exposure levels. Riesco and Villagrá [46] highlighted companies’
challenges in managing risks, such as emerging techniques, asset complexity, and numerous
vulnerabilities. To overcome these challenges, the authors suggest an architecture for
dynamic risk assessment and management based on Web Ontology Language and Semantic
Web Rule Language. The architecture includes a new semantic version of Structured
Threat Information eXpression (STIX)v2.0 for exchanging CTI. The article demonstrates the
effectiveness of the proposed framework in supporting decision making across different
organizational levels using a leading cybersecurity organization. The proposed model aims
Sensors 2023, 23, 7273 15 of 27
to enable real-time risk management while integrating a mix of standards and ensuring
ease of adoption [46].
Aljuhami and Bamasoud [47] investigated how Cyber Threat Information (CTI) can
reduce cyber risks in Saudi universities by improving risk management. The study investi-
gates CTI concepts, challenges, and risk management practices in higher education. Their
work includes a review of previous studies and their relevance to the current research. The
results highlight the importance of obtaining advanced and detailed information on cyber
threats, or CTI, to deal with their constantly evolving nature. Integrating CTI into risk
management enhances defenders’ ability to mitigate the increasing risk of cyber threats [47].
Sakellariou et al. [48] introduced essential CTI concepts and an eight-layer CTI in a sim-
ilar study, with a reference model that can aid in the development of CTI systems. The
model’s effectiveness is demonstrated through three case studies, resulting in the creation
of CTI [48].
Dulaunoy et al. [49] developed a system for unreceptive DNS, malware hash archives,
and Secure Sockets Layer (SSL) notaries. This system aims to support incident inquiries
and infrastructure tracking by providing CTI. The authors explain that CSIRTs (Computer
Security Incident Response Teams) use passive DNS and SSL databases to help with
the incident reply. Still, they argue that their new passive SSH database would be a
valuable addition to the CSIRT toolbox, because OpenSSH implementation is widely used
on many servers as well as computers like MacOSs or Windows machines, which makes
it an attractive target for attackers looking for vectors of attack or command-and-control
mechanisms [49].
On the other hand, Gao et al. [50] developed a system called SecurityKG, which is a
system that automates the collection and management of open-source CTI (OSCTI) from
over 40 major security websites. It uses AI/NLP techniques to extract relevant information,
such as potential threats, vulnerabilities, and risks to critical assets. The system also
has an extendable backend that handles all gathered, extracted, and constructed OSCTI
components. Additionally, it provides various interactivities through its user interface to
facilitate knowledge graph exploration. SecurityKG aims to provide more comprehensive
and accurate information about cyber threats [50].
Al-Mohannadi et al. [51] analyzed different types of web services and the ways in
which adversaries can use them for malicious activities. The study suggests that CTI can be
used to protect organizations from cyber threats by providing relevant information about
potential attacks, vulnerabilities, and threat actors. This information can help organizations
to develop better security strategies and responses to mitigate risks. The study highlights
some of the main challenges related to CTI, such as the lack of standardization, data quality
issues, and the need for skilled personnel to analyze and interpret the data. The research
suggests that cloud-based web services can help to overcome some of these challenges by
providing scalable and flexible solutions that can be customized to meet the specific needs
of different organizations. The study suggests that cloud-based web services can enhance
CTI by providing more comprehensive and accurate information about adversary activities.
However, addressing the challenges related to data quality, standardization, and personnel
skills is crucial to effectively use CTI to protect organizations from cyber threats [51]. Using
AI and NLP to evaluate social media postings on cyber-attacks and electronic warfare,
Sufi [52] offers a contemporary methodology. A single index is created for each nation
using keyword-based index production techniques, and CNN is used to find abnormalities
and their causes inside the index. The method is verified using real-time Twitter feeds,
producing 75 daily cyber danger indices for six nations with anomalies. Decision makers
may use the gathered intelligence to modify their cybersecurity readiness and lessen the
harm done by cybercriminals [52].
In a different study, Cristea [53] examined the risks connected to potential threats
from disruptive technologies in the context of the present financial systems. The study
shows that by enhancing efficiency, cutting costs, and boosting transparency, disruptive
technologies like blockchain, cryptocurrencies, and artificial intelligence have the potential
Sensors 2023, 23, 7273 16 of 27
to completely change the financial sector. However, these technologies also pose significant
risks to the current financial systems, including cybersecurity threats, regulatory challenges,
and financial instability. The study identifies five key categories of risks associated with
disruptive technologies in the financial sector: technology, regulatory, market, operational,
and systemic risks. The study concludes that though disruptive technologies significantly
benefit the financial industry, managing the associated risks effectively is crucial. Financial
institutions, policymakers, and regulators must work together to develop robust risk
management strategies and regulatory frameworks to ensure that the benefits of disruptive
technologies are realized while mitigating their potential risks [53].
Thach et al. [54] suggest that Industry 4.0 has greatly impacted the banking industry
in Vietnam, especially regarding its technology quality management practices and cyber-
security risk management strategies. The paper identifies several key factors affecting
the success of Industry 4.0 implementation in the banking sector, including regulatory
compliance, data privacy, and talent management. Furthermore, the study highlights the
importance of cybersecurity risk management in the banking industry, given the increasing
prevalence of cyber threats and attacks. In the context of Industry 4.0, the study offers
a thorough methodology for managing cybersecurity risks that includes proactive risk
identification, risk assessment, risk reduction, and risk monitoring. Overall, the research
underlines the necessity for financial institutions in developing nations like Vietnam to
establish strong practices for technology quality management and cybersecurity risk man-
agement in order to be secure and competitive in the quickly changing digital environment
of Industry 4.0 [54].
Tripodi [55] utilized a sociotechnical framework to analyze the sociopolitical and
technological factors contributing to misinformation’s spread and persistence. They argue
that the continuation of this misinformation is due to a complex interplay of social and
technological factors, including political polarization, the use of social media platforms to
spread misinformation, and the amplification of misinformation by influential individuals
and organizations. The study also highlights the potential public health consequences
of the persistence of this misinformation, including increased transmission of viruses
and decreased compliance with public health guidelines. The authors concluded that
addressing this issue will require a multifaceted approach that considers the social and
technological factors contributing to the spread of misinformation [55].
Odemis et al. [56] developed a “Honeypsy” system designed to observe user behavior
with CTI. The system collects and analyzes data from honeypots and decoy systems
that mimic natural systems and are used to detect and monitor cyber threats. Honeypsy
analyzes the gathered data and looks for unusual behavior using machine-learning methods.
The system is appropriate for business situations, since it was made to be scalable and
manage large volumes of data. The authors of the research carried out many tests to assess
Honeypsy’s performance in identifying user activity in CTI. The results showed that the
system can accurately detect anomalous behavior, such as the use of malicious tools and
techniques, and can provide early warnings of potential cyber-attacks. The Honeypsy
system offers a promising approach to detecting user behavior using machine-learning
algorithms and honeypot data in CTI. The system can potentially improve the accuracy
and efficiency of cyber threat detection in enterprise environments, helping organizations
better protect their assets and data from cyber-attacks [56].
Vevera et al. [57] proposed an approach to help organizations make informed deci-
sions when selecting CTI solutions and ensure they align with their specific needs and
requirements. The proposed approach is comprised of six attributes: accuracy, reliability,
timeliness, cost-effectiveness, usability, and comprehensiveness. This study thoroughly
explains each attribute and discusses the criteria that can be used to evaluate them. Further-
more, the study’s authors conducted several experiments to demonstrate the effectiveness
of the recommended technique. The findings suggest that the multi-attribute strategy
can effectively evaluate CTI products and services and help organizations make informed
decisions when selecting solutions that best fit their needs and requirements. Overall, the
Sensors 2023, 23, 7273 17 of 27
Ref. Publication
Main Contribution Technology/Method Source of Data
No. Year
Using storytelling approaches, the authors
Log-driven storytelling model
suggest a mechanism that creates insights
[36] 2019 using narrative techniques and Security logs
into the natural language from
human-centered data mining
security data.
The counterintelligence and
counterattack approach employs
an Elastic Sky X Integrated
(ESXI)
The authors use novel methods for
server in a data center, public Attacker logs and
circumventing virtual private networks
[38] 2022 and private pathways for Cowrie and
(VPN) and additional security measures to
accessing attacker logs, Cowrie Windows honeypots
gather accurate source information.
and Windows honeypots with
numerous open ports like Secure
Shell (SSH) to confuse attackers,
and a log server to store logs.
The main benefits of the system described
in this article include the fact that it allows The program maintains
for the storage and retrieval of SSH fingerprints in a
connections used to collect historical Redis-compatible backend and Server banners, key
[49] 2022
forensic artifacts and provides a offers an API that uses REST to types, and IP addresses
Representational State Transfer (REST) API put information into a datastore
to aid in incident investigations and and obtain signatures.
infrastructure monitoring.
The primary goal of this study was to
increase awareness of situations in
cybersecurity by offering greater active
inspection of possible dangers that are
CTI, text, and data mining (key
developing in cyberspace before an assault.
exchange algorithms, encryption Dark web cyber-attack
[39] 2021 The AZSecure Hacker Assets Portal (HAP)
algorithms, and message tools
gathers, analyzes, and publishes on dark
authentication code algorithms)
web data sources to provide a unique view
of hackers and associated cybercriminal
assets while adding CTI insights to increase
awareness of the situation.
The primary goal of this work was to offer
an idea to accomplish targeted automated
data exfiltration mitigation along with a Automatic procedures
Mapped Building Security in
preliminary assessment. The authors based on the
Maturity Model (BSIMM)
[42] 2022 propose using international approaches and framework would be
and threat-based
the MITRE ATT&CK framework to network traffic and
security concepts
automatically recognize and simulate the persistent data.
most relevant data exfiltration risks, strictly
focusing on mitigating these threats.
This article describes SecurityKG, a system
proposed to collect and manage
open-source security threat intelligence Artificial Intelligence and
[50] 2021 (OSCTI) information. SecurityKG extracts natural language OSCTI reports
high-fidelity information about threat processing techniques
behaviors using AI and machine learning
and builds a security-knowing graph.
Sensors 2023, 23, 7273 19 of 27
Table 2. Cont.
Ref. Publication
Main Contribution Technology/Method Source of Data
No. Year
The major goal of this study was to
demonstrate how false-positive occurrences
can be identified methodically for all
services and the ways in which this data can
Systematic categorization of False positives,
be utilized to suggest areas for development.
possible failure states and incorrect states, and
[44] 2022 The study also focuses on recognizing and
building these into existing cyber defense
recording issues that arise while detecting
security workflows and tools operations issues
and analyzing vulnerabilities and whenever
the security operations center (SOC)
attempts to add an inventory source for
continuous monitoring.
The major goal of this work was to offer a
novel CTI-sharing model that encourages
all participants at all levels to communicate
important information in real-time. The
suggested solution uses the blockchain and
guidelines such as Generalized Threat
Information Transfer and World Wide Web
Ethereum blockchain smart
[37] 2019 Consortium (W3C) semantics web CTI data
contract marketplace
standards to allow for a workspace of
information linked to behavioral threat
intelligence patterns. This will aid in
characterizing strategies, approaches, and
processes while also rewarding CTI sharing
via an Ethereum-based smart
contract marketplace.
This article presents IN TIME, a
machine-learning-based architecture that
provides a complete platform for managing
cyber threat intelligence. The framework
may be used by security analysts to swiftly
find, acquire, assess, extract, integrate, and
Machine-learning-based
[45] 2021 distribute information on cyberthreats from Internet sources
framework called IN TIME
diverse online sources. It also supports the
whole threat lifecycle through open
standards and user-friendly interfaces,
allowing for the quick deployment of data
collection services and the automatic
grading of acquired information.
The article emphasizes the importance of
risk management in organizations and the
challenges they face in managing risks. It
proposes a new architecture for dynamic
risk assessment and management, which
enables real-time risk management while
[46] 2019 Protegé Semantic data model
ensuring ease of adoption by incorporating
a mix of standards. The article demonstrates
the effectiveness of the proposed
framework in supporting decision making
across different organizational levels using
a leading cybersecurity organization.
Sensors 2023, 23, 7273 20 of 27
Table 2. Cont.
Ref. Publication
Main Contribution Technology/Method Source of Data
No. Year
The paper covers the possible damage that
cyber-attacks may do to the world economy
and the necessity of comprehending the
danger level to modify cybersecurity
measures at various levels. It suggests a
modern technique for analyzing the context
[52] 2023 Twitter feed, AI, and NLP Social media
of social media posts on cyber-attacks and
electronic warfare using AI and NLP.
Seventy-five daily cyber threat indices for
six countries are produced due to the
technique’s validation utilizing real-time
Twitter feeds.
The article highlights the vulnerability of
small- and medium-sized enterprises
(SMEs) to cyber-attacks due to their lack of
resources. It discusses the need to share CTI
to assist SMEs in cybersecurity defense.
However, existing shared intelligence
approaches do not sufficiently meet SME The body of studies on
requirements, and further investigation is intelligence draws on qualitative
[62] 2021 Live social media feeds
necessary to enhance SME cybersecurity approaches used in social
resilience. A prototype application was science. research.
developed to process MISP data, prioritize
cybersecurity threats for SMEs, and give
customized recommendations. Future
evaluations will refine the application and
help SMEs to defend themselves against
cyber-attacks more effectively.
The paper explores how CTI can reduce
cyber risks in Saudi universities by
improving risk management. It examines
CTI concepts, challenges, and risk
[47] 2021 - -
management practices in higher education.
It concludes that integrating CTI into risk
management can enhance defenders’
capacity to mitigate the risk of cyber threats.
In order to aid in the design of CTI systems,
this study emphasizes a number of
important CTI ideas and an eight-layer CTI
reference model. A powerful ML-based
[48] 2022 network intrusion detection system may be CTI model design methodology Existing CTI platforms
designed, trained, and evaluated by several
enterprises working together through a
collaborative cyber threat
intelligence-sharing scheme.
The authors of this paper propose a
semantic schema for organizing collected
SECDFAN’s CTI reference
[43] 2023 data. The SECDFAN system is introduced Repository data
architecture
as a comprehensive approach for creating
CTI products by analyzing forum content.
Sensors 2023, 23, 7273 21 of 27
Table 2. Cont.
Ref. Publication
Main Contribution Technology/Method Source of Data
No. Year
The authors present a strategy for
collaborative cyber threat information
sharing to allow several enterprises to Federated, centralized, and
[60] 2023 Local data
collaborate on creating, training, and localized learning scenarios
assessing an effective ML-based intrusion
detection system.
In this paper, researchers explore ways to
assist SMEs in their cybersecurity defense
through CTI sharing. Existing shared Methods and platforms for
[61] 2020 CTI data
intelligence approaches do not meet SMEs’ sharing CTI
requirements; further investigation is
needed to enhance cybersecurity resilience.
Internal network data,
The article discusses the significance of
external threat feeds,
analyzing dark web content for CTI to deter
[41] 2021 The life cycle of CTI open-source
cybercrimes and understand
intelligence (OSINT),
criminal behavior.
human intelligence
In this paper, the authors emphasize that
shared intelligence needs to be translated
into actionable insights to be effective.
Open-source TI
[63] 2020 A prototype application is created to 5W3H method
platform
process MISP data, prioritize cybersecurity
threats, and give customized
recommendations.
The writers of this work want to highlight
The relationship between a
the nuances of hackers’ personalities and
hacker’s behavior/logs in a
competence to assist defense specialists of
[56] 2022 server and the hacker’s Logs
targeted institutions in developing
personality, skills,
cybersecurity tactics based on the hackers’
and psychology
modus operandi.
A case study is investigated based on user
assessments and reviews of security threat
intelligence providers. The effect of
Support tools for security
VIseKriterijumska Optimizacija I
program executives confronted
Kompromisno Resenje (VIKOR) user
with the issue of which CTI Security threat
parameter modification on CTI provider
[57] 2022 providers to choose. It also intelligence internet
ranking is investigated. The suggested
assists CTI service providers in platform
approach is a tool to help security program
improving the quality of their
executives decide which CTI providers to
goods and services.
use. It also assists CTI service providers in
improving the quality of their goods and
services.
To enable active threat intelligence, this
Analyzing attack data acquired
study provides a threat intelligence
[51] 2019 via cloud-based web services to Data cloud
framework for evaluating attack data
provide active threat intelligence
acquired via a cloud-based web service.
The significance and value of threat
intelligence are covered in the opening
paragraphs of this article. A threat
The existing threat
intelligence analysis model is then
[58] 2020 intelligence-sharing method has -
presented. Next, the study compiles and
several major flaws.
organizes the suppliers of threat intelligence
as well as the threat intelligence-sharing
policies.
Sensors 2023, 23, 7273 22 of 27
Table 2. Cont.
Ref. Publication
Main Contribution Technology/Method Source of Data
No. Year
The writers concentrate on the task of
acquiring information in this study. They
demonstrate a unique crawling architecture
for openly gathering data from clear web
[40] 2021 security websites, social web security Information-gathering task -
forums, and dark web hacker
forums/marketplaces. The suggested
architecture divides data collection into
two phases.
The research includes a complete
assessment of deep fakes and economic
A comprehensive review of
[59] 2019 potential for cybersecurity and AI -
deep fakes
businesses battling multimedia fraud and
fake news.
This article focuses on integrating,
comparing, and examining disruptive
[53] 2021 technologies’ effects, presenting security Design measures to manage risk _
threats and occurrences, and building risk
management strategies.
As the important financial sector adapts to
greater autonomy, there is a risk of
increasing vulnerabilities and amplification
of the impact of cybersecurity threats. As a
[54] 2020 result, companies must possess the Risk management plans -
flexibility to invest in ICT and cybersecurity
expenditures to adjust to unanticipated
conditions swiftly and efficiently for
improved technology quality management.
This study provides a deeper knowledge of
the main stories being shared by ReOpen
members as well as the sources they use to
back up their opinions. Members offered
public safety solutions based on It clarifies the primary narratives
individualism and self-inquiry while trying circulating among ReOpen
[55] 2022 Facebook groups
to reinterpret data to reduce the danger of members and the material they
COVID. Members questioned the veracity used to back up their claims.
of the fact checkers when the platform tried
to uncover problematic content,
highlighting the intimate connection
between misinformation and epistemology.
4. Discussion
Based on the literature review, developing a sophisticated and comprehensive CTI
framework is crucial for organizations to manage and mitigate potential risks effectively.
Cyber threats are becoming increasingly complex, making it difficult for traditional security
measures to keep up. A well-designed cybersecurity threat intelligence framework can help
organizations to avoid emerging threats by providing real-time insights into their critical
assets’ potential risks. Such a framework should include identifying vulnerabilities within
an organization’s infrastructure, detecting anomalous behavior or patterns associated with
malicious activity, and sharing information about potential threats with stakeholders. Fur-
thermore, having a structured approach toward cybersecurity threat intelligence helps
to ensure consistency across different organizational departments. It also enables better
collaboration between teams who are responsible for managing cyber-attack risk expo-
Sensors 2023, 23, 7273 23 of 27
layers of protection, organizations can quickly enhance their ability to detect emerging
cyber threats while minimizing risk exposure.
The third layer, the visualization dashboard, provides an overview of key metrics
related to cyber threats, such as the number of attacks detected, as well as types of attacks
and their severity level. As shown by Samtani et al. [39], the visualization of cyber threats
increases situational awareness among actors, so visualization tools can be used to represent
complex data sets in a more intuitive way, which helps analysts to identify patterns or trends
that may not be immediately apparent from raw data. This approach is advantageous when
dealing with large volumes or diverse sources of information. The dashboards should be
customizable based on user roles so stakeholders within an organization can access relevant
information quickly. Visualization tools such as heat maps, graphs, etc. could help analysts
to understand how different events are connected and their impact on critical assets. They
can also be used to highlight which infrastructure assets will have higher vulnerabilities
or how cybersecurity risks vary based on the current organizational situation. Overall,
dashboards and visualization tools enhance cybersecurity threat intelligence by providing
real-time insights into organizational data, such as an organizational risk meter, showing
potential risks aimed at an organization’s critical assets, the number of recent attacks, threat
levels, the average organizational response time, and the cost of recent cybersecurity attacks.
By utilizing these technologies, organizations can quickly improve their ability to detect
emerging threats while minimizing risk exposure.
Due to the enhanced digital transformation, business organizations must be resilient
toward cybersecurity [64–67]. Given the increasing frequency and sophistication of cyber-
attacks today, developing a robust cybersecurity threat intelligence framework should
be considered one of the top priorities of any organization looking to protect its critical
assets. Since humans are a weak link in cybersecurity [68–70], a robust CTI framework
will also facilitate overcoming human security lapses. As proposed in our model, leverag-
ing multiple layers such as a knowledge base, detection models, and visualization tools
along with human expertise would enable effective management and mitigation of these
evolving challenges.
Based on the details presented in this paper, there are a few limitations to consider.
First, the proposed framework for CTI implementation may not apply to all organizations,
as each organization has unique needs and resources. Therefore, organizations need to
tailor their approach based on their specific requirements. Second, collaboration between
stakeholders is essential for practical CTI; it can also pose challenges, such as restrictions
on information sharing due to legal or regulatory constraints [71,72]. Organizations must
navigate these challenges carefully while complying with relevant laws and regulations.
Third, the empirical analysis conducted in this study was limited by the sample size and the
scope of data collected from selected industries. This may limit its generalizability across
other sectors or regions globally where CTI programs have been implemented successfully
but were not included within this research project’s scope of work. Finally, and importantly,
cyber threats continue to evolve rapidly over time, making it difficult, and even sometimes
impossible, to keep up with new emerging trends without continuous monitoring and
updating of one’s security posture strategy plan accordingly. Therefore, any framework
should be considered dynamic rather than static when implementing CTI frameworks
within an organization’s security posture strategy plan.
5. Conclusions
In conclusion, this paper significantly contributes to the field of CTI by proposing a
comprehensive framework for the implementation of CTI. Through an extensive literature
review, key components that are essential for practical CTI have been identified, including
data collection and processing, analysis, and dissemination. The proposed framework
could provide valuable guidance for organizations seeking to establish or improve their
CTI capabilities. Additionally, the methodology employed in this research can serve
as a model for future studies on related topics. In addition, the paper’s emphasis on
Sensors 2023, 23, 7273 25 of 27
Author Contributions: Conceptualization, S.S.; methodology, S.A.S., M.S.A.-G. and H.A.-M.; data
curation, S.A.S., M.S.A.-G. and H.A.-M.; writing—original draft preparation, S.S., S.A.S., M.S.A.-G.
and H.A.-M.; writing—review and editing, A.M.A.; supervision, S.S.; funding acquisition, A.M.A. All
authors have read and agreed to the published version of the manuscript.
Funding: The APC was funded by the SAUDI ARAMCO Cybersecurity Chair, Imam Abdulrahman
Bin Faisal University.
Institutional Review Board Statement: Not applicable.
Informed Consent Statement: Not applicable.
Data Availability Statement: Not applicable.
Acknowledgments: The authors would like to thank Tooba Nasir for the language review of the
manuscript.
Conflicts of Interest: The authors declare no conflict of interest.
References
1. Lenka, A.; Goswami, M.; Singh, H.; Baskaran, H. Cybersecurity Disclosure and Corporate Reputation: Rising Popularity of
Cybersecurity in the Business World. In Effective Cybersecurity Operations for Enterprise-Wide Systems; IGI Global: Hershey, PA,
USA, 2023; pp. 169–183.
2. Kotsias, J.; Ahmad, A.; Scheepers, R. Adopting and integrating cyber-threat intelligence in a commercial organisation. Eur. J. Inf.
Syst. 2023, 32, 35–51. [CrossRef]
3. Gately, H. Russian Organised Crime and Ransomware as a Service: State Cultivated Cybercrime. Doctoral Dissertation, Macquarie
University, Sydney, Australia, 2023.
4. Abu, M.S.; Selamat, S.R.; Ariffin, A.; Yusof, R. CTI–issue and challenges. Indones. J. Electr. Eng. Comput. Sci. 2018, 10, 371–379.
5. Webb, J.; Maynard, S.; Ahmad, A.; Shanks, G. Information security risk management: An intelligence-driven approach. Australas.
J. Inf. Syst. 2014, 18, 391–404. [CrossRef]
6. Webb, J.; Maynard, S.; Ahmad, A.; Shanks, G. Towards an intelligence-driven information security risk management process for
organisations. In Proceedings of the ACIS 2013 Proceedings, 52, Niigata, Japan, 16–20 June 2013.
7. Schlette, D.; Caselli, M.; Pernul, G. A comparative study on cyber threat intelligence: The security incident response perspective.
IEEE Commun. Surv. Tutor. 2021, 23, 2525–2556. [CrossRef]
8. Kitchenham, B.; Charters, S. Guidelines for Performing Systematic Literature Reviews in Software Engineering; Technical Report, EBSE
Technical Report EBSE-2007-0; Elsevier: London, UK, 2007.
9. Page, M.J.; McKenzie, J.E.; Bossuyt, P.M.; Boutron, I.; Hoffmann, T.C.; Mulrow, C.D.; Moher, D. The PRISMA 2020 statement: An
updated guideline for reporting systematic reviews. BMJ 2021, 372, n71. [CrossRef]
10. Available online: https://ieeexplore.ieee.org/Xplore/home.jsp (accessed on 30 June 2023).
11. Available online: https://dl.acm.org/ (accessed on 30 June 2023).
12. Suryotrisongko, H.; Musashi, Y.; Tsuneda, A.; Sugitani, K. Robust botnet DGA detection: Blending XAI and OSINT for CTI
sharing. IEEE Access 2022, 10, 34613–34624. [CrossRef]
13. Moraliyage, H.; Sumanasena, V.; De Silva, D.; Nawaratne, R.; Sun, L.; Alahakoon, D. Multimodal classification of onion services
for proactive CTI using explainable deep learning. IEEE Access 2022, 10, 56044–56056. [CrossRef]
14. Irshad, E.; Siddiqui, A.B. Cyber threat attribution using unstructured reports in CTI. Egypt. Inform. J. 2023, 24, 43–59. [CrossRef]
15. Zhang, H.; Shen, G.; Guo, C.; Cui, Y.; Jiang, C. Ex-action: Automatically extracting threat actions from CTI report based on
multimodal learning. Secur. Commun. Netw. 2021, 2021, 1–12.
16. Cha, J.; Singh, S.K.; Pan, Y.; Park, J.H. Blockchain-based CTI system architecture for sustainable computing. Sustainability 2020,
12, 6401. [CrossRef]
17. Gong, S.; Lee, C. CTI framework for incident response in an energy cloud platform. Electronics 2021, 10, 239. [CrossRef]
Sensors 2023, 23, 7273 26 of 27
18. Ejaz, S.; Noor, U.; Rashid, Z. Visualizing Interesting Patterns in CTI Using Machine Learning Techniques. Cybern. Inf. Technol.
2022, 22, 96–113.
19. Mendez Mena, D.; Yang, B. Decentralized actionable CTI for networks and the internet of things. IoT 2020, 2, 1–16. [CrossRef]
20. Liu, J.; Yan, J.; Jiang, J.; He, Y.; Wang, X.; Jiang, Z.; Yang, P.; Li, N. TriCTI: An actionable CTI discovery system via trigger-enhanced
neural network. Cybersecurity 2022, 5, 8. [CrossRef]
21. Kiwia, D.; Dehghantanha, A.; Choo, K.K.R.; Slaughter, J. A cyber kill chain based taxonomy of banking Trojans for evolutionary
computational intelligence. J. Comput. Sci. 2018, 27, 394–409. [CrossRef]
22. Gong, S.; Lee, C. Blocis: Blockchain-based CTI sharing framework for sybil-resistance. Electronics 2020, 9, 521. [CrossRef]
23. Borges Amaro, L.J.; Percilio Azevedo, B.W.; Lopes de Mendonca, F.L.; Giozza, W.F.; Albuquerque, R.D.O.; García Villalba, L.J.
Methodological framework to collect, process, analyze and visualize CTI data. Appl. Sci. 2022, 12, 1205. [CrossRef]
24. Al-Fawa’reh, M.; Al-Fayoumi, M.; Nashwan, S.; Fraihat, S. CTI using PCA-DNN model to detect abnormal network behavior.
Egypt. Inform. J. 2022, 23, 173–185. [CrossRef]
25. Sun, T.; Yang, P.; Li, M.; Liao, S. An automatic generation approach of the CTI records based on multi-source information fusion.
Future Internet 2021, 13, 40. [CrossRef]
26. Serketzis, N.; Katos, V.; Ilioudis, C.; Baltatzis, D.; Pangalos, G.J. Actionable threat intelligence for digital forensics readiness. Inf.
Comput. Secur. 2019, 27, 273–291. [CrossRef]
27. Raptis, G.E.; Katsini, C.; Alexakos, C.; Kalogeras, A.; Serpanos, D. CAVeCTIR: Matching CTI Reports on Connected and
Autonomous Vehicles Using Machine Learning. Appl. Sci. 2022, 12, 11631. [CrossRef]
28. Alsaedi, M.; Ghaleb, F.A.; Saeed, F.; Ahmad, J.; Alasli, M. CTI-based malicious url detection model using ensemble learning.
Sensors 2022, 22, 3373. [CrossRef] [PubMed]
29. Van Haastrecht, M.; Golpur, G.; Tzismadia, G.; Kab, R.; Priboi, C.; David, D.; Răcătăian, A.; Baumgartner, L.; Fricker, S.; Ruiz, J.F.;
et al. A shared CTI solution for smes. Electronics 2021, 10, 2913. [CrossRef]
30. Zhang, S.; Chen, P.; Bai, G.; Wang, S.; Zhang, M.; Li, S.; Zhao, C. An automatic assessment method of CTI combined with ATT&CK
matrix. Wirel. Commun. Mob. Comput. 2022, 7875910.
31. Mishra, S.; Albarakati, A.; Sharma, S.K. CTI for IoT Using Machine Leamrning. Processes 2022, 10, 2673. [CrossRef]
32. Chatziamanetoglou, D.; Rantos, K. Blockchain-Based CTI Sharing Using Proof-of-Quality Consensus. Secur. Commun. Netw.
2023, 3303122.
33. Li, Z.X.; Li, Y.J.; Liu, Y.W.; Liu, C.; Zhou, N.X. K-CTIAA: Automatic Analysis of CTI Based on a Knowledge Graph. Symmetry
2023, 15, 337. [CrossRef]
34. Zhang, X.; Miao, X.; Xue, M. A Reputation-Based Approach Using Consortium Blockchain for CTI Sharing. Secur. Commun. Netw.
2022, 7760509. [CrossRef]
35. Serketzis, N.; Katos, V.; Ilioudis, C.; Baltatzis, D.; Pangalos, G. Improving forensic triage efficiency through CTI. Future Internet
2019, 11, 162. [CrossRef]
36. Afzaliseresht, N.; Miao, Y.; Michalska, S.; Liu, Q.; Wang, H. From logs to stories: Human-centred data mining for CTI. IEEE Access
2020, 8, 19089–19099. [CrossRef]
37. Riesco, R.; Larriva-Novo, X.; Villagrá, V.A. Cybersecurity threat intelligence knowledge exchange based on blockchain: Proposal
of a new incentive model based on blockchain and Smart contracts to foster the cyber threat and risk intelligence exchange of
information. Telecommun. Syst. 2020, 73, 259–288. [CrossRef]
38. Rana, M.U.; Ellahi, O.; Alam, M.; Webber, J.L.; Mehbodniya, A.; Khan, S. Offensive Security: CTI Enrichment With Counterintelli-
gence and Counterattack. IEEE Access 2022, 10, 108760–108774. [CrossRef]
39. Samtani, S.; Li, W.; Benjamin, V.; Chen, H. Informing CTI through dark Web situational awareness: The AZSecure hacker assets
portal. Digit. Threats Res. Pract. (DTRAP) 2021, 2, 1–10. [CrossRef]
40. Koloveas, P.; Chantzios, T.; Tryfonopoulos, C.; Skiadopoulos, S. A crawler architecture for harvesting the clear, social, and dark
web for IoT-related cyber-threat intelligence. In Proceedings of the 2019 IEEE World Congress on Services (SERVICES), Milan,
Italy, 8–13 July 2019; Volume 2642, pp. 3–8.
41. Basheer, R.; Alkhatib, B. Threats from the dark: A review over dark web investigation research for CTI. J. Comput. Netw. Commun.
2021, 2021, 1–21. [CrossRef]
42. Mundt, M.; Baier, H. Threat-based Simulation of Data Exfiltration Towards Mitigating Multiple Ransomware Extortions. Digit.
Threats Res. Pract. 2022. [CrossRef]
43. Sakellariou, G.; Fouliras, P.; Mavridis, I. SECDFAN: A CTI System for Discussion Forums Utilization. Eng 2023, 4, 615–634.
[CrossRef]
44. Sacher-Boldewin, D.; Leverett, E. The Intelligent Process Lifecycle of Active Cyber Defenders. Digit. Threats Res. Pract. (DTRAP)
2022, 3, 1–17. [CrossRef]
45. Koloveas, P.; Chantzios, T.; Alevizopoulou, S.; Skiadopoulos, S.; Tryfonopoulos, C. Intime: A machine learning-based framework
for gathering and leveraging web data to cyber-threat intelligence. Electronics 2021, 10, 818. [CrossRef]
46. Riesco, R.; Villagrá, V.A. Leveraging CTI for a dynamic risk framework: Automation by using a semantic reasoner and a new
combination of standards (STIX™, SWRL and OWL). Int. J. Inf. Secur. 2019, 18, 715–739. [CrossRef]
47. Aljuhami, A.M.; Bamasoud, D.M. CTI in Risk Management. Int. J. Adv. Comput. Sci. Appl. 2021, 12, 156–164.
48. Sakellariou, G.; Fouliras, P.; Mavridis, I.; Sarigiannidis, P. A reference model for CTI systems. Electronics 2022, 11, 1401. [CrossRef]
Sensors 2023, 23, 7273 27 of 27
49. Dulaunoy, A.; Huynen, J.L.; Thirion, A. Active and Passive Collection of SSH key material for CTI. Digit. Threats Res. Pract.
(DTRAP) 2022, 3, 1–5. [CrossRef]
50. Gao, P.; Liu, X.; Choi, E.; Soman, B.; Mishra, C.; Farris, K.; Song, D. A system for automated open-source threat intelligence
gathering and management. In Proceedings of the 2021 International Conference on Management of Data, Xi’an, China, 20–25
June 2021; pp. 2716–2720.
51. Al-Mohannadi, H.; Awan, I.; Al Hamar, J. Analysis of adversary activities using cloud-based web services to enhance CTI. Serv.
Oriented Comput. Appl. 2020, 14, 175–187. [CrossRef]
52. Sufi, F. A New Social Media-Driven CTI. Electronics 2023, 12, 1242. [CrossRef]
53. Cristea, L.M. Risks Associated with Threats Related to Disruptive Technologies in the Current Financial Systems Context. Audit
Financiar 2021, 1, 119–129. [CrossRef]
54. Thach, N.N.; Hanh, H.T.; Huy, D.T.N.; Vu, Q.N. Technology quality management of the industry 4.0 and cybersecurity risk
management on current banking activities in emerging markets-the case in Vietnam. Int. J. Qual. Res. 2021, 15, 840–856. [CrossRef]
55. Tripodi, F.B. ReOpen demands as public health threat: A sociotechnical framework for understanding the stickiness of misinfor-
mation. Comput. Math. Organ. Theory 2022, 28, 321–334. [CrossRef]
56. Odemis, M.; Yucel, C.; Koltuksuz, A. Detecting user behavior in CTI: Development of honeypsy system. Secur. Commun. Netw.
arXiv 2022, arXiv:2304.07411. [CrossRef]
57. Vevera, A.V.; Cirnu, C.E.; Radulescu, C.Z. A Multi-Attribute Approach for CTI Product and Services Selection. Stud. Inform.
Control 2022, 31, 13–23. [CrossRef]
58. Du, L.; Fan, Y.; Zhang, L.; Wang, L.; Sun, T. A summary of the development of cyber security threat intelligence sharing. Int. J.
Digit. Crime Forensics (IJDCF) 2020, 12, 54–67. [CrossRef]
59. Westerlund, M. The emergence of deepfake technology: A review. Technol. Innov. Manag. Rev. 2019, 9. Available online:
https://timreview.ca/article/1282 (accessed on 30 June 2023). [CrossRef]
60. Sarhan, M.; Layeghy, S.; Moustafa, N.; Portmann, M. CTI sharing scheme based on federated learning for network intrusion
detection. J. Netw. Syst. Manag. 2023, 31, 3. [CrossRef]
61. Ramsdale, A.; Shiaeles, S.; Kolokotronis, N. A comparative analysis of cyber-threat intelligence sources, formats and languages.
Electronics 2020, 9, 824. [CrossRef]
62. Oosthoek, K.; Doerr, C. CTI: A product without a process? Int. J. Intell. CounterIntell. 2021, 34, 300–315. [CrossRef]
63. de Melo e Silva, A.; Costa Gondim, J.J.; de Oliveira Albuquerque, R.; García Villalba, L.J. A methodology to evaluate standards
and platforms within CTI. Future Internet 2020, 12, 108. [CrossRef]
64. Al Obaidan, F.; Saeed, S. Digital transformation and cybersecurity challenges: A study of malware detection using machine
learning techniques. In Handbook of Research on Advancing Cybersecurity for Digital Transformation; IGI Global: Hershey, PA, USA,
2021; pp. 203–226.
65. Saeed, S.; Bolívar, M.P.R.; Thurasamy, R. Pandemic, Lockdown, and Digital Transformation; Springer International Publishing: Cham,
Switzerland, 2021.
66. Naeem, H.; Ullah, F.; Naeem, M.R.; Khalid, S.; Vasan, D.; Jabbar, S.; Saeed, S. Malware detection in industrial internet of things
based on hybrid image visualization and deep learning model. Ad Hoc Netw. 2020, 105, 102154. [CrossRef]
67. Mekala, S.H.; Baig, Z.; Anwar, A.; Zeadally, S. Cybersecurity for industrial IoT (IIoT): Threats, countermeasures, challenges and
future directions. Comput. Commun. 2023, 208, 294–320. [CrossRef]
68. Saeed, S. Education, Online Presence and Cybersecurity Implications: A Study of Information Security Practices of Computing
Students in Saudi Arabia. Sustainability 2023, 15, 9426. [CrossRef]
69. Saeed, S. Digital Workplaces and Information Security Behavior of Business Employees: An Empirical Study of Saudi Arabia.
Sustainability 2023, 15, 6019. [CrossRef]
70. Kont, K.R. Libraries and cyber security: The importance of the human factor in preventing cyber attacks. Libr. Hi Tech News 2023.
[CrossRef]
71. Saeed, S. A Customer-Centric View of E-Commerce Security and Privacy. Appl. Sci. 2023, 13, 1020. [CrossRef]
72. Gull, H.; Alabbad, D.A.; Saqib, M.; Iqbal, S.Z.; Nasir, T.; Saeed, S.; Almuhaideb, A.M. E-Commerce and Cybersecurity Challenges:
Recent Advances and Future Trends. In Handbook of Research on Cybersecurity Issues and Challenges for Business and FinTech
Applications; IGI Global: Hershey, PA, USA, 2023; pp. 91–111.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual
author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to
people or property resulting from any ideas, methods, instructions or products referred to in the content.