SlideShare a Scribd company logo
1 of 10
1
”A different cup of TI?
The added value of commercial threat intelligence”
Candidata:
Alessandra Amato
Relatore:
Alberto Bartoli
06.07.2021
Università degli Studi di Trieste
Dipartimento di Ingegneria e Architettura
Corso di Laurea in Ingegneria Elettronica e Informatica
Bouwman, X., Griffioen, H., Egbers, J., Doerr, C., Klievink, B., & van Eeten, M. (2020). A different cup of TI? The added value of commercial threat
intelligence. 433-450. Paper presented at 29th USENIX Security Symposium (Virtual/online event due to COVID-19), Online event, United States.
https://www.usenix.org/conference/usenixsecurity20/presentation/bouwman
Extended summary of
2
Alessandra Amato
Table of Contents
01
02
03
04
Introduction
Methodology
Findings
Conclusions
• Paid TI services and pricing
• Comparison: overlap and timeliness
• Use cases and value perception of TI
Methodology Findings Conclusions
Introduction
Alessandra Amato 3
Threat intelligence, also known as TI, refers to the knowledge about attackers’ behavior and
techniques that help improve the defenses from cyber-attacks.
Focus of the study:
3 external sources of TI:
Shared TI (STI)
services and costs offered by PTI
differences in the data provided by PTI and OTI
customers’ value criteria and use cases of TI
Open TI (OTI) Paid TI (PTI)
Methodology Findings Conclusions
Introduction
Alessandra Amato 4
Collection of 3-5 subsets
from two market leaders
Comparison of the indicators to
each other
Comparison of the indicators to one
month of data by 4 OTI sources
Analytic codes from the responses
Interviews with 14 security
professionals
Methodology
Methodology Findings Conclusions
Introduction
Alessandra Amato 5
Indicators of compromise (IOCs): signals of the attacker’s presence.
Reports: information on the techniques and purposes of the attacker.
Requests for information (RFI)
Portals
Data mining platforms and aggregators
Custom alerts
COSTS: from $30,000 to $650,000 per year
Paid TI services and pricing
Methodology Findings Conclusions
Introduction
Alessandra Amato 6
PTI vendors
PTI versus OTI
• Average overlap for each indicator type: <4%
• PTI indicators observed by OTI sources: 1%
• Vendor 1’s indicators listed by Vendor 2: 13%
• Vendor 2’s indicators listed by Vendor 1: 1,3%
• OTI indicators observed by PTI sources: 0,0%
COMPARISON: Overlap
Methodology Findings Conclusions
Introduction
Alessandra Amato 7
The study was conducted by analyzing the delay in which an indicator, observed by
one source, is also observed by the other source.
PTI vendors
on average more than one month of delay
PTI versus OTI
no substantial conclusions
COMPARISON: Timeliness
Methodology Findings Conclusions
Introduction
Alessandra Amato 8
Network detection: concerns all the
instances in which TI is employed
automatically to mitigate cyber-
attacks.
Situational awareness:
to improve analysts’
perception of the
enterprise’s risk
situation.
SOC prioritization:
TI is applied to direct the
investigation of SOC
teams towards relevant
threats.
Use cases of TI
Methodology Findings Conclusions
Introduction
Alessandra Amato 9
Optimization of the inputs into
the analysts’ workflow:
Only 50% considered it as a valuable feature
Coverage of relevant threats
• Limited operational impact when automated
• Minimal number of false positives
• Smaller and accurate sets
Value perception of TI
Methodology Findings Conclusions
Introduction
Alessandra Amato 10
PTI and OTI are two different kinds of
threat intelligence.
Doubts on the coverage that PTI provides.
TI evaluation based on the impact on
anaylists’ time and false-positives ratio.
Minimal number of common indicators
between OTI e PTI sources:
Slight overlap and important delay between
the indicators of the two vendors:
Customers not optimizing for coverage:
Conclusions

More Related Content

Similar to Extended summary of "A different cup of TI? The added value of commercial threat intelligence"

DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
PECB
 
WP2018 O.1.3.2 Priorities for EU RD - Economics of vulnerability disclosure.pdf
WP2018 O.1.3.2 Priorities for EU RD - Economics of vulnerability disclosure.pdfWP2018 O.1.3.2 Priorities for EU RD - Economics of vulnerability disclosure.pdf
WP2018 O.1.3.2 Priorities for EU RD - Economics of vulnerability disclosure.pdf
ritikashinde6
 
20TL045_IDS for Cyber Security AI,ML Based (1).pptx
20TL045_IDS for Cyber Security AI,ML Based (1).pptx20TL045_IDS for Cyber Security AI,ML Based (1).pptx
20TL045_IDS for Cyber Security AI,ML Based (1).pptx
zahidab112233
 

Similar to Extended summary of "A different cup of TI? The added value of commercial threat intelligence" (20)

DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
 
AM Briefing: Security for the internet of things
AM Briefing: Security for the internet of things AM Briefing: Security for the internet of things
AM Briefing: Security for the internet of things
 
Ctia course outline
Ctia course outlineCtia course outline
Ctia course outline
 
Welcome to the world of Cyber Threat Intelligence
Welcome to the world of Cyber Threat IntelligenceWelcome to the world of Cyber Threat Intelligence
Welcome to the world of Cyber Threat Intelligence
 
Internet service providers responsibilities in botnet mitigation: a Nigerian ...
Internet service providers responsibilities in botnet mitigation: a Nigerian ...Internet service providers responsibilities in botnet mitigation: a Nigerian ...
Internet service providers responsibilities in botnet mitigation: a Nigerian ...
 
Casestudy On It Development Outsource
Casestudy On It Development OutsourceCasestudy On It Development Outsource
Casestudy On It Development Outsource
 
Combating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCombating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced Analytics
 
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
 
Developing a Continuous Monitoring Action Plan
Developing a Continuous Monitoring Action PlanDeveloping a Continuous Monitoring Action Plan
Developing a Continuous Monitoring Action Plan
 
ICT Resilience in EU
ICT Resilience in EUICT Resilience in EU
ICT Resilience in EU
 
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONBEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 
Cyber threat intelligence ppt
Cyber threat intelligence pptCyber threat intelligence ppt
Cyber threat intelligence ppt
 
WP2018 O.1.3.2 Priorities for EU RD - Economics of vulnerability disclosure.pdf
WP2018 O.1.3.2 Priorities for EU RD - Economics of vulnerability disclosure.pdfWP2018 O.1.3.2 Priorities for EU RD - Economics of vulnerability disclosure.pdf
WP2018 O.1.3.2 Priorities for EU RD - Economics of vulnerability disclosure.pdf
 
Chen, t., j. zhang and k.k. lai, 2009. an integrated real options evaluating ...
Chen, t., j. zhang and k.k. lai, 2009. an integrated real options evaluating ...Chen, t., j. zhang and k.k. lai, 2009. an integrated real options evaluating ...
Chen, t., j. zhang and k.k. lai, 2009. an integrated real options evaluating ...
 
FDseminar IT Risk - Yuri Bobbert - Antwerp Management School
FDseminar IT Risk - Yuri Bobbert - Antwerp Management School	FDseminar IT Risk - Yuri Bobbert - Antwerp Management School
FDseminar IT Risk - Yuri Bobbert - Antwerp Management School
 
20TL045_IDS for Cyber Security AI,ML Based (1).pptx
20TL045_IDS for Cyber Security AI,ML Based (1).pptx20TL045_IDS for Cyber Security AI,ML Based (1).pptx
20TL045_IDS for Cyber Security AI,ML Based (1).pptx
 
Indian Market for Video Surveillance and Electronic Security
Indian Market for Video Surveillance and Electronic SecurityIndian Market for Video Surveillance and Electronic Security
Indian Market for Video Surveillance and Electronic Security
 
IoT-Enabled Predictive Maintenance Infobite
IoT-Enabled Predictive Maintenance InfobiteIoT-Enabled Predictive Maintenance Infobite
IoT-Enabled Predictive Maintenance Infobite
 

Recently uploaded

Artificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdfArtificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdf
Kira Dess
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证成绩单学位证书
一比一原版(Griffith毕业证书)格里菲斯大学毕业证成绩单学位证书一比一原版(Griffith毕业证书)格里菲斯大学毕业证成绩单学位证书
一比一原版(Griffith毕业证书)格里菲斯大学毕业证成绩单学位证书
c3384a92eb32
 
☎️Looking for Abortion Pills? Contact +27791653574.. 💊💊Available in Gaborone ...
☎️Looking for Abortion Pills? Contact +27791653574.. 💊💊Available in Gaborone ...☎️Looking for Abortion Pills? Contact +27791653574.. 💊💊Available in Gaborone ...
☎️Looking for Abortion Pills? Contact +27791653574.. 💊💊Available in Gaborone ...
mikehavy0
 

Recently uploaded (20)

Autodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptxAutodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptx
 
Call for Papers - Journal of Electrical Systems (JES), E-ISSN: 1112-5209, ind...
Call for Papers - Journal of Electrical Systems (JES), E-ISSN: 1112-5209, ind...Call for Papers - Journal of Electrical Systems (JES), E-ISSN: 1112-5209, ind...
Call for Papers - Journal of Electrical Systems (JES), E-ISSN: 1112-5209, ind...
 
Circuit Breakers for Engineering Students
Circuit Breakers for Engineering StudentsCircuit Breakers for Engineering Students
Circuit Breakers for Engineering Students
 
Independent Solar-Powered Electric Vehicle Charging Station
Independent Solar-Powered Electric Vehicle Charging StationIndependent Solar-Powered Electric Vehicle Charging Station
Independent Solar-Powered Electric Vehicle Charging Station
 
Working Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdfWorking Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdf
 
Artificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdfArtificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdf
 
Filters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility ApplicationsFilters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility Applications
 
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfInvolute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证成绩单学位证书
一比一原版(Griffith毕业证书)格里菲斯大学毕业证成绩单学位证书一比一原版(Griffith毕业证书)格里菲斯大学毕业证成绩单学位证书
一比一原版(Griffith毕业证书)格里菲斯大学毕业证成绩单学位证书
 
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdflitvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
 
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and ToolsMaximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
 
handbook on reinforce concrete and detailing
handbook on reinforce concrete and detailinghandbook on reinforce concrete and detailing
handbook on reinforce concrete and detailing
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
 
Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...
 
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
 
Signal Processing and Linear System Analysis
Signal Processing and Linear System AnalysisSignal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
 
DBMS-Report on Student management system.pptx
DBMS-Report on Student management system.pptxDBMS-Report on Student management system.pptx
DBMS-Report on Student management system.pptx
 
☎️Looking for Abortion Pills? Contact +27791653574.. 💊💊Available in Gaborone ...
☎️Looking for Abortion Pills? Contact +27791653574.. 💊💊Available in Gaborone ...☎️Looking for Abortion Pills? Contact +27791653574.. 💊💊Available in Gaborone ...
☎️Looking for Abortion Pills? Contact +27791653574.. 💊💊Available in Gaborone ...
 
Artificial Intelligence in due diligence
Artificial Intelligence in due diligenceArtificial Intelligence in due diligence
Artificial Intelligence in due diligence
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptx
 

Extended summary of "A different cup of TI? The added value of commercial threat intelligence"

  • 1. 1 ”A different cup of TI? The added value of commercial threat intelligence” Candidata: Alessandra Amato Relatore: Alberto Bartoli 06.07.2021 Università degli Studi di Trieste Dipartimento di Ingegneria e Architettura Corso di Laurea in Ingegneria Elettronica e Informatica Bouwman, X., Griffioen, H., Egbers, J., Doerr, C., Klievink, B., & van Eeten, M. (2020). A different cup of TI? The added value of commercial threat intelligence. 433-450. Paper presented at 29th USENIX Security Symposium (Virtual/online event due to COVID-19), Online event, United States. https://www.usenix.org/conference/usenixsecurity20/presentation/bouwman Extended summary of
  • 2. 2 Alessandra Amato Table of Contents 01 02 03 04 Introduction Methodology Findings Conclusions • Paid TI services and pricing • Comparison: overlap and timeliness • Use cases and value perception of TI
  • 3. Methodology Findings Conclusions Introduction Alessandra Amato 3 Threat intelligence, also known as TI, refers to the knowledge about attackers’ behavior and techniques that help improve the defenses from cyber-attacks. Focus of the study: 3 external sources of TI: Shared TI (STI) services and costs offered by PTI differences in the data provided by PTI and OTI customers’ value criteria and use cases of TI Open TI (OTI) Paid TI (PTI)
  • 4. Methodology Findings Conclusions Introduction Alessandra Amato 4 Collection of 3-5 subsets from two market leaders Comparison of the indicators to each other Comparison of the indicators to one month of data by 4 OTI sources Analytic codes from the responses Interviews with 14 security professionals Methodology
  • 5. Methodology Findings Conclusions Introduction Alessandra Amato 5 Indicators of compromise (IOCs): signals of the attacker’s presence. Reports: information on the techniques and purposes of the attacker. Requests for information (RFI) Portals Data mining platforms and aggregators Custom alerts COSTS: from $30,000 to $650,000 per year Paid TI services and pricing
  • 6. Methodology Findings Conclusions Introduction Alessandra Amato 6 PTI vendors PTI versus OTI • Average overlap for each indicator type: <4% • PTI indicators observed by OTI sources: 1% • Vendor 1’s indicators listed by Vendor 2: 13% • Vendor 2’s indicators listed by Vendor 1: 1,3% • OTI indicators observed by PTI sources: 0,0% COMPARISON: Overlap
  • 7. Methodology Findings Conclusions Introduction Alessandra Amato 7 The study was conducted by analyzing the delay in which an indicator, observed by one source, is also observed by the other source. PTI vendors on average more than one month of delay PTI versus OTI no substantial conclusions COMPARISON: Timeliness
  • 8. Methodology Findings Conclusions Introduction Alessandra Amato 8 Network detection: concerns all the instances in which TI is employed automatically to mitigate cyber- attacks. Situational awareness: to improve analysts’ perception of the enterprise’s risk situation. SOC prioritization: TI is applied to direct the investigation of SOC teams towards relevant threats. Use cases of TI
  • 9. Methodology Findings Conclusions Introduction Alessandra Amato 9 Optimization of the inputs into the analysts’ workflow: Only 50% considered it as a valuable feature Coverage of relevant threats • Limited operational impact when automated • Minimal number of false positives • Smaller and accurate sets Value perception of TI
  • 10. Methodology Findings Conclusions Introduction Alessandra Amato 10 PTI and OTI are two different kinds of threat intelligence. Doubts on the coverage that PTI provides. TI evaluation based on the impact on anaylists’ time and false-positives ratio. Minimal number of common indicators between OTI e PTI sources: Slight overlap and important delay between the indicators of the two vendors: Customers not optimizing for coverage: Conclusions