- Home
- Search Results
- Page 1 of 1
Search for: All records
-
Total Resources4
- Resource Type
-
30010
- Availability
-
40
- Author / Contributor
- Filter by Author / Creator
-
-
Levchenko, Kirill (3)
-
McCoy, Damon (3)
-
Pearce, Paul (3)
-
Dunn, Matthew (2)
-
Li, Vector Guo (2)
-
Savage, Stefan (2)
-
Voelker, Geoffrey M. (2)
-
Abakumov, Artem M. (1)
-
Alves Dalla Corte, Daniel (1)
-
Cabana, Jordi (1)
-
Deschamps, Michael (1)
-
Dharmdasani, Hitesh (1)
-
Farinholt, Brown (1)
-
Giaume, Domitille (1)
-
Grimaud, Alexis (1)
-
Li, Heifang (1)
-
Pearce, Paul E. (1)
-
Pimenta, Vanessa (1)
-
Rezaeirad, Mohammad (1)
-
Rousse, Gwenaëlle (1)
-
- Filter by Editor
-
-
& Spizer, S. M. (0)
-
& . Spizer, S. (0)
-
& Ahn, J. (0)
-
& Bateiha, S. (0)
-
& Bosch, N. (0)
-
& Brennan K. (0)
-
& Brennan, K. (0)
-
& Chen, B. (0)
-
& Chen, Bodong (0)
-
& Drown, S. (0)
-
& Ferretti, F. (0)
-
& Higgins, A. (0)
-
& J. Peters (0)
-
& Kali, Y. (0)
-
& Ruiz-Arias, P.M. (0)
-
& S. Spitzer (0)
-
& Spitzer, S. (0)
-
& Spitzer, S.M. (0)
-
(submitted - in Review for IEEE ICASSP-2024) (0)
-
- (0)
-
-
Have feedback or suggestions for a way to improve these results?
!
Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
Li, Vector Guo ; Dunn, Matthew ; Pearce, Paul ; McCoy, Damon ; Voelker, Geoffrey M. ; Savage, Stefan ; Levchenko, Kirill ( , USENIX Security Symposium)The term "threat intelligence" has swiftly become a staple buzzword in the computer security industry. The entirely reasonable premise is that, by compiling up-to-date information about known threats (i.e., IP addresses, domain names, file hashes, etc.), recipients of such information may be able to better defend their systems from future attacks. Thus, today a wide array of public and commercial sources distribute threat intelligence data feeds to support this purpose. However, our understanding of this data, its characterization and the extent to which it can meaningfully support its intended uses, is still quite limited. In this paper, we address these gaps by formally defining a set of metrics for characterizing threat intelligence data feeds and using these measures to systematically characterize a broad range of public and commercial sources. Further, we ground our quantitative assessments using external measurements to qualitatively investigate issues of coverage and accuracy. Unfortunately, our measurement results suggest that there are significant limitations and challenges in using existing threat intelligence data for its purported goals.more » « less
-
Li, Vector Guo ; Dunn, Matthew ; Pearce, Paul ; McCoy, Damon ; Voelker, Geoffrey M. ; Savage, Stefan ; Levchenko, Kirill ( , 28th USENIX Security Symposium)
-
Rezaeirad, Mohammad ; Farinholt, Brown ; Dharmdasani, Hitesh ; Pearce, Paul ; Levchenko, Kirill ; McCoy, Damon ( , 27th USENIX Security Symposium)