• English
  • Deutsch
  • Log In
    Password Login
    Research Outputs
    Fundings & Projects
    Researchers
    Institutes
    Statistics
Repository logo
Fraunhofer-Gesellschaft
  1. Home
  2. Fraunhofer-Gesellschaft
  3. Scopus
  4. Standardized and Usage-Controlled Alert Analysis for Improved Cyber Threat Intelligence
 
  • Details
  • Full
Options
2026
Conference Paper
Title

Standardized and Usage-Controlled Alert Analysis for Improved Cyber Threat Intelligence

Abstract
Today’s IT systems are constantly at risk of being attacked. Security mechanisms and surveillance technologies were developed to detect, record, analyze, and even mitigate such attacks. However, alerts of such events are often structured using individual standards, produced by different commercial, governmental, or even open source community driven organizations. This leads to two problems. First, limited interoperability, because the attributes of the standards highly differ not just in the format but in content, also. Second, SOCs and SIEMs can not share their alert data due to regulations or the danger of leakage. Here we show an architecture which solves both problems using the alert format IDMEFv2 and an alert sharing architecture which provides usage control of shared sensitive alerts. Our system defends against information leakage while still providing the capability to combine, aggregate, and analyze sensitive information which enables the generation of advanced cyber threat intelligence. This is a scenario that would normally be impossible in real world scenarios. Using information sources from both cyber security contexts together with physical contexts and technically attested confidential processing of not just nonsensitive alert data, but even sensitive data, may provide necessary insights to provide countermeasures for existing threats faster. Gathered data is processed using conventional analyses and AI/ML techniques. Since our work is still in progress, the upcoming analysis about our proof-of-concept will be used to evaluate the potential of the approach in terms of scalability, complexity, flexibility, performance, effectiveness, and most importantly security.
Author(s)
Meyer zum Felde, Hendrik
Fraunhofer-Institut für Angewandte und Integrierte Sicherheit AISEC  
Azzabi, Radhouene
CEA Tech en Occitanie
Gouy-Pailler, Cédric
Université Paris-Saclay
Lehmann, Gilles
Télécom SudParis
Gil, Amaia
VICOMTech
Mainwork
Applied Cryptography and Network Security Workshops. ACNS 2025 Satellite Workshops. Part III  
Conference
International Conference on Applied Cryptography and Network Security 2025  
Workshop on Critical Infrastructure and Manufacturing System Security 2025  
DOI
10.1007/978-3-032-01823-6_10
Language
English
Fraunhofer-Institut für Angewandte und Integrierte Sicherheit AISEC  
Keyword(s)
  • Alert standardization

  • CTI generation

  • Usage control

  • Cookie settings
  • Imprint
  • Privacy policy
  • Api
  • Contact
© 2024