Choose one of the following topics (or any cybersecurity-related topic) to work on individually. Writeup based final Project (start working once assigned in the group) Research Methods inCyberThreat...

1 answer below »

Choose one of the following topics (or any cybersecurity-related topic) to work on individually.

  • Writeup based final Project (start working once assigned in the group)





    • Research Methods inCyberThreat Intelligence

    • Survey on GPS Spoofing

    • Blockchain-basedCyberThreat Intelligence

    • Survey on Privacy-Preserving Machine Learning Methods

    • Survey on Reconstruction based privacy attacks




Guidelines for writing Final Report:

  1. Define each area/domain and its significance. For example, those working on Blockchain-based Cyber Threat Intel. will define in detail, what blockchain tech. and Cyber Threat Intelligence is.

  2. Define how significant and relevant that problem to Cybersecurity, and what kind of threats are there which need to be addressed.

  3. In the third section, you will be summarizing, each state of the art techniques focused on addressing above discussed issues that have been published in the last 10 years.

  4. In the last section you will try to answer the gap or the un-addressedissues, which has yet to be answered (of course in your perspective)

For sections 1 and 2 you can use any unpublished (but reliable source) information, which includes, Tech. reports, or tech magazines (avoid social media-based articles they are not viable sources of information).For section 3 and 4, you will only have to cite at least 15 peer-reviewed articles, from conferences, journals, and book chapters. No other citation will be accepted.I will check plagiarism using online software, so if you have copied and pasted from anywhere on the internet it will be visible in the report.This means, you are only allowed 20% of overlap with internet material, and you will have to write everything in your own words. Plagiarism over 20% will simply entail zero marks.
Answered Same DayMay 08, 2021

Answer To: Choose one of the following topics (or any cybersecurity-related topic) to work on individually....

Neha answered on May 08 2021
137 Votes
Blockchain-Based Cyber Threat Intelligence System
Abstract
Currently it is very important to have a proper design for the cyber physical system as they play a significant role, and it is important for the substantial part when we are developing the sustainable computing ecosystem so that it can provide a secure and scalable network architecture. The introduction of the cyber threat intelligence has emerged as the most important system for the security of the organization, and it is able to
mitigate the current cyber terrorist for next level applications.
The cyber threat intelligence needs a lot of the requirements at every step if we specially talk about the data collection for the critical source then it is the source of the information which can analyse and share the information. It is also dependent over the reliability of the data. There are many feeds which can provide information over the threats which have taken place recently are also important for collecting the reliable data the data can be collected from the unknown origin and it can provide information for the threats which are not verified.
Additionally, there are effective resource management which are used in the proper place so that we can have the large volume and the diversity of the data. In this paper we will discuss about the blockchain based cyber threat intelligence system which can be used to understand how it is used for the threat intelligence system. In this paper we will try to address the issues like reliability, sustainability, scalability and the privacy. With the help of the model, we can collect cyber threat intelligence data, create a reliable data set, reduce overall load from the network and then measure the contributions of the organization for motivating the participation. We can also create a model and perform the experimental analysis over it to handle the different measures like the privacy, reliability, sustainability and the scalability.
Introduction
The current system which is present in the network has major focus over reducing, recovering and restoring the damage system once the cyber-attack has been performed over it. We can understand the whole topic by introducing the concept of the cyber threat intelligence and how it is responsible to respond for the different attacks pre-emptively.
These attacks can be denied of service attack at the distributed level, which is able to paralyse the whole system, advanced persistent threat which attack over the organization in different areas which has high information values like the government agencies or the financial industry and also the ransomware which can restore the financial profit from the companies.
The cyber threat intelligence can be defined as the concept which is able to protect against different cyber threats which are performed in the multiple organization so that it becomes easier for them to collect the data, analyse it and share all the information. The organization are able to repair themselves from the known attacks. There are many small and medium sized companies who find it difficult to consume a lot of resources and manpower to handle the security and it becomes difficult for them to defend against the cyber-attacks like the ransomware, distributed denial of service and the APT.
There are companies which have limited security expert ice and the limited budget for the security hence it is useful for them to use the cyber threat intelligence information sharing so that it will be easier for them to protect themselves against the cyber threats. As per a study performed in the sense there are 81% of the security professionals who think that cyber threat intelligence is able to improve the security of organization.
The cyber threat intelligence has the positive effect hence it has become the standard technologies for performing the research in the information security industry like the FBI. These studies also include the structure threat information expression to perform the structure representation of all the cyber threat information, protocol which can share the information related with the cyber threat intelligence, cyber observable expressions, trusted automated exchange of the indicator information and the integrated security information which is able to express the observation information about cyber threat status or the events like the log.
This structure cyber threat information allows the user to have consistent analysis and automated interpretation for the system. There are different methods for sharing the threat information like trusted automated exchange of the indicator information which are encouraging the organization to share the information at the global level by different legal procedures and the governments.
The major aim of the cyber threat intelligence is to automate all the processes so that it can reduce the manpower and the resources which are required to enhance the security of the system and...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here