Skip to main content
Login | Suomeksi | På svenska | In English

Integrating a threat information management platform with a security information and event management system

Show simple item record

dc.date.accessioned 2016-11-16T13:57:04Z und
dc.date.accessioned 2017-10-24T12:24:19Z
dc.date.available 2016-11-16T13:57:04Z und
dc.date.available 2017-10-24T12:24:19Z
dc.date.issued 2016-11-16T13:57:04Z
dc.identifier.uri http://radr.hulib.helsinki.fi/handle/10138.1/5849 und
dc.identifier.uri http://hdl.handle.net/10138.1/5849
dc.title Integrating a threat information management platform with a security information and event management system en
ethesis.discipline Computer science en
ethesis.discipline Tietojenkäsittelytiede fi
ethesis.discipline Datavetenskap sv
ethesis.discipline.URI http://data.hulib.helsinki.fi/id/1dcabbeb-f422-4eec-aaff-bb11d7501348
ethesis.department.URI http://data.hulib.helsinki.fi/id/225405e8-3362-4197-a7fd-6e7b79e52d14
ethesis.department Institutionen för datavetenskap sv
ethesis.department Department of Computer Science en
ethesis.department Tietojenkäsittelytieteen laitos fi
ethesis.faculty Matematisk-naturvetenskapliga fakulteten sv
ethesis.faculty Matemaattis-luonnontieteellinen tiedekunta fi
ethesis.faculty Faculty of Science en
ethesis.faculty.URI http://data.hulib.helsinki.fi/id/8d59209f-6614-4edd-9744-1ebdaf1d13ca
ethesis.university.URI http://data.hulib.helsinki.fi/id/50ae46d8-7ba9-4821-877c-c994c78b0d97
ethesis.university Helsingfors universitet sv
ethesis.university University of Helsinki en
ethesis.university Helsingin yliopisto fi
dct.creator Reiman, Tomi
dct.issued 2016
dct.language.ISO639-2 eng
dct.abstract Cyberthreat intelligence is currently a hot topic in the information security community. Today's business models are forcing organizations to move into the cyberspace, and because of this they phase new threats. Organizations need to address these new threats in order to protect their systems from adversaries. One method for doing so is to develop a threat intelligence program, in which the organization actively gathers intelligence about current and emerging cyberthreats. Indicators of compromise can be used in organization's security infrastructure to look for and to prevent threats in near real-time. Indicators can be obtained from public intelligence feeds, and they can be shared in threat information sharing communities formed by organizations facing similar threats. Regardless of the source of threat intelligence, the intelligence should be evaluated by skilled security analysts to verify that the indicators of compromise suit the target environment. By sharing threat information organizations can benefit from security incidents seen by other organizations, and the participants can leverage the actionable intelligence to adjust their defenses before similar threats realize within their own network. Organizations can utilize purpose-built software to manage their threat intelligence. This supports the organization in developing its threat intelligence program. Threat information management platforms aid organizations in managing the quality and richness of threat intelligence and these platforms often come with information sharing capabilities built into the software, enabling organizations to share threat intelligence with each other. Organizations are able to distribute actionable intelligence into their security infrastructure more easily if they use a threat information management platform as the centralized point for managing the organization's threat intelligence. An example of an integration point is the organization's security information and event management (SIEM) system, which is often utilized by a security operations center (SOC) to perform analytics on the organization's log data. When the logs collected by a SIEM system are enriched with actionable intelligence security analysts are likely to see more informed alerts and less false positives. This thesis defines an integration between a threat information management platform and a SIEM.We measure and evaluate how much the integration reduces SOC's burden of manually importing threat intelligence into their monitoring infrastructure. Two questionnaires with SOC analysts were carried out for this purpose. We also evaluate how much integration fastens the deployment of actionable intelligence for detecting emerging threats. The evaluation is based on security incident ticket data obtained from a production SOC environment. en
dct.language en
ethesis.language.URI http://data.hulib.helsinki.fi/id/languages/eng
ethesis.language English en
ethesis.language englanti fi
ethesis.language engelska sv
ethesis.thesistype pro gradu-avhandlingar sv
ethesis.thesistype pro gradu -tutkielmat fi
ethesis.thesistype master's thesis en
ethesis.thesistype.URI http://data.hulib.helsinki.fi/id/thesistypes/mastersthesis
dct.identifier.urn URN:NBN:fi-fe2017112251240
dc.type.dcmitype Text

Files in this item

Files Size Format View
masters_thesis-24-08-2016_treiman_013746801.pdf 1.066Mb PDF

This item appears in the following Collection(s)

Show simple item record