Research and Implementation of Integrated Cyber Threat Intelligence Sharing System Platform

碩士 === 健行科技大學 === 資訊工程系碩士班 === 106 === In recent years, cyberattacks continue to happen. On the internet, a considerable number of cyberattacks happen every day, making cybersecurity a key element in the field of information. No services and network connections can be apart from cybersecurity. Howev...

Full description

Bibliographic Details
Main Authors: SYUAN-JHANG SU, 蘇炫彰
Other Authors: Hsin-Pei Chen
Format: Others
Language:zh-TW
Published: 2018
Online Access:http://ndltd.ncl.edu.tw/handle/pba25k
Description
Summary:碩士 === 健行科技大學 === 資訊工程系碩士班 === 106 === In recent years, cyberattacks continue to happen. On the internet, a considerable number of cyberattacks happen every day, making cybersecurity a key element in the field of information. No services and network connections can be apart from cybersecurity. However, there are numerous types of cyberattacks. In this case, how can attacks be detected before hackers launch them and ongoing attacks be discovered before they cause serious damage? These can hardly be achieved simply by relying on the information security defense that enterprises or organizations have in place. They require better responses based on cybersecurity intelligence shared by trusted partners. Therefore, how to obtain and read cyberthreat intelligence is an important question for cybersecurity professionals. In this study, a ASP.NET MVC web platform is built with MOTP for enhanced user identify authentication and a TAXII server built among the web servers. Based on this, cyberthreat intelligence is shared and viewed. Users can get free cyberthreat intelligence through this platform and use the server function to interact with servers and easily view cyberthreat intelligence in the STIX format with complicated and diverse content. They can easily use the platform created in this study simply by connecting to it without manual creation of a STIX database and a TAXII server. Cyberthreat intelligence is beginning to play an important role in the field of cybersecurity and it is believed that it can become a key weapon in the fight against hackers.