Mtsweni, Jabu SMutemwa, MuyowaMkhonto, Njabulo2017-07-282017-07-282016Mtsweni, J.S., Mutemwa, M. and Mkhonto, N. 2016. Development of a cyber-threat intelligence-sharing model from big data sources. Journal of Information Warfare, vol. 15(3): 56-68.1445-3312https://www.jinfowar.com/journal/volume-15-issue-3/development-cyber-threat-intelligence-sharing-model-big-data-sourceshttp://hdl.handle.net/10204/9342Copyright: 2016 The authors. Journal of Information Warfare, vol. 15(3): 56-68As data in cyberspace continues to grow because of the ubiquity of Information Communication Technologies (ICT), it is becoming challenging to obtain context-aware, actionable information from Big Data to timely detect and respond to cyberattacks that are increasing in severity, complexity, and frequency. In fact, cybercriminals are developing and sharing advanced techniques for their cyber espionage, reconnaissance missions, and ultimately devastating attacks. In order to reduce cybersecurity risks and strengthen cyber resilience, strategic cybersecurity information-sharing is a necessity. This article discusses one way of handling large volumes of unstructured data that have been generated by multiple sources across different sectors into a cyber-threat intelligence-sharing model.enCybersecurityCyber-threat intelligenceCyber IntelligenceCrowdsourcingBig dataWeb securityVulnerabilitiesDevelopment of a cyber-threat intelligence-sharing model from big data sourcesArticleMtsweni, J. S., Mutemwa, M., & Mkhonto, N. (2016). Development of a cyber-threat intelligence-sharing model from big data sources. http://hdl.handle.net/10204/9342Mtsweni, Jabu S, Muyowa Mutemwa, and Njabulo Mkhonto "Development of a cyber-threat intelligence-sharing model from big data sources." (2016) http://hdl.handle.net/10204/9342Mtsweni JS, Mutemwa M, Mkhonto N. Development of a cyber-threat intelligence-sharing model from big data sources. 2016; http://hdl.handle.net/10204/9342.TY - Article AU - Mtsweni, Jabu S AU - Mutemwa, Muyowa AU - Mkhonto, Njabulo AB - As data in cyberspace continues to grow because of the ubiquity of Information Communication Technologies (ICT), it is becoming challenging to obtain context-aware, actionable information from Big Data to timely detect and respond to cyberattacks that are increasing in severity, complexity, and frequency. In fact, cybercriminals are developing and sharing advanced techniques for their cyber espionage, reconnaissance missions, and ultimately devastating attacks. In order to reduce cybersecurity risks and strengthen cyber resilience, strategic cybersecurity information-sharing is a necessity. This article discusses one way of handling large volumes of unstructured data that have been generated by multiple sources across different sectors into a cyber-threat intelligence-sharing model. DA - 2016 DB - ResearchSpace DP - CSIR KW - Cybersecurity KW - Cyber-threat intelligence KW - Cyber Intelligence KW - Crowdsourcing KW - Big data KW - Web security KW - Vulnerabilities LK - https://researchspace.csir.co.za PY - 2016 SM - 1445-3312 T1 - Development of a cyber-threat intelligence-sharing model from big data sources TI - Development of a cyber-threat intelligence-sharing model from big data sources UR - http://hdl.handle.net/10204/9342 ER -