Submitted:
17 March 2025
Posted:
18 March 2025
You are already at the latest version
Abstract

Keywords:
1. Introduction
- RQ1: In what ways can the relevance and actionability of unstructured CTI products be defined and quantitatively assessed?
- RQ2: What methodologies can be employed to rigorously assess the CTI products in relation to the organizations willing to use them?
- RQ3: In what manner can the proposed methodologies be systematically applied to extensive datasets?
2. Related Work
3. Background
3.1. Key Concepts
3.1.1. Unstructured CTI Products
3.1.2. Relevance CTI quality factor
3.1.3. Actionability CTI Quality Factor
3.2. Problem Definition
3.3. Probabilistic Algorithms & Data Structures
3.3.1. Probabilistic Algorithms and Data Structures of Similarity Category
3.3.2. Probabilistic Algorithms and Data Structures of Membership Problem Category
4. Proposed Algorithms
4.1. Defining the Relevance CTI Quality Metric
4.1.1. Determining Organization C
- the general environment,
- the task environment, and
- the internal environment.
4.1.2. Organization Aspects and the Relevance CTI Quality Metric
4.1.3. Relevance Metric Generic Calculation Mechanism
STEP 1
STEP 2
STEP 3
STEP 4
STEP 5
| Algorithm 1 Metric Calculation Algorithm |
|
STEP 6
STEP 7
STEP 8
4.2. Defining the Actionability CTI Quality Metric
4.2.1. Cybersecurity Decision-Making Process and Actionability
4.2.2. Defense Mechanism Modeling
4.2.3. Actionability Metric Generic Calculation Mechanism
STEP 1
STEP 2
STEP 3
STEP 4
STEP 5
STEP 6
| Algorithm 2 Metric Calculation Algorithm |
|
STEP 7
STEP 8
5. Implementation - Experiments
5.1. Experimental Environment of Relevance Metric
- Does face any cyberattack?
- Are products affected by any vulnerability?
5.2. Experimental Environment Actionability Metric
5.3. Analysis of Experimental Results
5.3.1. Relevance Metric Experimental Results Analysis
5.3.2. Actionability Metric Experimental Results Analysis
5.3.3. Relevance and Actionability Metrics Experimental Results of an Organization
6. Conclusion
- How can we leverage all the characteristics of the probabilistic data structures in the metrics’ calculation (e.g., Cuckoo filters dynamic update)?
- Can we formally and structured define the organizations information needs in the context of CTI?
- How can we utilize those metrics to integrate on real-time the selected CTI products in the knowledge bases of the organizations’ defense mechanisms?
Author Contributions
Data Availability Statement
References
- ENISA. ENISA Threat Landscape 2022. Technical report, ENISA, Athens, 2022. [CrossRef]
- Sakellariou, G.; Fouliras, P.; Mavridis, I.; Sarigiannidis, P. A Reference Model for Cyber Threat Intelligence (CTI) Systems. Electronics 2022, Vol. 11, Page 1401 2022, 11, 1401. [Google Scholar] [CrossRef]
- MANDIANT. Global Perspectives on Threat Intelligence. Technical report, MANDIANT, Reston, 2023.
- Taleb, I.; Serhani, M.A.; Dssouli, R. Big Data Quality Assessment Model for Unstructured Data. In Proceedings of the Proceedings of the 2018 13th International Conference on Innovations in Information Technology, IIT 2018, Al Ain, United Arab Emirates, 2 2019. [CrossRef]
- Azevedo, R.; Medeiros, I.; Bessani, A. PURE: Generating quality threat intelligence by clustering and correlating OSINT. In Proceedings of the Proceedings - 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand; 8 2019; pp. 483–490. [Google Scholar] [CrossRef]
- Schaberreiter, T.; Kupfersberger, V.; Rantos, K.; Spyros, A.; Papanikolaou, A.; Ilioudis, C.; Quirchmayr, G. A quantitative evaluation of trust in the quality of cyber threat intelligence sources. In Proceedings of the ACM International Conference Proceeding Series, New York, NY, USA; 8 2019; p. 10. [Google Scholar] [CrossRef]
- Chismon, D.; Ruks, M. Threat intelligence: Collecting, analysing, evaluating. Technical report, MWR InfoSecurity, London, 2015.
- Zhang, S.; Chen, P.; Bai, G.; Wang, S.; Zhang, M.; Li, S.; Zhao, C. An Automatic Assessment Method of Cyber Threat Intelligence Combined with ATT&CK Matrix. Wireless Communications and Mobile Computing 2022, 2022, 12. [Google Scholar] [CrossRef]
- MITRE. MITRE ATT&CK®, 2021.
- Tao, Y.; Zhang, Y.x.; Ma, S.y.; Fan, K.; Li, M.y.; Guo, F.m.; Xu, Z. Combining the big data analysis and the threat intelligence technologies for the classified protection model. Cluster Computing 2017, 20, 1035–1046. [Google Scholar] [CrossRef]
- Marchetti, M.; Guido, A.; Pierazzi, F.; Colajanni, M. Countering Advanced Persistent Threats through security intelligence and big data analytics. In Proceedings of the International Conference on Cyber Conflict, CYCON, Tallinn, Estonia, 8 2016; Vol. 2016-August; pp. 243–261. [Google Scholar] [CrossRef]
- Wheelus, C.; Bou-Harb, E.; Zhu, X. Towards a big data architecture for facilitating cyber threat intelligence. In Proceedings of the 2016 8th IFIP International Conference on New Technologies, Mobility and Security, NTMS 2016, Larnaca, Cyprus; 12 2016; pp. 1–5. [Google Scholar] [CrossRef]
- Martins, C.; Medeiros, I. Generating Quality Threat Intelligence Leveraging OSINT and a Cyber Threat Unified Taxonomy. ACM Transactions on Privacy and Security 2022, 25, 39. [Google Scholar] [CrossRef]
- Fujii, S.; Kawaguchi, N.; Shigemoto, T.; Yamauchi, T. CyNER: Information Extraction from Unstructured Text of CTI Sources with Noncontextual IOCs. In Proceedings of the Advances in Information and Computer Security; Cheng, C.M.; Akiyama, M., Eds., Cham; 2022; pp. 85–104. [Google Scholar]
- Jordan, B.; Piazza, R.; Wunder, J. STIX v2.0 Specification, 2017.
- Watson, K. Assessing the Potential Value of Cyber Threat Intelligence (CTI) Feeds. Technical report, Johns Hopkins Applied Physics Laboratory, Laurel, 2020.
- Pawlinski, P.; Jaroszewski, P.; Kijewski, P.; Siewierski, L.; Jacewicz, P.; Zielony, P.; Zuber, R. Actionable information for security incident response. Technical report, ENISA, Athens, 2014.
- Deliu, I.; Leichter, C.; Franke, K. Collecting Cyber Threat Intelligence from Hacker Forums via a Two-Stage, Hybrid Process using Support Vector Machines and Latent Dirichlet Allocation. In Proceedings of the 2018 IEEE International Conference on Big Data (Big Data), Seattle; 12 2018; pp. 5008–5013. [Google Scholar] [CrossRef]
- Wagner, T.D.; Mahbub, K.; Palomar, E.; Abdallah, A.E. Cyber threat intelligence sharing: Survey and research directions. Computers & Security 2019, 87, 101589. [Google Scholar] [CrossRef]
- Gakhov, A. Probabilistic Data Structures and Algorithms for Big Data Applications, 1st ed.; BoD–Books on Demand: Norderstedt, 2022. [Google Scholar]
- Broder, A.Z. On the resemblance and containment of documents. In Proceedings of the Proceedings of the International Conference on Compression and Complexity of Sequences, Salerno, 1997. [CrossRef]
- Indyk, P.; Motwani, R. Approximate nearest neighbors: Towards removing the curse of dimensionality. In Proceedings of the Conference Proceedings of the Annual ACM Symposium on Theory of Computing, Dallas, Texas, USA, 1998.
- Bloom, B.H. Space/time trade-offs in hash coding with allowable errors. Communications of the ACM 1970, 13, 422–426. [Google Scholar] [CrossRef]
- Fan, B.; Andersen, D.G.; Kaminsky, M.; Mitzenmacher, M.D. Cuckoo filter: Practically better than bloom. In Proceedings of the CoNEXT 2014 - Proceedings of the 2014 Conference on Emerging Networking Experiments and Technologies, Sydney, Australia, 2014. [CrossRef]
- Scott, W.R.; Davis, G.F. Organizations and organizing: Rational, natural and open systems perspectives, 1st ed.; Routledge: New York, 2015. [Google Scholar] [CrossRef]
- Von Bertalanffy, L. The theory of open systems in physics and biology, 1950. [CrossRef]
- Daft, R.L. Management; Cengage Learning: Mason, 2015. [Google Scholar]
- Savolainen, R. Information landscapes as contexts of information practices. Journal of Librarianship and Information Science 2021, 53, 655–667. [Google Scholar] [CrossRef]
- Joint Task Force Transformation Initiative. NIST Special Publication 800-30 Revision 1 - Guide for Conducting Risk Assessments. Technical Report September, NIST, 2012.
- Sakellariou, G.; Fouliras, P.; Mavridis, I. A Methodology for Developing & Assessing CTI Quality Metrics. IEEE Access 2024, 12, 6225–6238. [Google Scholar] [CrossRef]
- RRDG. Domain Industry Taxonomy, 2022.
- Broder, A.Z.; Charikar, M.; Frieze, A.M.; Mitzenmacher, M. Min-wise independent permutations (extended abstract). In Proceedings of the Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, Dallas, Texas, USA, 1998. [CrossRef]
- Saltelli, A. Sensitivity Analysis for Importance Assessment. Risk Analysis 2002, 22, 579–590. [Google Scholar] [CrossRef]
- M’manga, A.; Faily, S.; McAlaney, J.; Williams, C.; Kadobayashi, Y.; Miyamoto, D. A normative decision-making model for cyber security. Information and Computer Security 2019, 26, 636–646. [Google Scholar] [CrossRef]
- Cotae, P.; Kang, M.; Velazquez, A. A Cybersecurity Model for Decision-Making Problems under Uncertainty Using Game Theory. In Proceedings of the 2020 13th International Conference on Communications, COMM 2020 - Proceedings, Bucharest; 2020; pp. 15–22. [Google Scholar] [CrossRef]
- Jalali, M.S.; Siegel, M.; Madnick, S. Decision-making and biases in cybersecurity capability development: Evidence from a simulation game experiment. Journal of Strategic Information Systems 2019, 28, 66–82. [Google Scholar] [CrossRef]
- Sichman, J.S.a.; Demazeau, Y.; Boissier, O. When can knowledge-based systems be called agents. Proceedings of Simp{ó}sio Brasileiro De Intelig{ê}ncia Artificial, 9, Rio 1992, 9, 172–185. [Google Scholar]
- Akerkar, R.; Sajja, P. Knowledge-based systems; Jones & Bartlett Publishers: Burlington, 2009. [Google Scholar]
- BigPicture. Free Dataset - Companies | BigPicture Documentation, 2024.
- EDM Council. FIBO, 2020.
- EUROSTAT. Glossary:Statistical classification of economic activities in the European Community (NACE) - Statistics Explained, 2006.
- Fraunhofer ISC. General Process Ontology (GPO), 2021.
- NIST, C.F.P. Official Common Platform Enumeration (CPE) Dictionary, 2021.
- EBWSRG. The Product Types Ontology: Use Wikipedia pages for describing products or services with GoodRelations and schema.org, 2024.
- EU. ECCF Core Ontology - EU Vocabularies - Publications Office of the EU, 2021.
- Filigran. OpenCTI Documentation, 2024.








| Step | Description |
|---|---|
| 1 | Based on the CTI data or sources, try to identify what can better express their quality and name this metric M. |
| 2 | Determine the set of variables X necessary to calculate M. |
| 3 | Define function F, which computes metric M. |
| 4 | Analyze X and F to determine subjectivity and objectivity . |
| 5 | Analyze F to determine the performance of M (i.e., time complexity of M calculation), P. |
| 6 | Analyze F to determine the precision of M, A. |
| 7 | Conduct sensitivity analysis on M to determine B. |
| 8 | Construct metric |
| Landscape | Information Needs of | Ontology & Datasets |
|---|---|---|
| Input Landscape () | Suppliers | Companies [39] |
| Competitors | ||
| Capital Sources | FIBO [40] | |
| Transformation Process Landscape () | Business Activities | NACE [41], DIT [31] |
| Internal Operations | GPO [42] | |
| Information Systems | CPE [43] | |
| Output Landscape () | Products | FIBO [40], PTO [44], ECCF [45] |
| Services |
| CTI Sources | Num. of CTI products in dataset | Num. of CTI products in validation dataset |
|---|---|---|
| MITRE ATT&CK, CISA KNOWN VULNERABILITIES, CVE, ALIENVAULT, FEEDLY, MALPEDIA, MISP FEEDS, MITRE ATLAS, TWEETFEED | 32012 | 5000 |
| Landscape | Profile |
|---|---|
| Input Landscape () | Num. of Suppliers: 14 (e.g., GRIVE) |
| Num. of Competitors: 19 (e.g., M.A.P.L.E) | |
| Num. of Capital Sources: 7 (e.g., SPDR S&P 500 ETF Trust) | |
| Transformation Process Landscape () | Num. of Business Activities: 12 (e.g., "auxiliary to financial services") |
| Num. of Internal Operations: 10 (e.g., Information Transport Process) | |
| Num. of Information Systems: 15 (e.g., XR3Player) | |
| Output Landscape () | Num. of Products: 5 (e.g., carpets, food products) |
| Num. of Services: 9 (e.g., community services) |
| Number of Defense Mechanisms | Number of CTI Products in Knowledge Base of a Defense Mechanism | Total Number of CTI Products in the Knowledge Bases of the Defense Mechanisms |
|---|---|---|
| 4 | 1917 | 7668 |
| Measurement of Metric | Measurement of | ||
|---|---|---|---|
| Product | Remark | Product | Remark |
| P1 | Poll Vaulting Report | P1 | NETBIOS Scanner Report |
| P2 | Wrong Sphere Vulnerability Report | P2 | Cross-Site Scripting Vulnerability Report |
| P3 | OT URL Activity Report | P3 | SQL Injection Attack Report |
| P4 | Linux Kernel Vulnerability Report | P4 | Wrong HTTP Header Encoding Report |
| P5 | Firmware Buffer Overflow Vulnerability Report | P5 | Wrong HTTP Header Encoding Report |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).