Ransomware analysis knowledge extraction and classification for advanced cyber threat intelligence / Claudia Lanza, Abdelkader Lahmadi, and J©♭r©þme Fran©ʹois.

Author/creator Lanza, Claudia
Other author Lahmadi, Abdelkader.
Other author Fran©ʹois, J©♭r©þme (Computer scientist)
Format Electronic
EditionFirst edition.
Publication InfoBoca Raton : CRC Press, 2025.
Descriptionpages cm
Supplemental ContentFull text available from Taylor & Francis eBooks
Subjects

Portion of title Knowledge extraction and classification for advanced cyber threat intelligence
Partial contents Classification and knowledge representation -- What does it mean to classify -- Hierarchical-enumerative and faceted classification.
Abstract "This book presents the development of a classification scheme to organize and represent ransomware threat knowledge through the implementation of an innovative methodology centred around the semantic annotation of domain-specific source documentation. By combining principles from computer science, document management, and semantic data processing, the research establishes an innovative framework to organize ransomware data extracted from specialized source texts in a systematic classification system. Through detailed chapters, the book explores the process of applying semantic annotation to a specialized corpus comprising CVE prose descriptions linked to known ransomware threats. This approach not only organizes but also deeply analyzes these descriptions, uncovering patterns and vulnerabilities within ransomware operations. The book presents a pioneering methodology that integrates CVE descriptions with ATT&CK frameworks, significantly refining the granularity of threat intelligence. The insights gained from a pattern-based analysis of vulnerability-related documentation are structured into a hierarchical model within an ontology framework, enhancing the capability for predictive operations. This model prepares cybersecurity professionals to anticipate and mitigate risks associated with new vulnerabilities as they are cataloged in the CVE list, by identifying recurrent characteristics tied to specific ransomware and related vulnerabilities. With real-world examples, this book empowers its readers to implement these methodologies in their environments, leading to improved prediction and prevention strategies in the face of growing ransomware challenges"-- Provided by publisher.
Bibliography noteIncludes bibliographical references and index.
Access restrictionAvailable only to authorized users.
Technical detailsMode of access: World Wide Web
Genre/formElectronic books.
LCCN 2024024330
ISBN9781032832104 (hbk)
ISBN9781032867502 (pbk)
ISBN(ebk)