Show simple item record

dc.contributor.authorLanza, Claudia
dc.contributor.authorLahmadi, Abdelkader
dc.contributor.authorFrançois, Jérôme
dc.date.accessioned2025-03-31T12:18:52Z
dc.date.available2025-03-31T12:18:52Z
dc.date.issued2024
dc.identifier.urihttps://library.oapen.org/handle/20.500.12657/100445
dc.description.abstractThis book presents the development of a classification scheme to organize and represent ransomware threat knowledge through the implementation of an innovative methodology centered around the semantic annotation of domain-specific source documentation. By combining principles from computer science, document management, and semantic data processing, the research establishes an innovative framework to organize ransomware data extracted from specialized source texts in a systematic classification system. Through detailed chapters, the book explores the process of applying semantic annotation to a specialized corpus comprising CVE prose descriptions linked to known ransomware threats. This approach not only organizes but also deeply analyzes these descriptions, uncovering patterns and vulnerabilities within ransomware operations. The book presents a pioneering methodology that integrates CVE descriptions with ATT&CK frameworks, significantly refining the granularity of threat intelligence. The insights gained from a pattern-based analysis of vulnerability-related documentation are structured into a hierarchical model within an ontology framework, enhancing the capability for predictive operations. This model prepares cybersecurity professionals to anticipate and mitigate risks associated with new vulnerabilities as they are cataloged in the CVE list, by identifying recurrent characteristics tied to specific ransomware and related vulnerabilities. With real-world examples, this book empowers its readers to implement these methodologies in their environments, leading to improved prediction and prevention strategies in the face of growing ransomware challenges.en_US
dc.languageEnglishen_US
dc.subject.classificationthema EDItEUR::U Computing and Information Technology::UR Computer security::URH Computer fraud and hackingen_US
dc.subject.classificationthema EDItEUR::J Society and Social Sciences::JK Social services and welfare, criminology::JKV Crime and criminology::JKVC Causes and prevention of crimeen_US
dc.subject.classificationthema EDItEUR::U Computing and Information Technology::UR Computer security::URD Privacy and data protectionen_US
dc.subject.classificationthema EDItEUR::U Computing and Information Technology::UB Information technology: general topics::UBL Digital and information technologies: Legal aspectsen_US
dc.subject.classificationthema EDItEUR::U Computing and Information Technology::UY Computer science::UYF Computer architecture and logic designen_US
dc.subject.classificationthema EDItEUR::U Computing and Information Technology::UT Computer networking and communicationsen_US
dc.subject.classificationthema EDItEUR::K Economics, Finance, Business and Management::KN Industry and industrial studies::KNS Hospitality and service industriesen_US
dc.subject.classificationthema EDItEUR::L Law::LA Jurisprudence and general issues::LAR Legal aspects of criminologyen_US
dc.subject.otherransomware;classification;predictionen_US
dc.titleRansomware Analysisen_US
dc.title.alternativeKnowledge Extraction and Classification for Advanced Cyber Threat Intelligenceen_US
dc.typebook
oapen.identifier.doi10.1201/9781003528999en_US
oapen.relation.isPublishedBy7b3c7b10-5b1e-40b3-860e-c6dd5197f0bben_US
oapen.relation.isFundedByb818ba9d-2dd9-4fd7-a364-7f305aef7ee9en_US
oapen.relation.isbn9781040182956en_US
oapen.relation.isbn9781032832104en_US
oapen.relation.isbn9781003528999en_US
oapen.collectionKnowledge Unlatched (KU)en_US
oapen.imprintCRC Pressen_US
oapen.pages113en_US


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record