{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:00:07Z","timestamp":1773615607188,"version":"3.50.1"},"reference-count":50,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.3103\/s0146411624701037","type":"journal-article","created":{"date-parts":[[2025,3,14]],"date-time":"2025-03-14T14:22:52Z","timestamp":1741962172000},"page":"1365-1372","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Analysis of Data Exchange Systems about Information Security Threats"],"prefix":"10.3103","volume":"58","author":[{"given":"E. Yu.","family":"Pavlenko","sequence":"first","affiliation":[]},{"given":"N. V.","family":"Polosukhin","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2025,3,14]]},"reference":[{"key":"7802_CR1","unstructured":"Cybersecurity 2022\u20132023. Trends and forecasts. https:\/\/www.ptsecurity.com\/ru-ru\/research\/analytics\/ogo-kakaya-ib\/. Cited January 17, 2023."},{"key":"7802_CR2","unstructured":"Decree of the President of the Russian Federation Dated May 1, 2022 No. 250 On Additional Measures to Ensure Information Security of the Russian Federation. http:\/\/publication.pravo.gov.ru\/Document\/View\/0001202205010023. Cited January 17, 2023."},{"key":"7802_CR3","unstructured":"Information Security Doctrine of the Russian Federation. https:\/\/www.consultant.ru\/document\/cons_doc_LAW_208191\/4dbff9722e14f63a309bce4c2ad3d12cc2e85f10\/. Cited January 17, 2023."},{"key":"7802_CR4","unstructured":"The complete developer platform to build, scale, and deliver secure software. https:\/\/github.com. Cited January 17, 2023."},{"key":"7802_CR5","unstructured":"A little tool to play with Windows security. https:\/\/github.com\/gentilkiwi\/mimikatz. Cited January 17, 2023."},{"key":"7802_CR6","doi-asserted-by":"publisher","unstructured":"Arnold, N., Ebrahimi, M., Zhang, N., Lazarine, B., Patton, M., Chen, H., and Samtani, S., Dark-net ecosystem cyber-threat intelligence (CTI) tool, 2019 IEEE International Conference on Intelligence and Security Informatics (ISI), Shenzhen, China, 2019, IEEE, 2019, pp. 92\u201397. https:\/\/doi.org\/10.1109\/isi.2019.8823501","DOI":"10.1109\/isi.2019.8823501"},{"key":"7802_CR7","doi-asserted-by":"publisher","unstructured":"Hyslip, T.S., Cybercrime-as-a-service operations, The Palgrave Handbook of International Cybercrime and Cyberdeviance, Holt, T. and Bossler, A., Eds., Cham: Palgrave Macmillan, 2020, pp. 815\u2013846. https:\/\/doi.org\/10.1007\/978-3-319-78440-3_36","DOI":"10.1007\/978-3-319-78440-3_36"},{"key":"7802_CR8","unstructured":"Threat intelligence. https:\/\/www.gartner.com\/en\/documents\/2487216. Cited January 17, 2023."},{"key":"7802_CR9","unstructured":"MITRE ATT&CK. https:\/\/attack.mitre.org. Cited January 17, 2023."},{"key":"7802_CR10","doi-asserted-by":"publisher","unstructured":"McNeil, N., Bridges, R.A., Iannacone, M.D., Czejdo, B., Perez, N., and Goodall, J.R., PACE: Pattern accurate computationally efficient bootstrapping for timely discovery of cyber-security concepts, 2013 12th International Conference on Machine Learning and Applications, Miami, 2013, IEEE, 2013, pp. 60\u201365. https:\/\/doi.org\/10.1109\/icmla.2013.106","DOI":"10.1109\/icmla.2013.106"},{"key":"7802_CR11","doi-asserted-by":"publisher","first-page":"101589","DOI":"10.1016\/j.cose.2019.101589","volume":"87","author":"T.D. Wagner","year":"2019","unstructured":"Wagner, T.D., Mahbub, Kh., Palomar, E., and Abdallah, A.E., Cyber threat intelligence sharing: Survey and research directions, Comput. Secur., 2019, vol. 87, p. 101589. https:\/\/doi.org\/10.1016\/j.cose.2019.101589","journal-title":"Comput. Secur."},{"key":"7802_CR12","unstructured":"THREAT REPORT ATT&CK MAPPER (TRAM). https:\/\/ctid.mitre-engenuity.org\/our-work\/tram\/. Cited January 17, 2023."},{"key":"7802_CR13","doi-asserted-by":"publisher","unstructured":"Fujii, Sh., Kawaguchi, N., Shigemoto, T., and Yamauchi, T., CyNER: Information extraction from unstructured text of CTI sources with noncontextual IOCs, Advances in Information and Computer Security, Cheng, C.M. and Akiyama, M., Eds., Lecture Notes in Computer Science, vol. 13504, Cham: Springer, 2022, pp. 85\u2013104. https:\/\/doi.org\/10.1007\/978-3-031-15255-9_5","DOI":"10.1007\/978-3-031-15255-9_5"},{"key":"7802_CR14","doi-asserted-by":"publisher","unstructured":"Shin, Yo., Kim, K., Lee, J.J., and Lee, K., ART: Automated reclassification for threat actors based on ATT&CK matrix similarity, 2021 World Automation Congress (WAC), Taipei, 2021, IEEE, 2021, pp. 15\u201320. https:\/\/doi.org\/10.23919\/wac50355.2021.9559514","DOI":"10.23919\/wac50355.2021.9559514"},{"key":"7802_CR15","doi-asserted-by":"publisher","first-page":"5695","DOI":"10.1109\/tkde.2022.3175719","volume":"35","author":"Yi. Ren","year":"2022","unstructured":"Ren, Yi., Xiao, Ya., Zhou, Yi., Zhang, Zh., and Tian, Zh., CSKG4APT: A cybersecurity knowledge graph for advanced persistent threat organization attribution, IEEE Trans. Knowl. Data Eng., 2022, vol. 35, no. 6, pp.\u00a05695\u20135709. https:\/\/doi.org\/10.1109\/tkde.2022.3175719","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"7802_CR16","doi-asserted-by":"publisher","unstructured":"Samtani, S., Chinn, K., Larson, C., and Chen, H., AZSecure Hacker Assets Portal: Cyber threat intelligence and malware analysis, 2016 IEEE Conference on Intelligence and Security Informatics (ISI), Tucson, AZ, 2016, IEEE, 2016, pp. 19\u201324. https:\/\/doi.org\/10.1109\/isi.2016.7745437","DOI":"10.1109\/isi.2016.7745437"},{"key":"7802_CR17","first-page":"6","volume":"1","author":"R.N. Anthony","year":"1964","unstructured":"Anthony, R.N., Framework for analysis, Management Services: A Magazine of Planning, \n               Systems, and Controls, 1964, vol. 1, no. 1, p. 6.","journal-title":"Systems, and Controls"},{"key":"7802_CR18","first-page":"172","volume":"15","author":"M. Bromiley","year":"2016","unstructured":"Bromiley, M., Threat intelligence: What it is, and how to use it effectively, A SANS Whitepaper, SANS Institute InfoSec Reading Room, 2016, vol. 15, p. 172.","journal-title":"SANS Institute InfoSec Reading Room"},{"key":"7802_CR19","unstructured":"Cyber Kill Chain. https:\/\/www.lockheedmartin.com\/en-us\/capabilities\/cyber\/cyber-kill-chain.html. Cited January 17, 2023."},{"key":"7802_CR20","unstructured":"Pols, P., The unified kill chain, CSA Thesis, Hague, 2017, pp. 1\u2013104."},{"key":"7802_CR21","doi-asserted-by":"publisher","unstructured":"Mavroeidis, V. and Bromander, S., Cyber threat intelligence model: An evaluation of taxonomies, sharing standards, and ontologies within cyber threat intelligence, 2017 European Intelligence and Security Informatics Conference (EISIC), Athens, 2017, IEEE, 2017, pp. 91\u201398. https:\/\/doi.org\/10.1109\/eisic.2017.20","DOI":"10.1109\/eisic.2017.20"},{"key":"7802_CR22","doi-asserted-by":"publisher","first-page":"e05969","DOI":"10.1016\/j.heliyon.2021.e05969","volume":"7","author":"M. Tatam","year":"2021","unstructured":"Tatam, M., Shanmugam, B., Azam, S., and Kannoorpatti, K., A review of threat modelling approaches for APT-style attacks, Heliyon, 2021, vol. 7, no. 1, p. e05969. https:\/\/doi.org\/10.1016\/j.heliyon.2021.e05969","journal-title":"Heliyon"},{"key":"7802_CR23","first-page":"909","volume":"68","author":"M. Kalinin","year":"2015","unstructured":"Kalinin, M., Lavrova, D., and Pechenkin, A., High performance traffic processing in virtualized framework, Proceedings of the Bulgarian Academy of Sciences, 2015, vol. 68, no. 7, pp. 909\u2013916.","journal-title":"Proceedings of the Bulgarian Academy of Sciences"},{"key":"7802_CR24","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1109\/msp.2006.145","volume":"4","author":"P. Mell","year":"2006","unstructured":"Mell, P., Scarfone, K., and Romanosky, S., Common vulnerability scoring system, IEEE Security and Privacy Magazine, 2006, vol. 4, no. 6, pp. 85\u201389. https:\/\/doi.org\/10.1109\/msp.2006.145","journal-title":"IEEE Security and Privacy Magazine"},{"key":"7802_CR25","volume-title":"Common attack pattern enumeration and classification (CAPEC) schema","author":"M.S. Barnum","year":"2008","unstructured":"Barnum, M.S., Common attack pattern enumeration and classification (CAPEC) schema, Department of Homeland Security, 2008."},{"key":"7802_CR26","unstructured":"Mann, D.E. and Christey, S.M., Towards a common enumeration of vulnerabilities, 2nd Workshop on Research with Security Vulnerability Databases, West Lafayette, IN, 1999."},{"key":"7802_CR27","volume-title":"Common weakness enumeration","author":"R.A. Martin","year":"2007","unstructured":"Martin, R.A., Common weakness enumeration, Mitre Corporation, 2007, vol. 24."},{"key":"7802_CR28","unstructured":"Data base of information security threats. https:\/\/bdu.fstec.ru\/threat. Cited January 17, 2023."},{"key":"7802_CR29","unstructured":"Information about vulnerabilities. https:\/\/bdu.fstec.ru\/vul. Cited January 17, 2023."},{"key":"7802_CR30","doi-asserted-by":"publisher","first-page":"727","DOI":"10.3103\/s0146411615080106","volume":"49","author":"D.S. Lavrova","year":"2015","unstructured":"Lavrova, D.S. and Pechenkin, A.I., Adaptive reflexivity threat protection, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 727\u2013734. https:\/\/doi.org\/10.3103\/s0146411615080106","journal-title":"Autom. Control Comput. Sci."},{"key":"7802_CR31","first-page":"1","volume":"11","author":"S. Barnum","year":"2012","unstructured":"Barnum, S., Standardizing cyber threat intelligence information with the structured threat information expression (stix), Mitre Corporation, 2012, vol. 11, pp. 1\u201322.","journal-title":"Mitre Corporation"},{"key":"7802_CR32","doi-asserted-by":"publisher","unstructured":"Dakhnovich, A., Moskvin, D., and Zegzhda, D., A necessary condition for industrial Internet of Things sustainability, Mobile Internet Security. MobiSec 2021, You, I., Kim, H., Youn, T.Y., Palmieri, F., and Kotenko, I., Eds., Communications in Computer and Information Science, vol. 1544, Singapore: Springer, 2022, pp. 79\u201389. https:\/\/doi.org\/10.1007\/978-981-16-9576-6_7","DOI":"10.1007\/978-981-16-9576-6_7"},{"key":"7802_CR33","unstructured":"The vocabulary for event recording and incident sharing. http:\/\/veriscommunity.net\/. Cited January 17, 2023."},{"key":"7802_CR34","unstructured":"OpenIOC repository. https:\/\/github.com\/fireeye\/OpenIOC_1.1. Cited January 17, 2023."},{"key":"7802_CR35","doi-asserted-by":"publisher","unstructured":"Takahashi, T., Landfield, K., and Kadobayashi, Y., An incident object description exchange format (IODEF) extension for structured cybersecurity information, RFC Editor, 2014. https:\/\/doi.org\/10.17487\/rfc7203","DOI":"10.17487\/rfc7203"},{"key":"7802_CR36","volume-title":"Malware attribute enumeration and characterization","author":"I. Kirillov","year":"2011","unstructured":"Kirillov, I., Beck, D., Chase, P., and Martin, R., Malware attribute enumeration and characterization, The MITRE Corporation, 2011."},{"key":"7802_CR37","doi-asserted-by":"publisher","unstructured":"Wagner, C., Dulaunoy, A., Wagener, G., and Iklody, A., MISP: The design and implementation of a collaborative threat intelligence sharing platform, Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security, Vienna, 2016, New York: Association for Computing Machinery, 2016, pp. 49\u201356. https:\/\/doi.org\/10.1145\/2994539.2994542","DOI":"10.1145\/2994539.2994542"},{"key":"7802_CR38","first-page":"253262","volume":"17","author":"D.P. Zegzhda","year":"2014","unstructured":"Zegzhda, D.P. and Nikolsky, A.V., Formal security model for virtual machine hypervisors in cloud computing systems, Nonlinear Phenom. Complex Syst., 2014, vol. 17, no. 3, p. 253262.","journal-title":"Nonlinear Phenom. Complex Syst."},{"key":"7802_CR39","unstructured":"AlienVault's open threat exchange. https:\/\/otx.alienvault.com. Cited January 17, 2023."},{"key":"7802_CR40","unstructured":"Open cyber threat intelligence platform. https:\/\/www.filigran.io\/en\/products\/opencti\/. Cited January 17, 2023."},{"key":"7802_CR41","unstructured":"Analyse suspicious files, domains, IPs and URLs to detect malware and other breaches, automatically share them with the security community. https:\/\/www.virustotal.com. Cited January 17, 2023."},{"key":"7802_CR42","doi-asserted-by":"publisher","unstructured":"Poltavtseva, M. and Zegzhda, P., Heterogeneous semi-structured objects analysis, Intelligent Systems and Applications. IntelliSys 2018, Arai, K., Kapoor, S., and Bhatia, R., Eds., Advances in Intelligent Systems and Computing, vol. 868, Cham: Springer, 2018, pp. 1259\u20131270. https:\/\/doi.org\/10.1007\/978-3-030-01054-6_88","DOI":"10.1007\/978-3-030-01054-6_88"},{"key":"7802_CR43","volume-title":"Istlp-information sharing traffic light protocol","author":"D. Stikvoort","year":"2009","unstructured":"Stikvoort, D., Istlp-information sharing traffic light protocol, NISCC (United Kingdom), 2009."},{"key":"7802_CR44","unstructured":"Efimova, K.A. and Kolcherina, Zh.N., Application of maturity models in assessing the effectiveness of information security processes, II Vserossiiskaya naucno-prakticheskaya konferentsiya. Teoriya i praktika obespecheniya informatsionnoi bezopasnosti (2nd All-Russian Scientific and Practical Conference: Theory and Practice of Information Security Assurance), Moscow, 2022, Moscow, 2022, pp. 57\u201366."},{"key":"7802_CR45","unstructured":"MISP default feeds. https:\/\/www.misp-project.org\/feeds\/. Cited January 17, 2023."},{"key":"7802_CR46","unstructured":"Meet the open, distributed, machine and analyst-friendly threat intelligence repository. Made by and for incident responders. https:\/\/yeti-platform.github.io. Cited January 17, 2023."},{"key":"7802_CR47","doi-asserted-by":"publisher","unstructured":"Horawalavithana, S., Bhattacharjee, A., Liu, R., Choudhury, N., O. Hall, L., and Iamnitchi, A., Mentions of security vulnerabilities on Reddit, Twitter and GitHub, IEEE\/WIC\/ACM International Conference on Web Intelligence, Thessaloniki, Greece, 2019, Barnaghi, P., Gottlob, G., Manolopoulos, Ya., Tzouramanis, T., and Vakali, A., Eds., New York: Association for Computing Machinery, 2019, pp. 200\u2013207. https:\/\/doi.org\/10.1145\/3350546.3352519","DOI":"10.1145\/3350546.3352519"},{"key":"7802_CR48","doi-asserted-by":"publisher","unstructured":"Tundis, A., Ruppert, S., and M\u00fchlh\u00e4user, M., On the automated assessment of open-source cyber threat intelligence sources, Computational Science\u2013ICCS 2020, Krzhizhanovskaya, V.V., Z\u00e1vodszky, G., Lees, M.H., Dongarra, J.J., Sloot, P.M.A., Brissos, S., and Teixeira, J., Eds., Lecture Notes in Computer Science, vol. 12138, Cham: Springer, 2020, pp. 453\u2013467. https:\/\/doi.org\/10.1007\/978-3-030-50417-5_34","DOI":"10.1007\/978-3-030-50417-5_34"},{"key":"7802_CR49","doi-asserted-by":"publisher","first-page":"824","DOI":"10.3390\/electronics9050824","volume":"9","author":"A. Ramsdale","year":"2020","unstructured":"Ramsdale, A., Shiaeles, S., and Kolokotronis, N., A comparative analysis of cyber-threat intelligence sources, formats and languages, Electronics, 2020, vol. 9, no. 5, p. 824. https:\/\/doi.org\/10.3390\/electronics9050824","journal-title":"Electronics"},{"key":"7802_CR50","unstructured":"Sans 2022 cyber threat intelligence survey. https:\/\/www.sans.org\/white-papers\/sans-2022-cyber-threat-intelligence-survey\/. Cited January 17, 2023."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624701037.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411624701037","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624701037.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:02:10Z","timestamp":1773612130000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411624701037"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":50,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["7802"],"URL":"https:\/\/doi.org\/10.3103\/s0146411624701037","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12]]},"assertion":[{"value":"4 September 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 September 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 September 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}