Application of Artificial Intelligence and Machine Learning in Producing Actionable Cyber Threat Intelligence

Reza Montasari, Fiona Carroll, Stuart Macdonald, Hamid Jahankhani, Amin Hosseinian Far, Alireza Daneshkhah

Research output: Chapter in Book/Report/Conference proceedingChapter


Cyber Threat Intelligence (CTI) can be used by organisations to assist their security teams in safeguarding their networks against cyber-attacks. This can be achieved by including threat data feeds into their networks or systems. However, despite being an effective Cyber Security (CS) tool, many organisations do not sufficiently utilise CTI. This is due to a number of reasons such as not fully understanding how to manage a daily flood of data filled with extraneous information across their security systems. This adds an additional layer of complexity to the tasks performed by their security teams who might not have the appropriate tools or sufficient skills to determine what information to prioritise and what information to disregard. Therefore, to help address the stated issue, this paper aims firstly to provide an in-depth understanding of what CTI is and how it can benefit organisations, and secondly to deliver a brief analysis of the application of Artificial Intelligence and Machine Learning in generating actionable CTI. The key contribution of this paper is that it assists organisations in better understanding their approach to CTI, which in turn will enable them to make informed decisions in relation to CTI.
Original languageEnglish
Title of host publicationDigital Forensic Investigation of Internet of Things (IoT) Devices
Place of PublicationCham
PublisherSpringer Nature
Number of pages18
ISBN (Print)978-3-030-60424-0
Publication statusPublished - 10 Dec 2020

Publication series

NameAdvanced Sciences and Technologies for Security Applications


  • Artificial intelligence
  • Big Data
  • Cyber physical systems
  • Cyber security
  • Digital forensics
  • Machine learning
  • Threat intelligence


Dive into the research topics of 'Application of Artificial Intelligence and Machine Learning in Producing Actionable Cyber Threat Intelligence'. Together they form a unique fingerprint.

Cite this