A different cup of TI? The added value of commercial threat intelligence

Conference Paper (2020)
Author(s)

X.B. Bouwman (TU Delft - Organisation & Governance)

Harm Griffioen (University of Potsdam)

Jelle Egbers (Student TU Delft)

Christian Doerr (University of Potsdam)

Bram Klievink (Universiteit Leiden)

Michel van van Eeten (TU Delft - Organisation & Governance)

Research Group
Organisation & Governance
Copyright
© 2020 X.B. Bouwman, Harm Griffioen, Jelle Egbers, Christian Doerr, Bram Klievink, M.J.G. van Eeten
More Info
expand_more
Publication Year
2020
Language
English
Copyright
© 2020 X.B. Bouwman, Harm Griffioen, Jelle Egbers, Christian Doerr, Bram Klievink, M.J.G. van Eeten
Research Group
Organisation & Governance
Pages (from-to)
433-450
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

Commercial threat intelligence is thought to provide unmatched coverage on attacker behavior, but it is out of reach for many organizations due to its hefty price tag. This paper presents the first empirical assessment of the services of commercial threat intelligence providers. For two leading vendors, we describe what these services consist of and compare their indicators with each other. There is almost no overlap between them, nor with four large open threat intelligence feeds. Even for 22 specific threat actors – which both vendors claim to track – we find an average overlap of only 2.5% to 4.0% between the indicator feeds. The small number of overlapping indicators show up in the feed of the other vendor with a delay of, on average, a month. These findings raise questions on the coverage and timeliness of paid threat intelligence.

We also conducted 14 interviews with security professionals that use paid threat intelligence. We find that value in this market is understood differently than prior work on quality metrics has assumed. Poor coverage and small volume appear less of a problem to customers. They seem to be optimizing for the workflow of their scarce resource – analyst time – rather than for the detection of threats. Respondents evaluate TI mostly through informal processes and heuristics, rather than the quantitative metrics that research has proposed.

Files

License info not available