A Survey On Categorization Of Threat Intelligence And Trust-Based Sharing Strategies On Cyber Attack
DOI:
https://doi.org/10.26740/vubeta.v2i2.36031Keywords:
Threat Intelligence, Cybersecurity, Trust-based Sharing, Classification, VulnerabilityAbstract
Given the development of information technology both at the national and global level, security threats of organizations’ information systems are worth considering. With threats becoming more and more frequent, it’s important to have proper measures to detect, prevent, and counter threats. However, these cyber threats are not a one-time occurrence but are constantly evolving making the stratification and categorization of TI a challenge for organizations in terms of building trust with other counterparts in sharing TI. This research seeks to address these challenges by using survey on TI categorization as well as trust-based sharing mechanisms. The research is an expository research. Specifically, the research adopts a quantitative research methodology with a systematic literature review coupled with case studies to determine the TI classification, methodologies, and effectiveness of TI against cyber security vulnerability. To achieve the above objective, the study integrates the existing literature, industry research, and practical experience hence offering a comprehensive understanding of TI management practices. Findings reveal the types and sources of TI, the classification of Threat Intelligence, and methodologies and practices associated with Threat intelligence. This survey concludes that the role of TI and trust-based sharing mechanisms in fortifying organizational cyber security defenses is important. The survey recommended strategies that organizations could adopt to enhance their resilience against evolving cyber threats
References
R. Montasari et al.,“Application Of Artificial Intelligence And Machine Learning In Producing Actionable Cyber Threat Intelligence,” Advanced Sciences and Technologies for Security Applications, pp. 47–64, 2021. https://doi.org/10.1007/978-3-030-60425-7_3.
[2] D. Galinec, D. Možnik, and B. Guberina, “Cybersecurity And Cyber Defence: National Level Strategic Approach,” Automatika, vol. 58, no. 3, pp. 273–286, 2017. https://doi.org/10.1080/00051144.2017.1407022.
[3] Y. Wang et al., “A Dataset For Cyber Threat Intelligence Modeling of Connected Autonomous Vehicles,” Scientific Data, vol. 12, no. 1, 2025. https://doi.org/10.1038/s41597-025-04439-5.
[4] M. Karjalainen, A.-L. Ojala, M. Vatanen, and J. Lötjönen, “Learn To Train Like You Fight,” International Journal of Adult Education and Technology, vol. 14, no. 1, pp. 1–20, 2023. https://doi.org/10.4018/IJAET.322085.
[5] M. Frydenberg and B. Lorenz, “Lizards in the Street! Introducing Cybersecurity Awareness in a Digital Literacy Context.,” Information Systems Education Journal, vol. 18, no. 4, pp. 33–45, 2020. http://ISEDJ.org/2020-4.
[6] S. Saeed, S. A. Suayyid, M. S. Al-Ghamdi, H. Al-Muhaisen, and A. M. Almuhaideb, “A Systematic Literature Review on Cyber Threat Intelligence for Organizational Cybersecurity Resilience,” Sensors, vol. 23, no. 16, p. 7273, 2023. https://doi.org/10.3390/s23167273.
[7] A. S. Alzakari et al., " An Intelligent Ransomware Based Cyberthreat Detection Model Using Multi Head Attention-Based Recurrent Neural Networks with Optimization Algorithm in IoT Environment", Scientific Reports, vol. 15, no. 1, 2025. https://doi.org/10.1038/s41598-025-92711-4.
[8] B. W. Weaver, A. M. Braly, and D. M. Lane, “Training Users To Identify Phishing Emails,” Journal of Educational Computing Research, vol. 59, no. 6, pp. 1169–1183, 2021. https://doi.org/ 10.1177/0735633121992516.
[9] J. Zhang et al., " When Llms Meet Cybersecurity: A Systematic Literature Review", Cybersecurity, vol. 8, no. 1, 2025. https://doi.org/10.1186/s42400-025-00361-w.
[10] P. Nuangchalerm and V. Prachagool, “AI-Driven Learning Analytics in STEM Education,” International Journal on Research in STEM Education, vol. 5, no. 2, pp. 77–84, 2023. https://doi.org/10.33830/ijrse.v5i2.1596.
[11] T. Pham, T. B. Nguyen, S. Ha, and N. T. N. Ngoc, “Digital Transformation in Engineering Education: Exploring The Potential of AI-Assisted Learning,” Australasian Journal of Educational Technology, vol. 39, no. 5, pp. 1–19, 2023. https://doi.org/10.14742/ajet.8825.
[12] Y. Renu, and V. Saveshwaran, " A Review of Cyber Security Challenges and Solutions in Unmanned Aerial Vehicles (UAVs)" Inteligencia Artificial, vol. 28, no. 75, pp. 199-219, 2025. https://doi.org/10.4114/intartif.vol28iss75pp199-219.
[13] H. Prabakaran, “Standard Chartered: Threat Intelligence Using Knowledge Graphs. This presentation was given by Hemanth Prabakaran at a GraphSummit.,” 2023.
[14] U. Kant and V. Kumar, "A Systematic Review Paper on Attack Detection Systems in Internet of Things Environment", Lecture Notes in Networks and Systems, vol. 1139, pp. 427-443. https://doi.org/10.1007/978-981-97-7603-0_36.
[15] M. Nkoom, S. G. Hounsinou, and G. V. Crosvy, "Securing the Internet of Robotic Things (IoRT) against DDoS Attacks: A Federated Learning with Differential Privacy Clustering Approach", Computers and Security, vol 155, 2025. https://doi.org/10.1016/j.cose.2025.104493.
[16] M. A. Almaiah, A. Al-Zahrani, O. Almomani, and A. K. Alhwaitat, “Classification of Cyber Security Threats On Mobile Devices and Applications,”Artificial Intelligence and Blockchain for future Cybersecurity Applications, pp. 107–123, 2021. https://doi.org/10.1007/978-3-030-74575-2_6.
[17] NRich, “Open-Source Intelligence forecast to 2030,” 2020.
[18] T. Ivanjko and T. Dokman, “Open Source Intelligence (OSINT): Issues and Trends,” International Conference The Future of Information Sciences, pp. 191–196, 2020. https://doi.org/10.17234/INFUTURE.2019.23.
[19] J. Loevenich, E. Adler, T. Hurten, and R.R.F. Lopes, " Design and Evaluation of an Autonomous Cyber Defence Agent using DRL and an Augmented LLM", Computer Networks, vol. 262, 2025. https://doi.org/10.1016/j.comnet.2025.111162.
[20] N. Alsharabi, A. Bhardwaj, A. Ayaba, and A. Jadi "Threat hunting for Adversary Impact Inhibiting System Recovery", Computers and Security, vol. 154, 2025. https://doi.org/10.1016/j.cose.2025.104464.
[21] T. Attema, V. Dunning, M. Everts and P. Langenkamp, " Efficient Compiler to Covert Security with Public Verifiability for Honest Majority MPC", Lecture Notes in Computer Science, vol. 13269, pp. 663-683, 2022. https://doi.org/10.1007/978-3-031-09234-3_33.
[22] D. Schlette, M. Caselli, and G. Pernul, “A Comparative Study on Cyber Threat Intelligence: The Security Incident Response Perspective,” IEEE Communications Surveys and Tutorials, vol. 23, no. 4, pp. 2525–2556, 2021. https://doi.org/10.1109/COMST.2021.3117338.
[23] C. Heath and P. Luff, “Embodied action, projection, and institutional action: The exchange of tools and implements during surgical procedures,” Discourse Processes, vol. 58, no. 3, pp. 233–250, 2021. https://doi.org/10.1080/0163853X.2020.1854041.
[24] X. Huo, H. Huang, K. R. Davis, H.V. Poor, and M. Liu, " A Review of Scalable and Privacy-Preserving Multi-Agent Frameworks for Distributed Energy Resources", Advances in Applied Energy, vol. 17, 2025. https://doi.org/10.1016/j.adapen.2024.100205.
[25] P. P. Kundu, T. Truong-Huu, L. Chen, L. Zhou, and S. G. Teo, " Detection and Classification of Botnet Traffic using Deep Learning with Model Explanation", IEEE Transactions on Dependable and Secure Computing, pp. 1-15, 2022. https://doi.org/10.1109/TDSC.2022.3183361.
[26] C. Skandylas and M. Asplund," Automated Penetration Testing: Formalization and realization" Computers and Security, vol. 155, 2025. https://doi.org/10.1016/j.cose.2025.104454
[27] S. Hasan, M. Ali, S. Kurnia, and R. Thurasamy, “Evaluating the Cyber Security Readiness of Organizations and Its Influence on Performance,” Journal of Information Security and Applications, vol. 58, p. 102726, 2021. https://doi.org/10.1016/j.jisa.2020.102726.
[28] A. Dalimi-Asl, S. Javadi, a. Ahmarinejad, and P. Rabbanifar, "Energy Management of Networked Energy Hub Considering Risk Assessment and Cyber Security: A Deep Reinforcement Learning Approach", Computers and Electrical Engineering, vol. 124, 2025. https://doi.org/10.1016/j.compeleceng.2025.110262.
[29] G. S Jadoun, D. P. Bhatt, V. Mathur. and A. Kaur, "The Threat of Artificial Intelligence in Cyber security: Risk and Countermeasures", AIP Conference Proceedings, vol. 3191, no. 1, 2025. https://doi.org/10.1063/5.0248313.
[30] A. Nassar and M. Kamal, “Machine Learning and Big Data analytics for Cybersecurity Threat Detection: A Holistic Review of Techniques and Case Studies,” Journal of Artificial Intelligence and Machine Learning in Management, vol. 5, no. 1, pp. 51–63, 2021.
[31] A. B. Turner, M. Ikram, and A. J Uhlmann, "Classifying Ransomware-Bitcoin Nodes using Graph Embeddings", Pacific Asia Journal of the Association for Information Systems, vol 17, no. 1, pp. 51-81, 2025. https://doi.org/10.17705/1pais.17104.
[32] Z. Wang, H. Deng, and G. Li, "Enhancing Information Security Compliance Behavior Through Knowledge Interventions: Insights from EEG", Information and Computer Security, 2025. https://doi.org/10.1108/ICS-08-2024-0206.
[33] A.Q. Raheema, "Challenges and Vulnerability Assessment of Cybersecurity in IoT-enabled SC", Wireless Networks, vol. 30, no. 8, pp. 6887-6900, 2024. https://doi.org/10.1007/s11276-023-03493-4
[34] T. Theodoropoulos et al., “Security in Cloud-Native Services: A Survey,” Journal of Cybersecurity and Privacy, vol. 3, no. 4, pp. 758–793, 2023. https://doi.org/10.3390/jcp3040034.
[35] F. Mızrak, “Integrating Cybersecurity Risk Management Into Strategic Management: A Comprehensive Literature Review,” Pressacademia, vol. 10, no. 3, pp. 98–108, 2023. https://doi.org/10.17261/Pressacademia.2023.1807
[36] F. Lekota and M. Coetzee, “Aviation Sector Computer Security Incident Response Teams: Guidelines and Best Practice,” European Conference on Cyber Warfare and Security, pp. 507–XII, 2021. https://doi.org/10.34190/EWS.21.028.
[37] F. Z. Barrane, N. O. Ndubisi, S. Kamble, G. E. Karuranga, and D. Poulin, “Building Trust in Multi-Stakeholder Collaborations for New Product Development in The Digital Transformation Era,” Benchmarking, vol. 28, no. 1, pp. 205–228, 2021. https://doi.org/10.1108/BIJ-04-2020-0164.
[38] A. Alanis-Ocádiz et al., "Design and Psychometric Validation of A Social Capital Questionnaire for Adults with End-Stage Chronic Kidney Disease Undergoing Dialysis or Hemodialysis", BMC Nephrology, vol. 26, no. 1, 2025. https://doi.org/10.1186/s12882-025-03993-9.
[39] M. Saied and S. Guirguis, "Explainable Artificial Intelligence for Botnet Detection in Internet of Things", Scientific Reports, vol. 15, no. 1, 2025. https://doi.org/10.1038/s41598-025-90420-6.
[40] S. Purohit et al., “Cyber Threat Intelligence Sharing For Co-Operative Defense in Multi-Domain Entities,” IEEE Transactions on Dependable and Secure Computing, vol. 20, no. 5, pp. 4273–4290, 2022. https://doi.org/10.1109/TDSC.2022.3214423.
[41] O. Ekpo, A. Okokon, and M. Akpakpan, " Data Protection in the Digital Age: A Comparative Analysis of Nigeria's NDPA and the EU's GDPR", International Conference on Information and Communication Technologies and Development, pp. 48-56, 2025. https://doi.org/10.1145/3700794.3700799.
[42] P. Mulgund, B. P. Mulgund, R. Sharman, and R. Singh, “The implications of the California Consumer Privacy Act (CCPA) on healthcare organizations: Lessons learned from early compliance experiences,” Health Policy and Technology, vol. 10, no. 3, p. 100543, 2021. https://doi.org/10.1016/j.hlpt.2021.100543.
[43] S. Taylor et al., "A Framework Addressing Challenges in Cybersecurity Testing of IoT Ecosystems and Components", International Conference on Internet of Things, Big Data and Security, pp. 226-234, 2024. https://doi.org/10.5220/0012676300003705.
[44] M. Nankya, R. Chataut, and R. Akl, "Securing Industrial Control Systems: Components, Cyber Threats, and Machine Learning-Driven Defense Strategies", Sensors (Basel, Switzerland), vol. 12, no. 21, 2023. https://doi.org/10.3390/s23218840.
[45] S. Ali, J. Wang, and V. C. M. Leung, "AI-driven Fusion with Cybersecurity: Exploring Current Trends, Advanced Techniques, Future Directions, and Policy Implications for Evolving Paradigms– A Comprehensive Review", Information Fusion, vol. 118, 2025. https://doi.org/10.1016/j.inffus.2024.102922.
[46] T. Gokcimen and B. Das, "A Novel System for Strengthening Security in Large Language Models Against Hallucination and Injection Attacks with Effective Strategies", Alexandria Engineering Journal , vol. 123, pp. 71-90, 2025. https://doi.org/10.1016/j.aej.2025.03.030.
[47] A. Georgiadou, S. Mouzakitis, and D. Askounis, “Assessing Mitre Att&ck Risk using A Cyber-Security Culture Framework,” Sensors, vol. 21, no. 9, p. 3267, 2021. https://doi.org/10.3390/s21093267.
[48] N. A. Azeez, S. Misra, D. O. Ogaraku, and A. P. Abidoye, “A Predictive Model for Benchmarking the Performance of Algorithms for Fake and Counterfeit News Classification in Global Networks,” Sensors (Basel), vol. 24, no. 17, p. 5817, 2024. https://doi.org/10.3390/s24175817.
[49] Simspace, “Cyber Frameworks for the C-Suit,” 2023.
[50] S. Kanj Bonhard, P. Garcia Villalta, and O. Roses, "A Review of Tactics, Techniques, and Procedures (TTPs) of MITRE Framework for Business Email Compromise (BEC) Attacks", IEEE Access, vo 13, pp. 50761 - 50776, 2025. https://doi.org/10.1109/ACCESS.2025.3552523.
[51] S. Wang, " An Analytical Framework for Modeling and Synthesizing Malicious Attacks on Adaptive Cruise Control Vehicles", Transportation Research Record, 2025. https://doi.org/10.1177/03611981251320384.
[52] A. Yeboah-Ofori et al., “Cyber Threat Predictive Analytics for Improving Cyber Supply Chain Security,” IEEE Access, vol. 9, pp. 94318–94337, 2021. https://doi.org/10.1109/ACCESS.2021.3087109
[53] S. M Narayan, N. Kohli, and M. M Martin, "Addressing Contemporary Threats in Anonymised Healthcare Data Using Privacy Engineering", npj Digital Medicine, vol. 8, no.1, 2025. https://doi.org/10.1038/s41746-025-01520-6.
[54] A. Nhedzi and C. M Azionya, "The Digital Activism of Marginalized South African Gen Z in Higher Education", Humanities and Social Sciences Communications, vol. 12, no. 1, 2025. https://doi.org/10.1057/s41599-025-04535-2.
[55] P. Kumar, R. Kumar, A. Joalfaei, and N. Mohammad, " An Automated Threat Intelligence Framework for Vehicle-Road Cooperation Systems", IEEE Internet of Things Journal, vol. 11, no. 22, pp. 35964 - 35974, 2024. https://doi.org/10.1109/JIOT.2024.3397652.
[56] R. Nagahawattan, M. Warren, S. Salzam, and S. Lokuge, " Cyber Security in the Context of Cloud Computing: An Empirical Study of Australian SMEs", Critical Phishing Defense Strategies and Digital Asset Protection, pp. 271-294, 2025. https://doi.org/10.4018/979-8-3693-8784-9.ch013.
[57] S. Yulianto, B. Soewito, F. L. Gaol, and A. Kurniawan, "Enhancing Cybersecurity Resilience Through Advanced Red-Teaming Exercises and MITRE ATT&CK Framework Integration: A Paradigm Shift in Cybersecurity Assessment", Cyber Security and Applications, vol. 3, 2025. https://doi.org/10.1016/j.csa.2024.100077.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Abdulquadri Tajudeen, Doctor

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

