<?xml version="1.0" encoding="utf-8"?>
<journal>
<title>Biannual Journal Monadi for Cyberspace Security (AFTA)</title>
<title_fa>امنیت فضای تولید و تبادل اطلاعات (منادی)</title_fa>
<short_title>منادی</short_title>
<subject>Engineering &amp; Technology</subject>
<web_url>http://monadi.isc.org.ir</web_url>
<journal_hbi_system_id>1</journal_hbi_system_id>
<journal_hbi_system_user>admin</journal_hbi_system_user>
<journal_id_issn>2476-3047</journal_id_issn>
<journal_id_issn_online>2476-3047</journal_id_issn_online>
<journal_id_pii>8</journal_id_pii>
<journal_id_doi>7</journal_id_doi>
<journal_id_iranmedex></journal_id_iranmedex>
<journal_id_magiran></journal_id_magiran>
<journal_id_sid>14</journal_id_sid>
<journal_id_nlai>8888</journal_id_nlai>
<journal_id_science>13</journal_id_science>
<language>fa</language>
<pubdate>
	<type>jalali</type>
	<year>1404</year>
	<month>6</month>
	<day>1</day>
</pubdate>
<pubdate>
	<type>gregorian</type>
	<year>2025</year>
	<month>9</month>
	<day>1</day>
</pubdate>
<volume>14</volume>
<number>1</number>
<publish_type>online</publish_type>
<publish_edition>1</publish_edition>
<article_type>fulltext</article_type>
<articleset>
	<article>


	<language>fa</language>
	<article_id_doi></article_id_doi>
	<title_fa>تحلیل چارچوب‌ها، استانداردها، پلتفرم‌ها و ائتلاف‌های پشتیبان توسعه شواهد تهدید سایبری در سازمان</title_fa>
	<title>Analysis of frameworks, standards, platforms, and coalitions supporting the development of cyber threat intelligence in organizations</title>
	<subject_fa>رمز و امنیت اطلاعات</subject_fa>
	<subject>Cryptology and Information Security</subject>
	<content_type_fa>پژوهشی</content_type_fa>
	<content_type> Research Article</content_type>
	<abstract_fa>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:9pt&quot;&gt;&lt;span style=&quot;line-height:15pt&quot;&gt;&lt;span style=&quot;direction:rtl&quot;&gt;&lt;span style=&quot;unicode-bidi:embed&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;&lt;span style=&quot;font-style:italic&quot;&gt;&lt;span lang=&quot;AR-SA&quot; style=&quot;font-size:11.0pt&quot;&gt;&lt;span b=&quot;&quot; nazanin=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;font-style:normal&quot;&gt;در دنیای مدرن امروزی و با ظهور پیشرفت&#8204;های فناورانه، امنیت سایبری به یکی از مسائل حیاتی تبدیل شده است. هرروزه میلیون&#8204;ها قلم داده در سطح اینترنت جابجا می&#8204;شوند و سازمان&#8204;ها و افراد را با تهدیداتی همچون نفوذهای سایبری، دسترسی غیرمجاز به اطلاعات و ... مواجه نموده&#8204;است. در این محیط پویا، شواهد تهدید به&#8204;عنوان یک ابزار برجسته و کارآمد برای مقابله با این تهدیدات -به دور از اغماض و حساسیت&#8204;های لازم- مورد توجه قرار گرفته است. این رویکرد نوین، سازمان&#8204;ها را قادر می&#8204;سازد تا با تحلیل دقیق داده&#8204;های شواهد تهدید و به&#8204;صورت پیشگیرانه، واکنش مناسبی را نسبت به حملات سایبری ارائه دهند و شرایط امنیت اطلاعات مدنظر خود را تضمین نمایند. با توجه به روند رو به رشد حملات سایبری، دولت&#8204;ها و سازمان&#8204;های مختلف در سراسر جهان به دنبال راهبردها و راهکارهایی برای تقویت ظرفیت&#8204;های شواهد تهدید در سطح نهادی هستند. در این مقاله، محقق ضمن &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;FA&quot; style=&quot;font-size:11.0pt&quot;&gt;&lt;span b=&quot;&quot; nazanin=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;font-style:normal&quot;&gt;مطالعه مقایسه&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;FA&quot; style=&quot;font-size:11.0pt&quot;&gt;&lt;span b=&quot;&quot; border=&quot;&quot; niki=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;font-style:normal&quot;&gt;&#8204;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;FA&quot; style=&quot;font-size:11.0pt&quot;&gt;&lt;span b=&quot;&quot; nazanin=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;font-style:normal&quot;&gt;ای &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;AR-SA&quot; style=&quot;font-size:11.0pt&quot;&gt;&lt;span b=&quot;&quot; nazanin=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;font-style:normal&quot;&gt;چارچوب&#8204;ها، استانداردها، پلتفرم&#8204;ها و ائتلاف&#8204;های شواهد تهدید (به&#8204;عنوان ابزارهای کلیدی برای افزایش سطح امنیت سایبری و پیشگیری از حملات)، به بررسی تحلیلی و دقیق&#8204;تری از این ابزارها و نحوه نقش&#8204;آفرینی آن&#8204;ها در تقویت نظام امنیت سایبری پرداخته&#8204;است. درواقع، این تحقیق با تمرکز بر نقاط قوت ساختار و مؤلفه&#8204;های پیاده&#8204;سازی شواهد تهدید در سازمان&#8204;ها و با بهره&#8204;گیری از تجارب مرتبط دولت&#8204;ها و ائتلاف&#8204;های بین&#8204;المللی، تلاش می&#8204;کند تا نقش اساسی این مؤلفه&#8204;ها در تولید، انتشار و بهره&#8204;برداری از &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;FA&quot; style=&quot;font-size:11.0pt&quot;&gt;&lt;span b=&quot;&quot; nazanin=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;font-style:normal&quot;&gt;رویکرد &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;AR-SA&quot; style=&quot;font-size:11.0pt&quot;&gt;&lt;span b=&quot;&quot; nazanin=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;font-style:normal&quot;&gt;شواهد تهدید را برای مخاطب تصویرسازی نماید و اهمیت استفاده مؤثر از این راهکار در چرخه امنیت اطلاعات سازمان را مورد بررسی قرار دهد.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span dir=&quot;RTL&quot; lang=&quot;AR-SA&quot; style=&quot;font-size:11.0pt&quot;&gt;&lt;span b=&quot;&quot; nazanin=&quot;&quot; style=&quot;font-family:&quot;&gt;دستیابی به شواهد تهدید از طریق چارچوب&#8204;ها، استانداردها، پلتفرم&#8204;ها و ائتلاف&#8204;های مرتبط مستلزم توجه به الزامات و اقدامات متنوعی است. در این راستا و با استفاده از نتایج حاصل از این تحقیق، تصمیم&#8204;سازان و متولیان امر می&#8204;توانند زمینه اقدامات لازم جهت پیاده&#8204;سازی رویکرد شواهد تهدید در سطح سازمان را پیش&#8204;بینی و عملیاتی نمایند. علاوه&#8204;براین، پیاده&#8204;سازی چارچوب&#8204;ها، استانداردها، پلتفرم&#8204;ها و ائتلاف&#8204;های شواهد تهدید نه&#8204;تنها به سازمان&#8204;ها کمک می&#8204;کند تا از شواهد تهدید بهتر استفاده نمایند، بلکه در امر تصمیم&#8204;گیری&#8204; و مقابله با حملات سایبری نیز برای مجموعه بسیار حائز اهمیت باشد. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;</abstract_fa>
	<abstract>In today&amp;rsquo;s modern world, with the emergence of technological advancements, cybersecurity has become one of the most critical issues. Every day, millions of data items are exchanged across the internet, exposing organizations and individuals to threats such as cyber intrusions, unauthorized access to information, and more. In this dynamic environment, Threat Intelligence has emerged as a prominent and effective tool to combat these threats&amp;mdash;without overlooking necessary sensitivities. This modern approach enables organizations to analyze threat intelligence data meticulously, respond proactively to cyberattacks, and ensure the desired level of information security.&lt;br&gt;
Given the increasing trend of cyberattacks, governments and organizations worldwide are pursuing strategies to strengthen institutional capacities for threat intelligence. In this article, through a comparative study of frameworks, standards, platforms, and coalitions (as key tools for enhancing cybersecurity and preventing attacks), the researcher provides a detailed analytical examination of these tools and their role in reinforcing cybersecurity systems. By focusing on the structural strengths and implementation components of threat intelligence in organizations&amp;mdash;and leveraging the experiences of governments and international coalitions&amp;mdash;this research aims to illustrate the essential role of these components in the production, dissemination, and utilization of threat intelligence. It also highlights the importance of effectively integrating these solutions into an organization&amp;rsquo;s information security cycle.&lt;br&gt;
Achieving threat intelligence through frameworks, standards, platforms, and related coalitions requires attention to diverse requirements and actions. Based on the findings of this research, decision-makers and stakeholders can anticipate and operationalize necessary measures to implement threat intelligence approaches at an organizational level. Furthermore, adopting these frameworks, standards, platforms, and coalitions not only helps organizations utilize threat intelligence more effectively but also plays a critical role in decision-making and countering cyberattacks.&lt;br&gt;
Frameworks, standards, platforms, and coalitions supporting threat intelligence development represent the most vital components, tools, and approaches used in the collection, analysis, and application of threat intelligence. These tools and standards have advanced significantly over time to assist organizations in effectively combating cyber threats. They enable organizations to better produce, disseminate, and implement threat intelligence strategies to address diverse attacks and threats.&lt;br&gt;
This article is based on an extensive and in-depth study of major international frameworks for implementing and developing threat intelligence, as well as adopting standards and structures aligned with organizational needs&amp;mdash;including principles, processes, responsibilities, and roles&amp;mdash;within the threat intelligence lifecycle. By analyzing published best practices and insights from this research, practical recommendations are provided to organizations for managing threat intelligence. The production, dissemination, analysis, and application of threat intelligence are critically important for organizations due to the following reasons:&lt;br&gt;
&amp;bull; Threat Identification and Prediction: Threat intelligence helps organizations identify and analyze patterns and trends in cyberattacks. This information guides organizations in predicting future attack types and planning appropriate countermeasures.&lt;br&gt;
&amp;bull; Enhancing Incident Response: By leveraging threat intelligence, organizations can respond swiftly and effectively to cyberattacks. This minimizes potential damages and reduces the costs associated with attacks.&lt;br&gt;
&amp;bull; Strengthening Cybersecurity: Organizations can implement necessary improvements to their systems and networks using threat intelligence, thereby better protecting their resources. These measures include researching and developing security technologies, enforcing efficient security policies, and enhancing employee awareness and trainin.&lt;br&gt;
The development and implementation of frameworks, standards, platforms, and coalitions not only empower organizations to leverage threat intelligence more effectively but are also pivotal in strategic decision-making and countering cyberattacks. In the pervasive world of information technology, threat intelligence serves as a vital and undeniable tool in addressing organizations&amp;rsquo; security challenges. The use of threat intelligence in cybersecurity management&amp;mdash;encompassing concepts such as threat identification, data-driven security decision-making, protection of sensitive information, defensive strategies, early detection and rapid response, and risk prediction and mitigation&amp;mdash;emerges as a key factor in elevating security standards. By emphasizing the importance of these issues and the unparalleled role of threat intelligence in preventing and countering cyber threats, organizations are encouraged to leverage this powerful tool in the realm of cybersecurity.&lt;br&gt;
Based on the outlined considerations, the primary research question of this study is:&lt;br&gt;
&amp;bull; What are the functional roles of frameworks, standards, platforms, and alliances supporting threat intelligence in organizations? Addressing this main question requires answering the following sub-questions:&lt;br&gt;
&amp;bull; What are the constituent components and elements of frameworks, standards, platforms, and alliances supporting threat intelligence in organizations?&lt;br&gt;
&amp;bull; What are the factors influencing the selection and implementation of frameworks, standards, platforms, and alliances supporting threat intelligence in organizations?&lt;br&gt;
&amp;bull; What are the criteria influencing the selection and implementation of frameworks, standards, platforms, and alliances supporting threat intelligence in organizations?&lt;br&gt;
&amp;bull; What is the status of these influential criteria concerning each selected framework, standard, platform, or alliance supporting threat intelligence in organizations?&lt;br&gt;
&amp;bull; How will the evaluation and assessment of selected frameworks, standards, platforms, and alliances supporting threat intelligence be conducted based on these criteria?</abstract>
	<keyword_fa>شواهد تهدید, چارچوب‌ها, پلتفرم‌ها, استانداردهای مرجع, ائتلاف‌ها</keyword_fa>
	<keyword>Cyber Threat Intelligence, Frameworks, Platforms, Reference Standards, Leagues</keyword>
	<start_page>19</start_page>
	<end_page>44</end_page>
	<web_url>http://monadi.isc.org.ir/browse.php?a_code=A-10-469-1&amp;slc_lang=fa&amp;sid=1</web_url>


<author_list>
	<author>
	<first_name>Amin</first_name>
	<middle_name></middle_name>
	<last_name>Chahardoli</last_name>
	<suffix></suffix>
	<first_name_fa>امین</first_name_fa>
	<middle_name_fa></middle_name_fa>
	<last_name_fa>چهاردولی</last_name_fa>
	<suffix_fa></suffix_fa>
	<email>amin.chahardoli@aut.ac.ir</email>
	<code>10031947532846001995</code>
	<orcid>10031947532846001995</orcid>
	<coreauthor>No</coreauthor>
	<affiliation>Faculty of Management, Central Tehran Branch, Islamic Azad University, Tehran, Iran</affiliation>
	<affiliation_fa>ﺩﺍﻧﺸکدﻩ ﻣﺪیریت، ﻭﺍﺣﺪ ﺗﻬﺮﺍﻥ ﻣﺮکزی، ﺩﺍﻧﺸگاﻩ ﺁﺯﺍﺩ ﺍﺳﻼمی، ﺗﻬﺮﺍﻥ، ﺍیرﺍﻥ</affiliation_fa>
	 </author>


	<author>
	<first_name>Abouzar</first_name>
	<middle_name></middle_name>
	<last_name>Arabsorkhi</last_name>
	<suffix></suffix>
	<first_name_fa>ابوذر</first_name_fa>
	<middle_name_fa></middle_name_fa>
	<last_name_fa>عرب سرخی</last_name_fa>
	<suffix_fa></suffix_fa>
	<email>abouzar_arab@itrc.ac.ir</email>
	<code>10031947532846001996</code>
	<orcid>10031947532846001996</orcid>
	<coreauthor>Yes
</coreauthor>
	<affiliation>Iran Telecommunication Research Center, Tehran, Iran</affiliation>
	<affiliation_fa>پژﻭﻫﺸگاﻩ ﺍﺭﺗﺒﺎﻃﺎﺕ ﻭ ﻓﻨﺎﻭﺭی ﺍﻃﻼﻋﺎﺕ، ﺗﻬﺮﺍﻥ، ﺍیرﺍﻥ</affiliation_fa>
	 </author>


</author_list>


	</article>
</articleset>
</journal>
