A Trusted, Verifiable and Differential Cyber Threat Intelligence Sharing Framework using Blockchain

08/25/2022
by   Kealan Dunnett, et al.
0

Cyber Threat Intelligence (CTI) is the knowledge of cyber and physical threats that help mitigate potential cyber attacks. The rapid evolution of the current threat landscape has seen many organisations share CTI to strengthen their security posture for mutual benefit. However, in many cases, CTI data contains attributes (e.g., software versions) that have the potential to leak sensitive information or cause reputational damage to the sharing organisation. While current approaches allow restricting CTI sharing to trusted organisations, they lack solutions where the shared data can be verified and disseminated `differentially' (i.e., selective information sharing) with policies and metrics flexibly defined by an organisation. In this paper, we propose a blockchain-based CTI sharing framework that allows organisations to share sensitive CTI data in a trusted, verifiable and differential manner. We discuss the limitations associated with existing approaches and highlight the advantages of the proposed CTI sharing framework. We further present a detailed proof of concept using the Ethereum blockchain network. Our experimental results show that the proposed framework can facilitate the exchange of CTI without creating significant additional overheads.

READ FULL TEXT

page 1

page 7

research
03/24/2021

TRADE: TRusted Anonymous Data Exchange: Threat Sharing Using Blockchain Technology

Cyber attacks are becoming more frequent and sophisticated, introducing ...
research
11/25/2021

Designing a Trusted Data Brokerage Framework in the Aviation Domain

In recent years, there is growing interest in the ways the European avia...
research
05/08/2022

Challenges and Opportunities of Blockchain for Cyber Threat Intelligence Sharing

The emergence of the Internet of Things (IoT) technology has caused a po...
research
04/23/2021

Leveraging Sharing Communities to Achieve Federated Learning for Cybersecurity

Automated cyber threat detection in computer networks is a major challen...
research
12/01/2021

A Blockchain-Enabled Incentivised Framework for Cyber Threat Intelligence Sharing in ICS

In recent years Industrial Control Systems (ICS) have been targeted incr...
research
05/29/2023

Duopoly insurers' incentives for data quality under a mandatory cyber data sharing regime

We study the impact of data sharing policies on cyber insurance markets....
research
04/07/2022

cyberaCTIve: a STIX-based Tool for Cyber Threat Intelligence in Complex Models

Cyber threat intelligence (CTI) is practical real-world information that...

Please sign up or login with your details

Forgot password? Click here to reset