Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers

12/19/2021
by   Hisham Ali, et al.
0

Threat information sharing is considered as one of the proactive defensive approaches for enhancing the overall security of trusted partners. Trusted partner organizations can provide access to past and current cybersecurity threats for reducing the risk of a potential cyberattack - the requirements for threat information sharing range from simplistic sharing of documents to threat intelligence sharing. Therefore, the storage and sharing of highly sensitive threat information raises considerable concerns regarding constructing a secure, trusted threat information exchange infrastructure. Establishing a trusted ecosystem for threat sharing will promote the validity, security, anonymity, scalability, latency efficiency, and traceability of the stored information that protects it from unauthorized disclosure. This paper proposes a system that ensures the security principles mentioned above by utilizing a distributed ledger technology that provides secure decentralized operations through smart contracts and provides a privacy-preserving ecosystem for threat information storage and sharing regarding the MITRE ATT&CK framework.

READ FULL TEXT

page 1

page 2

research
03/24/2021

TRADE: TRusted Anonymous Data Exchange: Threat Sharing Using Blockchain Technology

Cyber attacks are becoming more frequent and sophisticated, introducing ...
research
09/06/2022

Orchestrating Collaborative Cybersecurity: A Secure Framework for Distributed Privacy-Preserving Threat Intelligence Sharing

Cyber Threat Intelligence (CTI) sharing is an important activity to redu...
research
11/06/2019

Privacy Preserving Threat Hunting in Smart Home Environments

The recent proliferation of smart home environments offers new and trans...
research
12/13/2015

Building and Measuring Privacy-Preserving Predictive Blacklists

Collaborative security initiatives are increasingly often advocated to i...
research
04/28/2023

QR-SACP: Quantitative Risk-based Situational Awareness Calculation and Projection through Threat Information Sharing

When a threat is observed, one of the most important challenges is to ch...
research
01/11/2019

How Good is Your Data? Investigating the Quality of Data Generated During Security Incident Response Investigations

An increasing number of cybersecurity incidents prompts organizations to...
research
05/31/2018

Cybersecurity Information Sharing Governance Structures: An Ecosystem of Diversity, Trust, and Tradeoffs

In recent years the cybersecurity policy debate in Washington has been d...

Please sign up or login with your details

Forgot password? Click here to reset