TRADE: TRusted Anonymous Data Exchange: Threat Sharing Using Blockchain Technology

03/24/2021
by   Yair Allouche, et al.
0

Cyber attacks are becoming more frequent and sophisticated, introducing significant challenges for organizations to protect their systems and data from threat actors. Today, threat actors are highly motivated, persistent, and well-founded and operate in a coordinated manner to commit a diversity of attacks using various sophisticated tactics, techniques, and procedures. Given the risks these threats present, it has become clear that organizations need to collaborate and share cyber threat information (CTI) and use it to improve their security posture. In this paper, we present TRADE – TRusted Anonymous Data Exchange – a collaborative, distributed, trusted, and anonymized CTI sharing platform based on blockchain technology. TRADE uses a blockchain-based access control framework designed to provide essential features and requirements to incentivize and encourage organizations to share threat intelligence information. In TRADE, organizations can fully control their data by defining sharing policies enforced by smart contracts used to control and manage CTI sharing in the network. TRADE allows organizations to preserve their anonymity while keeping organizations fully accountable for their action in the network. Finally, TRADE can be easily integrated within existing threat intelligence exchange protocols - such as trusted automated exchange of intelligence information (TAXII) and OpenDXL, thereby allowing a fast and smooth technology adaptation.

READ FULL TEXT
research
07/13/2021

A Reputation-based Approach using Consortium Blockchain for Cyber Threat Intelligence Sharing

The CTI (Cyber Threat Intelligence) sharing and exchange is an effective...
research
08/25/2022

A Trusted, Verifiable and Differential Cyber Threat Intelligence Sharing Framework using Blockchain

Cyber Threat Intelligence (CTI) is the knowledge of cyber and physical t...
research
12/19/2021

Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers

Threat information sharing is considered as one of the proactive defensi...
research
05/08/2022

Challenges and Opportunities of Blockchain for Cyber Threat Intelligence Sharing

The emergence of the Internet of Things (IoT) technology has caused a po...
research
06/03/2021

Cybersecurity Information Exchange with Privacy (CYBEX-P) and TAHOE – A Cyberthreat Language

Cybersecurity information sharing (CIS) is envisioned to protect organiz...
research
01/29/2021

Finding the Sweet Spot for Data Anonymization: A Mechanism Design Perspective

Data sharing between different organizations is an essential process in ...

Please sign up or login with your details

Forgot password? Click here to reset