2020
DOI: 10.3390/electronics9030521
|View full text |Cite
|
Sign up to set email alerts
|

BLOCIS: Blockchain-Based Cyber Threat Intelligence Sharing Framework for Sybil-Resistance

Abstract: The convergence of fifth-generation (5G) communication and the Internet-of-Things (IoT) has dramatically increased the diversity and complexity of the network. This change diversifies the attacker’s attack vectors, increasing the impact and damage of cyber threats. Cyber threat intelligence (CTI) technology is a proof-based security system which responds to these advanced cyber threats proactively by analyzing and sharing security-related data. However, the performance of CTI systems can be significantly compr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 29 publications
(16 citation statements)
references
References 34 publications
0
16
0
Order By: Relevance
“…In this case, when a producer shares some intelligence they could be required to pay a deposit, some amount of cryptocurrnecy, to a Smart Contract. Once payed, a consensus algorithm defined within the Smart Contract can be used to verify the integrity of the shared intelligence [14]. Given that this verification process occurs on-chain, the results are immutable and transparent to both the original producer as well as future consumers.…”
Section: Depositsmentioning
confidence: 99%
See 1 more Smart Citation
“…In this case, when a producer shares some intelligence they could be required to pay a deposit, some amount of cryptocurrnecy, to a Smart Contract. Once payed, a consensus algorithm defined within the Smart Contract can be used to verify the integrity of the shared intelligence [14]. Given that this verification process occurs on-chain, the results are immutable and transparent to both the original producer as well as future consumers.…”
Section: Depositsmentioning
confidence: 99%
“…However, blockchain-based CTI sharing solutions are lacking in the present literature. A few proposals, e.g., [12] [13] [14], integrate blockchain for CTI sharing, but a comprehensive solution which addresses all of the discussed challenges is currently lacking.…”
Section: Introductionmentioning
confidence: 99%
“…The paper made it also into the comparative table below, still probably due to the mentioned differences authors did not compare their approach with any of the other major works referenced here-in; it is worth to notice that [14] requires agents to trust that others present honest timestamps: ''(..)The only necessity is that something induces an order on the set of interactions of each agent(..)''. Recently, also there was a very interesting work [16] tackling the problematics of Sybil-proofness, however in an entirely different context (CTI systems). Their work showed how a virtual asset itself could be used to minimize Sybil-incentives within an external system-such as falsified data-uploads to a CTI system, by introducing costs of doing so.…”
Section: Related Workmentioning
confidence: 99%
“…Further, unlike ours, their solution is implemented in a permissionless network. Similar to [14], proposal [15] sought to incentivise CTI contribution with tokens and implement their solution in a permissionless blockchain network, which is not appropriate for ICS due to confidentiality and privacy concerns.…”
Section: Related Workmentioning
confidence: 99%