2015
DOI: 10.1007/978-3-319-20550-2_17
|View full text |Cite
|
Sign up to set email alerts
|

Controlled Data Sharing for Collaborative Predictive Blacklisting

Abstract: Although sharing data across organizations is often advocated as a promising way to enhance cybersecurity, collaborative initiatives are rarely put into practice owing to confidentiality, trust, and liability challenges. In this paper, we investigate whether collaborative threat mitigation can be realized via a controlled data sharing approach, whereby organizations make informed decisions as to whether or not, and how much, to share. Using appropriate cryptographic tools, entities can estimate the benefits of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
42
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 22 publications
(42 citation statements)
references
References 21 publications
0
42
0
Order By: Relevance
“…Only a few works were found to approach the problem, although with rather simple approaches. For example, collaborative predictive blacklisting has been a subject of research [21,22] with promising results against specific attacks. However, a generic approach similar to early attempts to attack prediction is still an open research problem [3].…”
Section: Related Workmentioning
confidence: 99%
“…Only a few works were found to approach the problem, although with rather simple approaches. For example, collaborative predictive blacklisting has been a subject of research [21,22] with promising results against specific attacks. However, a generic approach similar to early attempts to attack prediction is still an open research problem [3].…”
Section: Related Workmentioning
confidence: 99%
“…Toward this goal, we perform a set of measurements to shed light on (i) how to cluster We experiment with a few clustering algorithms using the number of common attacks as a measure of similarity, which can be computed in a privacy-preserving way, and experiment with privacy-friendly within-clusters sharing strategies, namely, only disclosing the details of common/correlated attacks. Overall, we show that our new hybrid model outperforms [9] in terms of hit counts (4x), while achieving better accuracy than [14] (2x).…”
Section: Introductionmentioning
confidence: 78%
“…We use this dataset both as training and testing sets -more precisely, we consider a sliding window of 5 days for training and 1 day for testing, as done in previous work [9,14].…”
Section: Datasetsmentioning
confidence: 99%
See 2 more Smart Citations