Proceedings of the 2nd ACM Workshop on Information Sharing and Collaborative Security 2015
DOI: 10.1145/2808128.2808133
|View full text |Cite
|
Sign up to set email alerts
|

From Cyber Security Information Sharing to Threat Management

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0
3

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 74 publications
(36 citation statements)
references
References 8 publications
0
25
0
3
Order By: Relevance
“…For this the psychological and technological barriers to participate should be low (R1,R16). In the study of Brown et al [42], the technological and organizational challenges of sharing cyber security information are presented and requirements from the community are summarized for a possible solution. The key challenges they mentioned for building such systems are: working with multiple information sources, combining, determining and enriching data and the allocation of the information into organizational workflows and technological products (R14).…”
Section: Approaches From Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…For this the psychological and technological barriers to participate should be low (R1,R16). In the study of Brown et al [42], the technological and organizational challenges of sharing cyber security information are presented and requirements from the community are summarized for a possible solution. The key challenges they mentioned for building such systems are: working with multiple information sources, combining, determining and enriching data and the allocation of the information into organizational workflows and technological products (R14).…”
Section: Approaches From Literature Reviewmentioning
confidence: 99%
“…In summary, profit is seen for the individual players in the network by having the opportunity to access data which otherwise would not be in their scope [2][3][4][5]. Particularly in the case of specific CNs like supply chains, it was found that information sharing and coordination helps to reduce the bullwhip effect and the supply chain costs [31,32,42]. Therefore, DLT could enable innovative business models as well as new quality of collaboration in business networks.…”
Section: Introductionmentioning
confidence: 99%
“…A growing number of researchers argue that security threat intelligence programs are becoming a fundamental component of an organization's broader security agenda [20,23,24]. McMillan summarizes security threat intelligence as evidence-based knowledge about threats, which can be used to make informed security decisions within an organization [22].…”
Section: Related Workmentioning
confidence: 99%
“…However, this team can also contribute to an organization's security threat intelligence program by conducting detailed investigations, identifying root-causes associated with security events and incidents and producing actionable information [13]. This actionable information can include rogue IP addresses, malware metadata, and indicators of compromise [13,20]. This information can also be of interest to regional and national Computer Emergency Response Teams [21,27].…”
Section: Related Workmentioning
confidence: 99%
“…Shodan scans open ports such as HTTP, FTP, and TELNET through the handshake process (Brown et al 2015;Lee et al 2017;Serrano et al 2014). The device information is identified by analyzing with keywords contained in the banner.…”
Section: Scan Technology For Internet Devicesmentioning
confidence: 99%