Proceedings of the 2014 ACM Workshop on Information Sharing &Amp; Collaborative Security 2014
DOI: 10.1145/2663876.2663882
|View full text |Cite
|
Sign up to set email alerts
|

On the Design of a Cyber Security Data Sharing System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
4
3
3

Relationship

0
10

Authors

Journals

citations
Cited by 44 publications
(28 citation statements)
references
References 21 publications
0
25
0
Order By: Relevance
“…This actionable information can include rogue IP addresses, malware metadata, and indicators of compromise [13,20]. This information can also be of interest to regional and national Computer Emergency Response Teams [21,27].…”
Section: Related Workmentioning
confidence: 99%
“…This actionable information can include rogue IP addresses, malware metadata, and indicators of compromise [13,20]. This information can also be of interest to regional and national Computer Emergency Response Teams [21,27].…”
Section: Related Workmentioning
confidence: 99%
“…Shodan scans open ports such as HTTP, FTP, and TELNET through the handshake process (Brown et al 2015;Lee et al 2017;Serrano et al 2014). The device information is identified by analyzing with keywords contained in the banner.…”
Section: Scan Technology For Internet Devicesmentioning
confidence: 99%
“…Serrano et al [16] focus on the legal aspects of the cyber security data sharing between organisations subject to di erent legal frameworks. They also propose a solution in form of Information Exchange Policy which is set up by the organisations themselves.…”
Section: Legal Aspectsmentioning
confidence: 99%