2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC) 2019
DOI: 10.1109/ccwc.2019.8666477
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Preserving Cyber Threat Information Sharing and Learning for Cyber Defense

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
4
1

Relationship

2
8

Authors

Journals

citations
Cited by 27 publications
(9 citation statements)
references
References 24 publications
0
9
0
Order By: Relevance
“…The two open-source approaches that are suited to less digitally mature SMEs have a very specific goal. In the first, the authors create a spam filter based on open-source spam data, which can then be used by organisations to prevent spam from reaching employee inboxes [42]. The second approach also uses publicly available spam data, but this time it is connected to organisation IPs and used as a tool to confront companies with their security level [43].…”
Section: Literature Reviewmentioning
confidence: 99%
“…The two open-source approaches that are suited to less digitally mature SMEs have a very specific goal. In the first, the authors create a spam filter based on open-source spam data, which can then be used by organisations to prevent spam from reaching employee inboxes [42]. The second approach also uses publicly available spam data, but this time it is connected to organisation IPs and used as a tool to confront companies with their security level [43].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Badsha et al [107] have proposed a new privacy-preserving user filtering protocol based on the locations where the users, who are not within a given region, can be eliminated. Recently, Badsha et al [108,109] have proposed a privacy-preserving collaborative cyber threat information sharing framework leveraging Homomorphic Encryption and content-centric network leveraging public key attribute-based encryption respectively.…”
Section: The Privacy-preserving Protocols and Mechanisms For Distribumentioning
confidence: 99%
“…Our approach is fully distributed as key management is handled in a distributed way by organizations sharing the data in a P2P manner, with federated authentication and access control support. Recently, Badsha et al [27] propose a privacy-preserving mechanism and protocol that employs homomorphic encryption to share aggregated CTI information (decision trees) across organizations through a central server that performs heavy homomorphic operations. e organizations are then able to learn the decision tree to make predictions or classifications on threat information, without disclosing private information.…”
Section: Related Workmentioning
confidence: 99%