Proceedings of the Fifth ACM/IEEE Workshop on Hot Topics in Web Systems and Technologies 2017
DOI: 10.1145/3132465.3132468
|View full text |Cite
|
Sign up to set email alerts
|

Rethinking information sharing for threat intelligence

Abstract: In the past decade, the information security and threat landscape has grown significantly making it difficult for a single defender to defend against all attacks at the same time. This called for introducing information sharing, a paradigm in which threat indicators are shared in a community of trust to facilitate defenses. Standards for representation, exchange, and consumption of indicators are proposed in the literature, although various issues are undermined. In this paper, we rethink information sharing f… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0
1

Year Published

2018
2018
2020
2020

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 19 publications
(19 citation statements)
references
References 39 publications
0
17
0
1
Order By: Relevance
“…Internal information may include e-mail addresses, names, and other PII. CTI that was intercepted by an adversary could be used to attack stakeholders who have not yet patched their system [50,51]. Every shared information should have a risk calculation according to its sensitivity and impact.…”
Section: Risks Of Sharing Ctimentioning
confidence: 99%
See 1 more Smart Citation
“…Internal information may include e-mail addresses, names, and other PII. CTI that was intercepted by an adversary could be used to attack stakeholders who have not yet patched their system [50,51]. Every shared information should have a risk calculation according to its sensitivity and impact.…”
Section: Risks Of Sharing Ctimentioning
confidence: 99%
“…The Quality may be evaluated by the correctness, relevance, timeliness, usefulness, and uniqueness [50]. Furthermore, a member of the CTI sharing community who has always shared useful and timely information may be labeled as a quality stakeholder [51].…”
Section: Actionable Cyber Threat Intelligencementioning
confidence: 99%
“…Dandurand et al [13] defined requirements for the exchange of information, emphasizing the necessity of assuring data integrity and availability, which is also supported by the work of Brown et al [14]. Mohaisen et al pointed out various open research questions in that field, such as possible dangers and negative incentives that may relate to the exchange of CTI [15]. In addition to this, there are also works that deal with specific implementations of CTI platforms, such as the MISP platform by Wagner et al [8].…”
Section: Related Workmentioning
confidence: 99%
“…Another example is presented in De Fuentes et al (2016), which proposes a protocol that provides privacy-preserving and agreeable cybersecurity information sharing, by leveraging existing format-preserving and homomorphic encryption techniques and adapting them to the particularities of standard message formats, such as the previous mentioned STIX. Finally, issues associated to the realization of an efficient and effective information sharing paradigms for actionable intelligence have been studied, focusing also on architectural solutions for ensuring privacy, considering many different standards for representing cyber threat information (Mohaisen et al 2017).…”
Section: Secure and Privacy-aware Information Sharingmentioning
confidence: 99%