2014
DOI: 10.1109/msp.2014.99
|View full text |Cite
|
Sign up to set email alerts
|

Security Automation and Threat Information-Sharing Options

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
42
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 82 publications
(42 citation statements)
references
References 0 publications
0
42
0
Order By: Relevance
“…Interdependence between the firms p γ Information sharing effectiveness between firms p φ 1 Each firm's unit cost (inefficiency) of own information leakage p φ 2 Each firm's unit benefit (efficiency) of the other firm's information leakage p φ 3 Each firm's unit benefit (efficiency) of joint information leakage p Г k Hacker k's information sharing effectiveness with the other hacker, Period 4: Hacker j exerts attack efforts TAj and TBj against firms A and B to obtain further information, and shares information Sj with hacker i for future joint benefit. The actual breach by hacker j, if it occurs and to the extent it occurs, occurs in period 4.…”
Section: Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…Interdependence between the firms p γ Information sharing effectiveness between firms p φ 1 Each firm's unit cost (inefficiency) of own information leakage p φ 2 Each firm's unit benefit (efficiency) of the other firm's information leakage p φ 3 Each firm's unit benefit (efficiency) of joint information leakage p Г k Hacker k's information sharing effectiveness with the other hacker, Period 4: Hacker j exerts attack efforts TAj and TBj against firms A and B to obtain further information, and shares information Sj with hacker i for future joint benefit. The actual breach by hacker j, if it occurs and to the extent it occurs, occurs in period 4.…”
Section: Modelmentioning
confidence: 99%
“…Encouraging information sharing, the US federal government recommends Security Based Information Sharing Organizations (SB/ISOs), e.g., Information Sharing & Analysis Centers (ISACs), CERT, INFRAGARD, etc. Kampanakis [1] elaborates upon attempts to standardize security information sharing. Cyber attacks and information sharing differ in that the former demands funding, planning, effort, competence, infrastructure, etc., while the latter may be practically costless except providing the information, which today is possible in almost innumerable ways.…”
Section: Introductionmentioning
confidence: 99%
“…CybOX (cyber observable expression) is a language used to express network observables or states, and it provides foundation to many other standards. CybOX provides a common structure for representing network observables between or among related operational areas related to enterprise network security; its purpose is to capture and depict incidents and attributes observed in operational areas . These contents can be used to define or adorn attack patterns or appropriate parts of malicious program profiles in the rules; thus it can associate logic pattern structures with evidence that appear or exist in the real world to help perform attack detection and description.…”
Section: Related Workmentioning
confidence: 99%
“…The purpose of designing STIX is to extend indicator sharing to enable the management and widespread exchange of significantly more expressive sets of indicators as well as other full‐spectrum cyber threat information. STIX can implement the sharing of comprehensive, rich, and “high‐fidelity”' cyber threat information across organizational, community, and product/service boundaries . It provides a common mechanism for addressing structured cyber threat information across and among this full range of use cases, improving consistency, efficiency, interoperability, and overall situational awareness, and has better flexibility and extendibility.…”
Section: Related Workmentioning
confidence: 99%
“…$15.00 https://doi.org/10.1145/nnnnnnn.nnnnnnn amount of efforts understanding their behavior so that detection, classification, and labeling of malware are performed with high accuracy using analysis techniques [7][8][9][10][11][12][13]. Threat information sharing for the improvement of the malware detection system by collecting and sharing more information also has been actively studied [14][15][16].…”
Section: Introductionmentioning
confidence: 99%