Proceedings of the 8th International Conference on Data Science, Technology and Applications 2019
DOI: 10.5220/0007978103690376
|View full text |Cite
|
Sign up to set email alerts
|

The Quest for the Appropriate Cyber-threat Intelligence Sharing Platform

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…[5]). Modern studies which evaluate tools either do so via a literature based evaluation [7], or by surveying organisations [10], rather than direct empiric testing.…”
Section: Evaluation Of Sharing Methods and Platformsmentioning
confidence: 99%
See 1 more Smart Citation
“…[5]). Modern studies which evaluate tools either do so via a literature based evaluation [7], or by surveying organisations [10], rather than direct empiric testing.…”
Section: Evaluation Of Sharing Methods and Platformsmentioning
confidence: 99%
“…The reputation of stakeholders is gained over time, but is damaged easily [42] and is even harder to re-accumulate. Some form of anonymisation and unattributed information could help solve this worry [17], however there is currently no complete solution to the problem [10,20,32,34].An additional concern is that the sharing of raw data could expose details of the victim's infrastructure and encourage other threat actors to attack based on the information presented [41].…”
Section: Barriers To Cti Sharingmentioning
confidence: 99%
“…The Data Management and Sharing module of INTIME extends MISP [5,6] that takes the lead in the CTI life-cycle support platforms' race [102,103]. MISP models CTI using security events that contain objects and attributes.…”
mentioning
confidence: 99%