Sharing Is Caring: Hurdles and Prospects of Open, Crowd-Sourced Cyber Threat Intelligence

被引:7
作者
Jesus, Vitor [1 ]
Bains, Balraj [2 ]
Chang, Victor [3 ]
机构
[1] Aston Univ, Comp Sceince Dept, Birmingham B4 7UP, England
[2] Aston Univ, Comp Sci Dept, Birmingham B4 7ET, England
[3] Aston Business Sch, Birmingham B4 7UP, England
关键词
Confidentiality; cybersecurity; cybersecurity management; cyber threat intelligence (CTI); CYBERSECURITY;
D O I
10.1109/TEM.2023.3279274
中图分类号
F [经济];
学科分类号
02 ;
摘要
Cyber threat intelligence (CTI) is widely recognized as an important area in cybersecurity but it remains an area showing silos and reserved for large organizations. For an area whose strength is in open and responsive sharing, we see that the generation of feeds has a small scale, is secretive, and is nearly always from specialized businesses that have a commercial interest in not publicly sharing insights at a speed where it could be effective in raising preparedness or stopping an attack. This article has three purposes. First, we extensively review the state and challenges of open, crowd-sourced CTI, with a focus on the perceived barriers. Second, having identified that confidentiality (in multiple forms) is a key barrier, we perform a confidentiality threat analysis of existing sharing architectures and standards, including reviewing circa one million of real-world feeds between 2014 and 2022 from the popular open platform MISP toward quantifying the inherent risks. Our goal is to build the case that, either by redesigning sharing architectures or simply performing simple sanitization of shared information, the confidentiality argument is not as strong as one may have presumed. Third, after identifying key requirements for open crowd-based sharing of CTI, we propose a reference (meta-) architecture.
引用
收藏
页码:6854 / 6873
页数:20
相关论文
共 95 条
[1]  
Ahrend J.M., 2016, PROC INT C CYBER SIT, P1
[2]   Cyber Threat Intelligence from Honeypot Data using Elasticsearch [J].
AL-Mohannadi, Hamad ;
Awan, Irfan ;
Al Hamar, Jassim ;
Cullen, Andrea ;
Disso, Jules Pagan ;
Armitage, Lorna .
PROCEEDINGS 2018 IEEE 32ND INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2018, :900-906
[3]  
Albakri A., 2018, Proceedings of the Thirteenth International Conference on Availability, Reliability and Security, P1
[4]  
AlShlawi F. A., 2020, P 3 INT C COMPUTER A, P1
[5]  
[Anonymous], VERIS Community Database (VCDB)
[6]  
[Anonymous], 2004, P 11 ACM C COMP COMM, DOI DOI 10.1109/TSC.2010.60
[7]  
[Anonymous], OFF THE RECORD MESSA
[8]  
[Anonymous], MISP: Malware Information Sharing Platform
[9]  
[Anonymous], Vocabulary for Event Recording and Incident Sharing (VERIS)
[10]   Organizational Architecture, Resilience, and Cyberattacks [J].
Appiah, Gloria ;
Amankwah-Amoah, Joseph ;
Liu, Yu-Lun .
IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, 2022, 69 (05) :2218-2233