Blockchain-Based Cyber Threat Intelligence System Architecture for Sustainable Computing

被引:35
作者
Cha, Jeonghun [1 ]
Singh, Sushil Kumar [1 ]
Pan, Yi [2 ]
Park, Jong Hyuk [1 ]
机构
[1] Seoul Natl Univ Sci & Technol SeoulTech, Dept Comp Sci & Engn, Seoul 01811, South Korea
[2] Georgia State Univ, Dept Comp Sci, Atlanta, GA 30302 USA
关键词
cyber threat intelligence; blockchain; sustainable computing; security;
D O I
10.3390/su12166401
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
Nowadays, the designing of cyber-physical systems has a significant role and plays a substantial part in developing a sustainable computing ecosystem for secure and scalable network architecture. The introduction of Cyber Threat Intelligence (CTI) has emerged as a new security system to mitigate existing cyber terrorism for advanced applications. CTI demands a lot of requirements at every step. In particular, data collection is a critical source of information for analysis and sharing; it is highly dependent on the reliability of the data. Although many feeds provide information on threats recently, it is essential to collect reliable data, as the data may be of unknown origin and provide information on unverified threats. Additionally, effective resource management needs to be put in place due to the large volume and diversity of the data. In this paper, we propose a blockchain-based cyber threat intelligence system architecture for sustainable computing in order to address issues such as reliability, privacy, scalability, and sustainability. The proposed system model can cooperate with multiple feeds that collect CTI data, create a reliable dataset, reduce network load, and measure organizations' contributions to motivate participation. To assess the proposed model's effectiveness, we perform the experimental analysis, taking into account various measures, including reliability, privacy, scalability, and sustainability. Experimental results of evaluation using the IP of 10 open source intelligence (OSINT) CTI feeds show that the proposed model saves about 15% of storage space compared to total network resources in a limited test environment.
引用
收藏
页数:18
相关论文
共 42 条
[1]   From logs to Stories: Human-Centred Data Mining for Cyber Threat Intelligence [J].
Afzaliseresht, Neda ;
Miao, Yuan ;
Michalska, Sandra ;
Liu, Qing ;
Wang, Hua .
IEEE ACCESS, 2020, 8 :19089-19099
[2]  
Almukaynizi M., 2017, P 2017 INT C COMP SO
[3]  
Barnum S., 2012, Mitre Corporation, V11, P1
[4]   Leveraging CybOX™ to standardize representation and exchange of digital forensic information [J].
Casey, Eoghan ;
Back, Greg ;
Barnum, Sean .
DIGITAL INVESTIGATION, 2015, 12 :S102-S110
[5]  
Cinque M., 2018, P 2018 IEEE INT S SO
[6]  
Connolly J., 2014, The Trusted Automated Exchange of Indicator Information (taxii), P1
[7]   A Reliability Comparison Method for OSINT Validity Analysis [J].
Gong, Seonghyeon ;
Cho, Jaeik ;
Lee, Changhoon .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (12) :5428-5435
[8]  
Griffioen H., P 19 INT C APPL CRYP
[9]  
Gro S., 2020, ARXIV200106616
[10]   Location Data Record Privacy Protection Based on Differential Privacy Mechanism [J].
Gu, Ke ;
Yang, Lihao ;
Yin, Bo .
INFORMATION TECHNOLOGY AND CONTROL, 2018, 47 (04) :639-654