Information Sharing Models for Cooperative Cyber Defence

被引:0
|
作者
Hernandez-Ardieta, Jorge L. [1 ]
Tapiador, Juan E. [2 ]
Suarez-Tangil, Guillermo [2 ]
机构
[1] Indra, Cybersecur Unit, Madrid, Spain
[2] Univ Carlos III Madrid, Dept Comp Sci, COSEC Lab, Madrid, Spain
来源
2013 5TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON) | 2013年
关键词
Cyber security; Cyber defence; Information sharing; Cooperation; SYSTEMS; STUXNET; TRUST;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The globalisation and increasing complexity of modern cyber security operations have made it virtually impossible for any organisation to properly manage cyber threats and cyber incidents without leveraging various collaboration instruments with different partners and allies. This is especially relevant in certain areas of national security, like the protection of critical infrastructures, where the partnership amongst public and private sectors is paramount to adequately protect those infrastructures from emerging threats. Over the last years consensus has emerged that sharing information about threats, actors, tactics and other cyber security information will play a central role in deploying an effective cooperative cyber defence. Near real-time information sharing has recently gained momentum as a means to redress the imbalance between defenders and attackers. In practical terms, the majority of current efforts in this area revolve around the idea of developing infrastructures and mechanisms that facilitate information sharing, notably through standardization of data formats and exchange protocols. While developing and deploying such an infrastructure is certainly essential to solve the problem of "how" to effectively share information, we believe that some key aspects still remain unaddressed, namely those related to deciding on "what" to share, "with whom", "when", as well as reasoning about the repercussions of sharing sensitive data. In this paper, we argue that effective policies for near real-time information sharing must rely on, at least, two pillars. First, formal models to estimate the subjective value of the information shared should be developed. Second, trust/reputation models that consider the dynamic behaviour and changing factors of the sharing community have to be identified. For the latter, we propose to model information sharing communities as directed graphs, with nodes representing community members and edges modelling sharing relationships among them. Relevant properties of both nodes and edges are captured through attributes attached to each of them, which subsequently facilitate reasoning about particular data exchanges.
引用
收藏
页数:28
相关论文
共 50 条
  • [1] Cyber Defence Information Sharing in a Federated Network
    Kantola, H.
    Jaitner, M. Levin
    2016 IEEE INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON U.S.), 2016, : 86 - 93
  • [2] ON THE SHARING OF CYBER SECURITY INFORMATION
    Luiijf, Eric
    Klaver, Marieke
    CRITICAL INFRASTRUCTURE PROTECTION IX, 2015, 466 : 29 - 46
  • [3] Sharing Compromising Information as a Cooperative Strategy
    Gambetta, Diego
    Przepiorka, Wojtek
    SOCIOLOGICAL SCIENCE, 2019, 6 : 352 - 379
  • [4] Information Sharing & Cyber Threats
    Hsu, Sonya H. Y.
    Dick, Steven J.
    2017 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2017, : 89 - 94
  • [5] Towards Trustworthy Information Sharing by Creating Cyber Security Alliances
    Deljoo, Ameneh
    van Engers, Tom
    Koning, Ralph
    Gommans, Leon
    de Laat, Cees
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1506 - 1510
  • [6] Trusted information sharing for cyber situational awareness
    Sutton, D.
    ELEKTROTECHNIK UND INFORMATIONSTECHNIK, 2015, 132 (02): : 113 - 116
  • [7] A Collaborative Information Sharing Framework for Community Cyber Security
    Zhao, Wanying
    White, Gregory
    2012 IEEE INTERNATIONAL CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY, 2012, : 457 - 462
  • [8] Secure and Robust Cyber Security Threat Information Sharing
    Bkakria, Anis
    Yaich, Reda
    Arabi, Walid
    FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2021, 2022, 13291 : 3 - 18
  • [9] Risks of Sharing Cyber Incident Information
    Albakri, Adham
    Boiten, Eerke
    De Lemos, Rogerio
    13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
  • [10] Can We Evaluate the Impact of Cyber Security Information Sharing?
    Zibak, Adam
    Simpson, Andrew
    2018 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBER SA), 2018,