Information Sharing Models for Cooperative Cyber Defence

被引:0
|
作者
Hernandez-Ardieta, Jorge L. [1 ]
Tapiador, Juan E. [2 ]
Suarez-Tangil, Guillermo [2 ]
机构
[1] Indra, Cybersecur Unit, Madrid, Spain
[2] Univ Carlos III Madrid, Dept Comp Sci, COSEC Lab, Madrid, Spain
来源
2013 5TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON) | 2013年
关键词
Cyber security; Cyber defence; Information sharing; Cooperation; SYSTEMS; STUXNET; TRUST;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The globalisation and increasing complexity of modern cyber security operations have made it virtually impossible for any organisation to properly manage cyber threats and cyber incidents without leveraging various collaboration instruments with different partners and allies. This is especially relevant in certain areas of national security, like the protection of critical infrastructures, where the partnership amongst public and private sectors is paramount to adequately protect those infrastructures from emerging threats. Over the last years consensus has emerged that sharing information about threats, actors, tactics and other cyber security information will play a central role in deploying an effective cooperative cyber defence. Near real-time information sharing has recently gained momentum as a means to redress the imbalance between defenders and attackers. In practical terms, the majority of current efforts in this area revolve around the idea of developing infrastructures and mechanisms that facilitate information sharing, notably through standardization of data formats and exchange protocols. While developing and deploying such an infrastructure is certainly essential to solve the problem of "how" to effectively share information, we believe that some key aspects still remain unaddressed, namely those related to deciding on "what" to share, "with whom", "when", as well as reasoning about the repercussions of sharing sensitive data. In this paper, we argue that effective policies for near real-time information sharing must rely on, at least, two pillars. First, formal models to estimate the subjective value of the information shared should be developed. Second, trust/reputation models that consider the dynamic behaviour and changing factors of the sharing community have to be identified. For the latter, we propose to model information sharing communities as directed graphs, with nodes representing community members and edges modelling sharing relationships among them. Relevant properties of both nodes and edges are captured through attributes attached to each of them, which subsequently facilitate reasoning about particular data exchanges.
引用
收藏
页数:28
相关论文
共 50 条
  • [21] On the value of information sharing and cooperative price setting
    Jiang, Li
    Hao, Zhongyuan
    OPERATIONS RESEARCH LETTERS, 2014, 42 (6-7) : 399 - 403
  • [22] From sharing food to sharing information Cooperative breeding and language evolution
    Burkart, Judith
    Martins, Eloisa Guerreiro
    Miss, Fabia
    Zurcher, Yvonne
    INTERACTION STUDIES, 2018, 19 (1-2) : 136 - 150
  • [23] On Neutrality and Cyber Defence
    Stolz, Marcel
    PROCEEDINGS OF THE 18TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2019), 2019, : 484 - 491
  • [24] Towards the adoption of automated cyber threat intelligence information sharing with integrated risk assessment
    Rios, Valeria Valdes
    Zaidi, Fatiha
    Cavalli, Ana Rosa
    Rego, Angel
    19TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY, ARES 2024, 2024,
  • [25] An Empirical Study on Buyer-supplier Relationships, Information Sharing and Cooperative Performance
    Wu Jun
    Xiang Yuanjiang
    He Peixu
    EBM 2010: INTERNATIONAL CONFERENCE ON ENGINEERING AND BUSINESS MANAGEMENT, VOLS 1-8, 2010, : 2688 - 2693
  • [26] Information sharing in DEA: A cooperative game theory approach
    Lozano, S.
    EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2012, 222 (03) : 558 - 565
  • [27] Cyber Security Information Sharing During a Large Scale Real Life Cyber Security Exercise
    Hautamaki, Jari
    Kokkonen, Tero
    Sipola, Tuomo
    GOOD PRACTICES AND NEW PERSPECTIVES IN INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 3, WORLDCIST 2024, 2024, 987 : 45 - 55
  • [28] Proactive Antifragility: A New Paradigm for Next-Generation Cyber Defence at the Edge
    Uzunov, Anton, V
    Nepal, Surya
    Chhetri, Mohan Baruwal
    2019 IEEE 5TH INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC 2019), 2019, : 246 - 255
  • [29] Towards mature federated cyber incident management and information sharing capabilities in NATO and NATO Nations
    Brown, Sarah
    Moye, Tamsin
    Hubertse, Rob
    Glavan, Cezar
    MILCOM 2019 - 2019 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2019,
  • [30] Information Sharing in Cybersecurity: A Review
    Pala, Ali
    Zhuang, Jun
    DECISION ANALYSIS, 2019, 16 (03) : 172 - 196