Information Sharing Models for Cooperative Cyber Defence

被引:0
|
作者
Hernandez-Ardieta, Jorge L. [1 ]
Tapiador, Juan E. [2 ]
Suarez-Tangil, Guillermo [2 ]
机构
[1] Indra, Cybersecur Unit, Madrid, Spain
[2] Univ Carlos III Madrid, Dept Comp Sci, COSEC Lab, Madrid, Spain
来源
2013 5TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON) | 2013年
关键词
Cyber security; Cyber defence; Information sharing; Cooperation; SYSTEMS; STUXNET; TRUST;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The globalisation and increasing complexity of modern cyber security operations have made it virtually impossible for any organisation to properly manage cyber threats and cyber incidents without leveraging various collaboration instruments with different partners and allies. This is especially relevant in certain areas of national security, like the protection of critical infrastructures, where the partnership amongst public and private sectors is paramount to adequately protect those infrastructures from emerging threats. Over the last years consensus has emerged that sharing information about threats, actors, tactics and other cyber security information will play a central role in deploying an effective cooperative cyber defence. Near real-time information sharing has recently gained momentum as a means to redress the imbalance between defenders and attackers. In practical terms, the majority of current efforts in this area revolve around the idea of developing infrastructures and mechanisms that facilitate information sharing, notably through standardization of data formats and exchange protocols. While developing and deploying such an infrastructure is certainly essential to solve the problem of "how" to effectively share information, we believe that some key aspects still remain unaddressed, namely those related to deciding on "what" to share, "with whom", "when", as well as reasoning about the repercussions of sharing sensitive data. In this paper, we argue that effective policies for near real-time information sharing must rely on, at least, two pillars. First, formal models to estimate the subjective value of the information shared should be developed. Second, trust/reputation models that consider the dynamic behaviour and changing factors of the sharing community have to be identified. For the latter, we propose to model information sharing communities as directed graphs, with nodes representing community members and edges modelling sharing relationships among them. Relevant properties of both nodes and edges are captured through attributes attached to each of them, which subsequently facilitate reasoning about particular data exchanges.
引用
收藏
页数:28
相关论文
共 50 条
  • [31] LAGGING COLOSSUS OR A MATURE CYBER-ALLIANCE? 20 Years of Cyber Defence in NATO
    Mad'ar, Tomas
    OBRANA A STRATEGIE-DEFENCE & STRATEGY, 2019, 19 (01): : 5 - 22
  • [32] The "Triptych of Cyber Security": A Classification of Active Cyber Defence
    Dewar, Robert S.
    2014 6TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON 2014), 2014, : 7 - 21
  • [33] Competitive and cooperative particle swarm optimization with information sharing mechanism for global optimization problems
    Li, Yuhua
    Zhan, Zhi-Hui
    Lin, Shujin
    Zhang, Jun
    Luo, Xiaonan
    INFORMATION SCIENCES, 2015, 293 : 370 - 382
  • [34] UNISON: Towards a Middleware Architecture for Autonomous Cyber Defence
    Docking, Michael
    Uzunov, Anton V.
    Fiddyment, Chris
    Brain, Richard
    Hewett, Scott
    Blucher, Lee
    2015 24TH AUSTRALASIAN SOFTWARE ENGINEERING CONFERENCE (ASWEC 2015), 2015, : 203 - 212
  • [35] International Cyber Incident Repository System: Information Sharing on a Global Scale
    Joyce, Amanda L.
    Evans, Nathaniel
    Tanzman, Edward A.
    Israeli, Daniel
    2016 IEEE INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON U.S.), 2016, : 63 - 68
  • [36] Model for Sharing the Information of Cyber Security Situation Awareness between Organizations
    Kokkonen, Tero
    Hautamaki, Jari
    Siltanen, Jarmo
    Hamalainen, Timo
    2016 23RD INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT), 2016,
  • [37] Cyber Threat Information Sharing System for Industrial Control System (ICS)
    Abe, Shingo
    Uchida, Yukako
    Hori, Mitsutaka
    Hiraoka, Yuichiro
    Horata, Shinichi
    2018 57TH ANNUAL CONFERENCE OF THE SOCIETY OF INSTRUMENT AND CONTROL ENGINEERS OF JAPAN (SICE), 2018, : 374 - 379
  • [38] Modeling And Simulation Architecture For Training In Cyber Defence Education
    Subasu, Georgiana
    Rosu, Livia
    Badoi, Ion
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTERS AND ARTIFICIAL INTELLIGENCE - ECAI 2017, 2017,
  • [39] Cybersecurity and cyber defence: national level strategic approach
    Galinec, Darko
    Moznik, Darko
    Guberina, Boris
    AUTOMATIKA, 2017, 58 (03) : 273 - 286
  • [40] Contradictions of employee involvement, information sharing and expectations: A case study of an Indian worker cooperative
    Kandathil, George Mathew
    Varman, Rahul
    ECONOMIC AND INDUSTRIAL DEMOCRACY, 2007, 28 (01) : 140 - 174