Information Sharing Models for Cooperative Cyber Defence

被引:0
|
作者
Hernandez-Ardieta, Jorge L. [1 ]
Tapiador, Juan E. [2 ]
Suarez-Tangil, Guillermo [2 ]
机构
[1] Indra, Cybersecur Unit, Madrid, Spain
[2] Univ Carlos III Madrid, Dept Comp Sci, COSEC Lab, Madrid, Spain
来源
2013 5TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON) | 2013年
关键词
Cyber security; Cyber defence; Information sharing; Cooperation; SYSTEMS; STUXNET; TRUST;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The globalisation and increasing complexity of modern cyber security operations have made it virtually impossible for any organisation to properly manage cyber threats and cyber incidents without leveraging various collaboration instruments with different partners and allies. This is especially relevant in certain areas of national security, like the protection of critical infrastructures, where the partnership amongst public and private sectors is paramount to adequately protect those infrastructures from emerging threats. Over the last years consensus has emerged that sharing information about threats, actors, tactics and other cyber security information will play a central role in deploying an effective cooperative cyber defence. Near real-time information sharing has recently gained momentum as a means to redress the imbalance between defenders and attackers. In practical terms, the majority of current efforts in this area revolve around the idea of developing infrastructures and mechanisms that facilitate information sharing, notably through standardization of data formats and exchange protocols. While developing and deploying such an infrastructure is certainly essential to solve the problem of "how" to effectively share information, we believe that some key aspects still remain unaddressed, namely those related to deciding on "what" to share, "with whom", "when", as well as reasoning about the repercussions of sharing sensitive data. In this paper, we argue that effective policies for near real-time information sharing must rely on, at least, two pillars. First, formal models to estimate the subjective value of the information shared should be developed. Second, trust/reputation models that consider the dynamic behaviour and changing factors of the sharing community have to be identified. For the latter, we propose to model information sharing communities as directed graphs, with nodes representing community members and edges modelling sharing relationships among them. Relevant properties of both nodes and edges are captured through attributes attached to each of them, which subsequently facilitate reasoning about particular data exchanges.
引用
收藏
页数:28
相关论文
共 50 条
  • [41] Cooperative behavior and information sharing in the e-commerce age
    Pei, Zhi
    Yan, Ruiliang
    INDUSTRIAL MARKETING MANAGEMENT, 2019, 76 : 12 - 22
  • [42] Trust and Information Sharing in Supply Chains
    Ebrahim-Khanjari, Neda
    Hopp, Wallace
    Iravani, Seyed M. R.
    PRODUCTION AND OPERATIONS MANAGEMENT, 2012, 21 (03) : 444 - 464
  • [43] Information Sharing Requirements and Framework Needed for Community Cyber Incident Detection and Response
    Harrison, Keith
    White, Gregory
    2012 IEEE INTERNATIONAL CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY, 2012, : 463 - 469
  • [44] The use of Semantic Technologies in Cyber Defence
    Leenen, Louise
    Meyer, Thomas
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2015), 2015, : 170 - 177
  • [45] Game Theory in Cyber Security Defence
    Patrascu, Alecsandru
    Simion, Emil
    2013 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTERS AND ARTIFICIAL INTELLIGENCE (ECAI), 2013,
  • [46] Cybersecurity professionals information sharing sources and networks in the US electrical power industry
    Randall, Rick G.
    Allen, Stuart
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2021, 34
  • [47] Information sharing and oligopoly in agricultural markets: The role of the cooperative bargaining association
    Hueth, Brent
    Marcoul, Philippe
    AMERICAN JOURNAL OF AGRICULTURAL ECONOMICS, 2006, 88 (04) : 866 - 881
  • [48] Information and cyber security maturity models: a systematic literature review
    Rabii, Anass
    Assoul, Saliha
    Ouazzani Touhami, Khadija
    Roudies, Ounsa
    INFORMATION AND COMPUTER SECURITY, 2020, 28 (04) : 627 - 644
  • [49] Information-sharing and aggregation models for interacting minds
    Migdal, Piotr
    Raczaszek-Leonardi, Joanna
    Denkiewicz, Michal
    Plewczynski, Dariusz
    JOURNAL OF MATHEMATICAL PSYCHOLOGY, 2012, 56 (06) : 417 - 426
  • [50] Mission Assurance: Shifting the Focus of Cyber Defence
    Bigelow, Brad
    2017 9TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT: DEFENDING THE CORE (CYCON), 2017, : 43 - 54