A Trusted, Verifiable and Differential Cyber Threat Intelligence Sharing Framework using Blockchain

被引:4
作者
Dunnett, Kealan [1 ]
Pal, Shantanu [2 ]
Putra, Guntur Dharma [3 ]
Jadidi, Zahra [4 ]
Jurdak, Raja [1 ]
机构
[1] Queensland Univ Technol, Sch Comp Sci, Brisbane, Qld 4000, Australia
[2] Deakin Univ, Sch Informat Technol, Melbourne, Vic 3125, Australia
[3] Univ New South Wales, Sch Comp Sci & Engn, Sydney, NSW 2052, Australia
[4] Griffith Univ, Sch Informat & Commun Technol, Gold Coast Campus, Southport, Qld 4222, Australia
来源
2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM | 2022年
关键词
Cyber Threat Intelligence; Sharing Information; Privacy; Trust; Verifiability; Accountability; Blockchain;
D O I
10.1109/TrustCom56396.2022.00152
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber Threat Intelligence (CTI) is the knowledge of cyber and physical threats that help mitigate potential cyber attacks. The rapid evolution of the current threat landscape has seen many organisations share CTI to strengthen their security posture for mutual benefit. However, in many cases, CTI data contains attributes (e.g., software versions) that have the potential to leak sensitive information or cause reputational damage to the sharing organisation. While current approaches allow restricting CTI sharing to trusted organisations, they lack solutions where the shared data can be verified and disseminated `differentially' (i.e., selective information sharing) with policies and metrics flexibly defined by an organisation. In this paper, we propose a blockchain-based CTI sharing framework that allows organisations to share sensitive CTI data in a trusted, verifiable and differential manner. We discuss the limitations associated with existing approaches and highlight the advantages of the proposed CTI sharing framework. We further present a detailed proof of concept using the Ethereum blockchain network. Our experimental results show that the proposed framework can facilitate the exchange of CTI without creating significant additional overheads.
引用
收藏
页码:1107 / 1114
页数:8
相关论文
共 19 条
[1]  
Allouche Y., 2021, PREPRINT
[2]  
[Anonymous], About us
[3]  
Badsha S, 2020, 2020 10TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), P317, DOI [10.1109/CCWC47524.2020.9031164, 10.1109/ccwc47524.2020.9031164]
[4]  
Benet J., 2014, CoRR
[5]  
cyber, ACSCS REPORT
[6]   Blockchain for Internet of Things: A Survey [J].
Dai, Hong-Ning ;
Zheng, Zibin ;
Zhang, Yan .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) :8076-8094
[7]  
docs.python, About us
[8]   Cyber risk management: History and future research directions [J].
Eling, Martin ;
McShane, Michael ;
Nguyen, Trung .
RISK MANAGEMENT AND INSURANCE REVIEW, 2021, 24 (01) :93-125
[9]   A New Network Model for Cyber Threat Intelligence Sharing Using Blockchain Technology [J].
Homan, Daire ;
Shiel, Ian ;
Thorpe, Christina .
2019 10TH IFIP INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2019,
[10]  
Jordan B., 2021, TAXII VERSION 2 1