Contextualized Filtering for Shared Cyber Threat Information

被引:2
|
作者
Dimitriadis, Athanasios [1 ,2 ]
Prassas, Christos [1 ]
Flores, Jose Luis [3 ]
Kulvatunyou, Boonserm [4 ]
Ivezic, Nenad [4 ]
Gritzalis, Dimitris A. [5 ]
Mavridis, Ioannis K. [1 ]
机构
[1] Univ Macedonia, Dept Appl Informat, 156 Egnatia Str, Thessaloniki 54636, Greece
[2] NIST, Engn Lab, 100 Bur Dr, Gaithersburg, MD 20899 USA
[3] Basque Res & Technol Alliance BRTA, IKERLAN Technol Res Ctr, Ind Cybersecur, PJM Arizmendiarrieta 2, Arrasate Mondragon 20500, Spain
[4] NIST, Engn Lab, 100 Bur Dr, Gaithersburg, MD 20899 USA
[5] Athens Univ Econ & Business AUEB, Dept Informat, Athens 10434, Greece
关键词
cyber threat information sharing; actionable threat information; filtering; business process context; INTELLIGENCE;
D O I
10.3390/s21144890
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Cyber threat information sharing is an imperative process towards achieving collaborative security, but it poses several challenges. One crucial challenge is the plethora of shared threat information. Therefore, there is a need to advance filtering of such information. While the state-of-the-art in filtering relies primarily on keyword- and domain-based searching, these approaches require sizable human involvement and rarely available domain expertise. Recent research revealed the need for harvesting of business information to fill the gap in filtering, albeit it resulted in providing coarse-grained filtering based on the utilization of such information. This paper presents a novel contextualized filtering approach that exploits standardized and multi-level contextual information of business processes. The contextual information describes the conditions under which a given threat information is actionable from an organization perspective. Therefore, it can automate filtering by measuring the equivalence between the context of the shared threat information and the context of the consuming organization. The paper directly contributes to filtering challenge and indirectly to automated customized threat information sharing. Moreover, the paper proposes the architecture of a cyber threat information sharing ecosystem that operates according to the proposed filtering approach and defines the characteristics that are advantageous to filtering approaches. Implementation of the proposed approach can support compliance with the Special Publication 800-150 of the National Institute of Standards and Technology.
引用
收藏
页数:17
相关论文
共 50 条
  • [1] Relevance Filtering for Shared Cyber Threat Intelligence (Short Paper)
    Wagner, Thomas D.
    Palomar, Esther
    Mahbub, Khaled
    Abdallah, Ali E.
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2017, 2017, 10701 : 576 - 586
  • [2] Efficient Incident Response System on Shared Cyber Threat Information Using SDN and STIX
    Okada, Satoshi
    Fujiwara, Yoshiki
    Fujimoto, Mariko
    Matsuda, Wataru
    Mitsunaga, Takuho
    2021 IEEE INTERNATIONAL CONFERENCE ON COMPUTING (ICOCO), 2021, : 109 - 114
  • [3] A Shared Cyber Threat Intelligence Solution for SMEs
    van Haastrecht, Max
    Golpur, Guy
    Tzismadia, Gilad
    Kab, Rolan
    Priboi, Cristian
    David, Dumitru
    Racataian, Adrian
    Brinkhuis, Matthieu
    Spruit, Marco
    ELECTRONICS, 2021, 10 (23)
  • [4] A Novel Trust Taxonomy for Shared Cyber Threat Intelligence
    Wagner, Thomas D.
    Palomar, Esther
    Mahbub, Khaled
    Abdallah, Ali E.
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [5] Towards an Anonymity Supported Platform for Shared Cyber Threat Intelligence
    Wagner, Thomas D.
    Palomar, Esther
    Mahbub, Khaled
    Abdallah, Ali E.
    RISKS AND SECURITY OF INTERNET AND SYSTEMS, CRISIS 2017, 2018, 10694 : 175 - 183
  • [6] SECURE CYBER SECURITY THREAT INFORMATION EXCHANGE
    Ionita, Mihai-Gabriel
    PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE ON INFORMATICS IN ECONOMY (IE 2015): EDUCATION, RESEARCH & BUSINESS TECHNOLOGIES, 2015, : 63 - 67
  • [7] Design of a Cyber Threat Information Collection System for Cyber Attack Correlation
    Kim, Nakhyun
    Lee, Seulgi
    Cho, Hyeisun
    Kim, Byun-Ik
    Jun, MoonSeog
    2018 INTERNATIONAL CONFERENCE ON PLATFORM TECHNOLOGY AND SERVICE (PLATCON18), 2018, : 216 - 219
  • [8] Privacy Preserving Cyber Threat Information Sharing and Learning for Cyber Defense
    Badsha, Shahriar
    Vakilinia, Iman
    Sengupta, Shamik
    2019 IEEE 9TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2019, : 708 - 714
  • [9] CYBER TERRORISM - A MODERN SECURITY THREAT TO INFORMATION SYSTEMS
    Prislan, Kaja
    Bernik, Igor
    POLICING IN CENTRAL AND EASTERN EUROPE - SOCIAL CONTROL OF UNCONVENTIONAL DEVIANCE: CONFERENCE PROCEEDINGS, 2011, : 175 - +
  • [10] Secure and Robust Cyber Security Threat Information Sharing
    Bkakria, Anis
    Yaich, Reda
    Arabi, Walid
    FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2021, 2022, 13291 : 3 - 18