A survey on cyber threat intelligence sharing based on Blockchain

被引:5
作者
Ahmed El-Kosairy
Nashwa Abdelbaki
Heba Aslan
机构
[1] Nile University,Centre of Informatics Science, School of Information Technology and Computer Science
[2] Nile University,Informatics Department
[3] Electronics Research Institute,undefined
来源
Advances in Computational Intelligence | 2023年 / 3卷 / 3期
关键词
Blockchain; Threat intelligence feeds; Cyber threat intelligence; Threat sharing;
D O I
10.1007/s43674-023-00057-z
中图分类号
学科分类号
摘要
In recent years, cyber security attacks have increased massively. This introduces the need to defend against such attacks. Cyber security threat intelligence has recently been introduced to secure systems against security attacks. Cyber security threat intelligence (CTI) should be fast, trustful, and protect the sender's identity to stop these attacks at the right time. Threat intelligence sharing is vitally important since it is considered an effective way to improve threat understanding. This leads to protecting the assets and preventing the attack vectors. However, there is a paradox between the privacy safeguard needs of threat intelligence sharing; the need to produce complete proper threat intelligence feeds to be shared with the community, and other challenges and needs that are not covered in the traditional CTI. This paper aims to study how Blockchain technology can be incorporated with the CTI to solve the current issues and challenges in the traditional CTI. We collected the latest contributions that use Blockchain to overcome the conventional CTI problems and compared them to raise the reader’s awareness about the different methods used. Also, we mentioned the uncovered areas for each paper to offer a wide range of details and information about different areas that need to be investigated. Furthermore, the prospect challenges of integrating the Blockchain and CTI are discussed.
引用
收藏
相关论文
共 46 条
[1]  
Aljihani H(2021)Standalone behaviour-based attack detection techniques for distributed software systems via Blockchain Appl Sci 11 5685-160
[2]  
Aljihani H(2021)Standalone behaviour-based attack detection techniques for distributed software systems via Blockchain Appl Sci 4 149-22
[3]  
Eassa F(2018)A Blockchain future for internet of things security: a position paper Dig Commun Netw 2012 1-485
[4]  
Banerjeea M(2012)Standardizing cyber threat intelligence information with the structured threat information expression (stix) Mitre Corp 12 1205-13
[5]  
Lee J(2020)Blockchain for Industry 4.0: a comprehensive review, deep learning algorithms for internet of medical things IEEE Access 12 1205-97759
[6]  
Barnum S(2022)Methodological framework to collect, process, analyze and visualize cyber threat intelligence data Mach Learn Cybersecur Threats Chall Opport Appl Sci 6 480-177
[7]  
Bodkhe U(2022)Methodological framework to collect, process, analyze and visualize cyber threat intelligence data Appl Sci 12 6401-1190
[8]  
Tanwar S(2020)Performance analysis and comparison of PoW, PoS and DAG based Blockchains Dig Commun Netw 2021 11-1040
[9]  
Parekh K(2020)Blockchain-based cyber threat intelligence system architecture for sustainable computing Sustainability 8 1-1040
[10]  
Borges Amaro LJ(2021)Blockchain-based attack detection on machine learning algorithms for IoT-based e-Health applications IEEE Internet Things Mag 9 97747-154