Risk Assessment of Sharing Cyber Threat Intelligence

被引:0
|
作者
Albakri, Adham [1 ,2 ]
Boiten, Eerke [1 ]
Smith, Richard [1 ]
机构
[1] De Montfort Univ, Sch Comp Sci & Informat, Leicester, Leics, England
[2] Univ Kent, Sch Comp, Canterbury, Kent, England
关键词
Cyber threat intelligence; Information sharing; Risk assessment;
D O I
10.1007/978-3-030-66504-3_6
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Sharing Cyber Threat Intelligence (CTI) is advocated to get better defence against new sophisticated cyber-attacks. CTI may contain critical information about the victim infrastructure, existing vulnerabilities and business processes so sharing CTI may carry a risk. However, evaluating the risk of sharing CTI datasets is challenging due to the nature of the CTI context which is associated with the evolution of the threat landscape and new cyber attacks that are difficult to evaluate. In this paper, we present a quantitative risk model to assess the risk of sharing CTI datasets enabled by sharing with different entities in various situations. The model enables the identification of the threats and evaluation of the impacts of disclosing this information. We present two use cases that help to determine the risk level of sharing a CTI dataset and consequently the mitigation techniques to enable responsible sharing. Risk identification and evaluation have been validated using experts' opinions.
引用
收藏
页码:92 / 113
页数:22
相关论文
共 50 条
  • [1] The Role of Cyber Threat Intelligence Sharing in the Metaverse
    Dunnett, Kealan
    Pal, Shantanu
    Jadidi, Zahra
    Jurdak, Raja
    [J]. IEEE Internet of Things Magazine, 2023, 6 (01): : 154 - 160
  • [2] Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligence
    Mavroeidis, Vasileios
    Bromander, Siri
    [J]. 2017 EUROPEAN INTELLIGENCE AND SECURITY INFORMATICS CONFERENCE (EISIC), 2017, : 91 - 98
  • [3] A survey on cyber threat intelligence sharing based on Blockchain
    Ahmed El-Kosairy
    Nashwa Abdelbaki
    Heba Aslan
    [J]. Advances in Computational Intelligence, 2023, 3 (3):
  • [4] Sharing Susceptible Passwords as Cyber Threat Intelligence Feed
    Vakilinia, Iman
    Cheung, Sui
    Sengupta, Shamik
    [J]. 2018 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2018), 2018, : 767 - 772
  • [5] A Summary of the Development of Cyber Security Threat Intelligence Sharing
    Du, Lili
    Fan, Yaqin
    Zhang, Lvyang
    Wang, Lianying
    Sun, Tianhang
    [J]. INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2020, 12 (04) : 54 - 67
  • [6] Cyber threat intelligence sharing: Survey and research directions
    Wagner, Thomas D.
    Mahbub, Khaled
    Palomar, Esther
    Abdallah, Ali E.
    [J]. COMPUTERS & SECURITY, 2019, 87
  • [7] Factors Amplifying or Inhibiting Cyber Threat Intelligence Sharing
    Nainna, Muhammad A.
    Bass, Julian M.
    Speakman, Lee
    [J]. INFORMATION SYSTEMS, PT 2, EMCIS 2023, 2024, 502 : 204 - 214
  • [8] Cyber Threat Intelligence in Risk Management A Survey of the Impact of Cyber Threat Intelligence on Saudi Higher Education Risk Management
    Aljuhami, Amira M.
    Bamasoud, Doaa M.
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (10) : 156 - 164
  • [9] Toward Automated Cyber Defense with Secure Sharing of Structured Cyber Threat Intelligence
    Haque, Md. Farhan
    Krishnan, Ram
    [J]. INFORMATION SYSTEMS FRONTIERS, 2021, 23 (04) : 883 - 896
  • [10] Toward Automated Cyber Defense with Secure Sharing of Structured Cyber Threat Intelligence
    Md. Farhan Haque
    Ram Krishnan
    [J]. Information Systems Frontiers, 2021, 23 : 883 - 896