Risk Assessment of Sharing Cyber Threat Intelligence

被引:0
|
作者
Albakri, Adham [1 ,2 ]
Boiten, Eerke [1 ]
Smith, Richard [1 ]
机构
[1] De Montfort Univ, Sch Comp Sci & Informat, Leicester, Leics, England
[2] Univ Kent, Sch Comp, Canterbury, Kent, England
关键词
Cyber threat intelligence; Information sharing; Risk assessment;
D O I
10.1007/978-3-030-66504-3_6
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Sharing Cyber Threat Intelligence (CTI) is advocated to get better defence against new sophisticated cyber-attacks. CTI may contain critical information about the victim infrastructure, existing vulnerabilities and business processes so sharing CTI may carry a risk. However, evaluating the risk of sharing CTI datasets is challenging due to the nature of the CTI context which is associated with the evolution of the threat landscape and new cyber attacks that are difficult to evaluate. In this paper, we present a quantitative risk model to assess the risk of sharing CTI datasets enabled by sharing with different entities in various situations. The model enables the identification of the threats and evaluation of the impacts of disclosing this information. We present two use cases that help to determine the risk level of sharing a CTI dataset and consequently the mitigation techniques to enable responsible sharing. Risk identification and evaluation have been validated using experts' opinions.
引用
收藏
页码:92 / 113
页数:22
相关论文
共 50 条
  • [31] A Comprehensive Dynamic Quality Assessment Method for Cyber Threat Intelligence
    Wang, Menghan
    Yang, Libin
    Lou, Wei
    [J]. 52ND ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS WORKSHOP VOLUME (DSN-W 2022), 2022, : 178 - 181
  • [32] Barriers to Adopting Interoperability Standards for Cyber Threat Intelligence Sharing: An Exploratory Study
    Gong, Nicole
    [J]. INTELLIGENT COMPUTING, VOL 2, 2019, 857 : 666 - 684
  • [33] Privacy-Preserving Polyglot Sharing and Analysis of Confidential Cyber Threat Intelligence
    Preuveneers, Davy
    Joosen, Wouter
    [J]. PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, ARES 2022, 2022,
  • [34] A Trusted, Verifiable and Differential Cyber Threat Intelligence Sharing Framework using Blockchain
    Dunnett, Kealan
    Pal, Shantanu
    Putra, Guntur Dharma
    Jadidi, Zahra
    Jurdak, Raja
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 1107 - 1114
  • [35] A Blockchain-Enabled Incentivised Framework for Cyber Threat Intelligence Sharing in ICS
    Nguyen, Kathy
    Pal, Shantanu
    Jadidi, Zahra
    Dorri, Ali
    Jurdak, Raja
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS AND OTHER AFFILIATED EVENTS (PERCOM WORKSHOPS), 2022,
  • [36] Maximizing the benefits from sharing cyber threat intelligence by government agencies and departments
    Dykstra, Josiah
    Gordon, Lawrence A.
    Loeb, Martin P.
    Zhou, Lei
    [J]. JOURNAL OF CYBERSECURITY, 2023, 9 (01):
  • [37] Data-driven analytics for cyber-threat intelligence and information sharing
    Qamar, Sara
    Anwar, Zahid
    Rahman, Mohammad Ashiqur
    Al-Shaer, Ehab
    Chu, Bei-Tseng
    [J]. COMPUTERS & SECURITY, 2017, 67 : 35 - 58
  • [38] A New Network Model for Cyber Threat Intelligence Sharing Using Blockchain Technology
    Homan, Daire
    Shiel, Ian
    Thorpe, Christina
    [J]. 2019 10TH IFIP INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2019,
  • [39] Risk Management Using Cyber-Threat Information Sharing and Cyber-Insurance
    Tosh, Deepak K.
    Shetty, Sachin
    Sengupta, Shamik
    Kesan, Jay P.
    Kamhoua, Charles A.
    [J]. GAME THEORY FOR NETWORKS (GAMENETS 2017), 2017, 212 : 154 - 164
  • [40] Modeling Cyber Threat Intelligence
    Bromander, Siri
    Swimmer, Morton
    Eian, Martin
    Skjotskift, Geir
    Borg, Fredrik
    [J]. ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 273 - 280