BFLS: Blockchain and Federated Learning for sharing threat detection models as Cyber Threat Intelligence

被引:16
|
作者
Jiang, Tongtong [1 ]
Shen, Guowei [1 ]
Guo, Chun [1 ]
Cui, Yunhe [1 ]
Xie, Bo [2 ]
机构
[1] Guizhou Univ, Sch Comp Sci & Technol, State Key Lab Publ Big Data, Guiyang, Peoples R China
[2] South China Normal Univ, Sch Elect & Informat Engn, Foshan, Peoples R China
基金
中国国家自然科学基金;
关键词
Blockchain; Federated learning; Cyber Threat Intelligence; Threat detection;
D O I
10.1016/j.comnet.2023.109604
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, Cyber Threat Intelligence (CTI) sharing has become an important weapon for cyber defenders to mitigate the increasing number of cyber attacks in a proactive and collaborative manner. However, with the dramatic increase in the deployment of shared communications between organizations, data has been a major priority to detect threats in the CTI sharing platform. In the modern environment, a valuable asset is the user's threat data. Privacy policies are necessary to ensure the security of user data in the threat intelligence sharing community. Federated learning acts as a special machine learning technique for privacy preservation and offers to contextualize data in a CTI sharing platform. Therefore, this article proposes a new approach to threat intelligence sharing called BFLS (Blockchain and Federated Learning for sharing threat detection models as Cyber Threat Intelligence), where blockchain-based CTI sharing platforms are used for security and privacy. Federated learning technology is adopted for scalable machine learning applications, such as threat detection. Furthermore, users can obtain a well-trained threat detection model without sending personal data to the central server. Experimental results on the ISCX-IDS-2012 and CIC-DDoS-2019 datasets showed that BFLS can securely share CTI and has high accuracy in threat detection. The accuracies of BFLS are 98.92% and 98.56% on the two datasets, respectively.
引用
收藏
页数:10
相关论文
共 50 条
  • [21] A Summary of the Development of Cyber Security Threat Intelligence Sharing
    Du, Lili
    Fan, Yaqin
    Zhang, Lvyang
    Wang, Lianying
    Sun, Tianhang
    INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2020, 12 (04) : 54 - 67
  • [22] Cyber threat intelligence sharing: Survey and research directions
    Wagner, Thomas D.
    Mahbub, Khaled
    Palomar, Esther
    Abdallah, Ali E.
    COMPUTERS & SECURITY, 2019, 87
  • [23] Factors Amplifying or Inhibiting Cyber Threat Intelligence Sharing
    Nainna, Muhammad A.
    Bass, Julian M.
    Speakman, Lee
    INFORMATION SYSTEMS, PT 2, EMCIS 2023, 2024, 502 : 204 - 214
  • [24] Cyber threat intelligence challenges: Leveraging blockchain intelligence with possible solution
    Saxena, Rashi
    Gayathri, E.
    MATERIALS TODAY-PROCEEDINGS, 2022, 51 : 682 - 689
  • [25] Blockchain-Based Cyber Threat Intelligence Sharing Using Proof-of-Quality Consensus
    Chatziamanetoglou D.
    Rantos K.
    Michienzi A.
    Security and Communication Networks, 2023, 2023
  • [26] BLOCIS: Blockchain-Based Cyber Threat Intelligence Sharing Framework for Sybil-Resistance
    Gong, Seonghyeon
    Lee, Changhoon
    ELECTRONICS, 2020, 9 (03)
  • [27] Block Hunter: Federated Learning for Cyber Threat Hunting in Blockchain-Based IIoT Networks
    Yazdinejad, Abbas
    Dehghantanha, Ali
    Parizi, Reza M.
    Hammoudeh, Mohammad
    Karimipour, Hadis
    Srivastava, Gautam
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (11) : 8356 - 8366
  • [28] Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence
    Gao, Peng
    Shao, Fei
    Liu, Xiaoyuan
    Xiao, Xusheng
    Qin, Zheng
    Xu, Fengyuan
    Mittal, Prateek
    Kulkarni, Sanjeev R.
    Song, Dawn
    2021 IEEE 37TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2021), 2021, : 193 - 204
  • [29] From Threat Data to Actionable Intelligence: An Exploratory Analysis of the Intelligence Cycle Implementation in Cyber Threat Intelligence Sharing Platforms
    Sauerwein, Clemens
    Fischer, Daniel
    Rubsamen, Milena
    Rosenberger, Guido
    Stelzer, Dirk
    Breu, Ruth
    ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,
  • [30] A Smart Contract Approach to Cyber Threat Intelligence Sharing in Kenya
    Maina, Wilson
    Nderu, Lawrence
    Mwalili, Tobias
    2022 IST-AFRICA CONFERENCE, 2022,