BFLS: Blockchain and Federated Learning for sharing threat detection models as Cyber Threat Intelligence

被引:16
|
作者
Jiang, Tongtong [1 ]
Shen, Guowei [1 ]
Guo, Chun [1 ]
Cui, Yunhe [1 ]
Xie, Bo [2 ]
机构
[1] Guizhou Univ, Sch Comp Sci & Technol, State Key Lab Publ Big Data, Guiyang, Peoples R China
[2] South China Normal Univ, Sch Elect & Informat Engn, Foshan, Peoples R China
基金
中国国家自然科学基金;
关键词
Blockchain; Federated learning; Cyber Threat Intelligence; Threat detection;
D O I
10.1016/j.comnet.2023.109604
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, Cyber Threat Intelligence (CTI) sharing has become an important weapon for cyber defenders to mitigate the increasing number of cyber attacks in a proactive and collaborative manner. However, with the dramatic increase in the deployment of shared communications between organizations, data has been a major priority to detect threats in the CTI sharing platform. In the modern environment, a valuable asset is the user's threat data. Privacy policies are necessary to ensure the security of user data in the threat intelligence sharing community. Federated learning acts as a special machine learning technique for privacy preservation and offers to contextualize data in a CTI sharing platform. Therefore, this article proposes a new approach to threat intelligence sharing called BFLS (Blockchain and Federated Learning for sharing threat detection models as Cyber Threat Intelligence), where blockchain-based CTI sharing platforms are used for security and privacy. Federated learning technology is adopted for scalable machine learning applications, such as threat detection. Furthermore, users can obtain a well-trained threat detection model without sending personal data to the central server. Experimental results on the ISCX-IDS-2012 and CIC-DDoS-2019 datasets showed that BFLS can securely share CTI and has high accuracy in threat detection. The accuracies of BFLS are 98.92% and 98.56% on the two datasets, respectively.
引用
收藏
页数:10
相关论文
共 50 条
  • [41] Privacy Preserving Cyber Threat Information Sharing and Learning for Cyber Defense
    Badsha, Shahriar
    Vakilinia, Iman
    Sengupta, Shamik
    2019 IEEE 9TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2019, : 708 - 714
  • [42] Cyber Threat Intelligence for IoT Using Machine Learning
    Mishra, Shailendra
    Albarakati, Aiman
    Sharma, Sunil Kumar
    PROCESSES, 2022, 10 (12)
  • [43] Unifying Cyber Threat Intelligence
    Menges, Florian
    Sperl, Christine
    Pernul, Guenther
    TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, TRUSTBUS 2019, 2019, 11711 : 161 - 175
  • [44] Cyber Threat Intelligence for "Things"
    Wagner, Thomas D.
    2019 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBER SA), 2019,
  • [45] Modeling Cyber Threat Intelligence
    Bromander, Siri
    Swimmer, Morton
    Eian, Martin
    Skjotskift, Geir
    Borg, Fredrik
    ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 273 - 280
  • [46] Cyber Threat Intelligence 101
    Dror-John Röcher
    Datenschutz und Datensicherheit - DuD, 2018, 42 (10) : 623 - 628
  • [47] Threat Detection in Power Grid OT Networks: Unsupervised ML and Cyber Intelligence Sharing with STIX
    Mustafa, Hussain M.
    Basumallik, Sagnik
    Vellaithurai, Ceeman
    Srivastava, Anurag
    2024 12TH WORKSHOP ON MODELING AND SIMULATION OF CYBER-PHYSICAL ENERGY SYSTEMS, MSCPES, 2024,
  • [48] Developing a Cyber Threat Intelligence sharing platform for South African Organisations
    Mutemwa, Muyowa
    Mtsweni, Jabu
    Mkhonto, Njabulo
    2017 CONFERENCE ON INFORMATION COMMUNICATION TECHNOLOGY AND SOCIETY (ICTAS), 2017,
  • [49] Strategic Cyber Threat Intelligence Sharing: A Case Study of IDS Logs
    Dog, Spike E.
    Tweed, Alex
    Rouse, Leroy
    Chu, Bill
    Qi, Duan
    Hu, Yueqi
    Yang, Jing
    Al -Shaer, Ehab
    2016 25TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2016,
  • [50] Current approaches and future directions for Cyber Threat Intelligence sharing: A survey
    Alaeifar, Poopak
    Pal, Shantanu
    Jadidi, Zahra
    Hussain, Mukhtar
    Foo, Ernest
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 83