A Blockchain-Based Framework for Scalable and Trustless Delegation of Cyber Threat Intelligence

被引:2
|
作者
Dunnett, Kealan [1 ]
Pal, Shantanu [2 ]
Jadidi, Zahra [3 ]
Jurdak, Raja [1 ]
机构
[1] Queensland Univ Technol, Sch Comp Sci, Trusted Networks Lab, Brisbane, Qld 4000, Australia
[2] Deakin Univ, Sch Informat Technol, Melbourne, Vic 3125, Australia
[3] Griffith Univ, Sch Informat & Commun Technol, Gold Coast Campus, Nathan, Qld 4222, Australia
关键词
Cyber Threat Intelligence; Information Sharing; Privacy; Trust; Delegation; Data Injection; Blockchain;
D O I
10.1109/ICBC56567.2023.10174885
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
CTI sharing is increasingly used by organisations to strengthen security. The sensitivity of CTI has led to research on trust-based sharing, yet most existing CTI sharing approaches only support static trust-based decisions or centralised trust evaluation, limiting their scalability and lead to centralised risk. This paper proposes a blockchain-based CTI sharing framework that relies on trustless delegates for dynamic trust-based decision-making and decentralised trust evaluation. To facilitate trustless delegation, our proposal allows CTI producers to intentionally inject false data on a periodic basis into the system to audit the behaviour of delegates. Moreover, unlike existing approaches, delegates within our framework facilitate sharing of CTI directly with consumers such that scalable CTI sharing occurs. The results of a qualitative evaluation of the proposed framework's security show that it is resilient to common privacy and trust concerns. Moreover, a quantitative evaluation of a proof-of-concept prototype using Ethereum show that the proposed framework is scalable and cost-effective.
引用
收藏
页数:9
相关论文
共 50 条
  • [31] Exploring Blockchain on Cybersecurity: Cyber-Threat Intelligence Sharing
    Chaabouni, Fatma Ben Mesmia
    Jayaprakash, Sujith
    SMART TRENDS IN COMPUTING AND COMMUNICATIONS, VOL 4, SMARTCOM 2024, 2024, 948 : 389 - 398
  • [32] DefenseChain: Consortium Blockchain for Cyber Threat Intelligence Sharing and Defense
    Purohit, Soumya
    Calyam, Prasad
    Wang, Songjie
    Yempalla, RajaniKanth
    Varghese, Justin
    2020 2ND CONFERENCE ON BLOCKCHAIN RESEARCH & APPLICATIONS FOR INNOVATIVE NETWORKS AND SERVICES (BRAINS), 2020, : 112 - 119
  • [33] AI-Based Holistic Framework for Cyber Threat Intelligence Management
    Spyros, Arnolnt
    Koritsas, Ilias
    Papoutsis, Angelos
    Panagiotou, Panos
    Chatzakou, Despoina
    Kavallieros, Dimitrios
    Tsikrika, Theodora
    Vrochidis, Stefanos
    Kompatsiaris, Ioannis
    IEEE ACCESS, 2025, 13 : 20820 - 20846
  • [34] Blockchain Oracles: A Framework for Blockchain-Based Applications
    Mammadzada, Kamran
    Iqbal, Mubashar
    Milani, Fredrik
    Garcia-Banuelos, Luciano
    Matulevicius, Raimundas
    BUSINESS PROCESS MANAGEMENT: BLOCKCHAIN AND ROBOTIC PROCESS AUTOMATION FORUM, BPM 2020 BLOCKCHAIN AND RPA FORUM, 2020, 393 : 19 - 34
  • [35] Blockchain-based Trustless Pair Payment Protocol for Verifiable Confidential Outsourcing Computation
    Lee, Hiu Long
    Au, Man Ho Allen
    Sun, Shi-Feng
    2023 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN, BLOCKCHAIN, 2023, : 221 - 228
  • [36] A blockchain-based trust system for decentralised applications: When trustless needs trust
    Truong, Nguyen
    Lee, Gyu Myoung
    Sun, Kai
    Guitton, Florian
    Guo, YiKe
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 124 (124): : 68 - 79
  • [37] Exploiting constrained IoT devices in a trustless blockchain-based water management system
    Pincheira, Miguel
    Vecchio, Massimo
    Giaffreda, Raffaele
    Kanhere, Salil S.
    2020 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN AND CRYPTOCURRENCY (IEEE ICBC), 2020,
  • [38] A Reputation-Based Approach Using Consortium Blockchain for Cyber Threat Intelligence Sharing
    Zhang, Xiaohui
    Miao, Xianghua
    Xue, Mingying
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [39] Blockchain-based multi-organizational cyber risk management framework for collaborative environments
    Habib El Amin
    Lina Oueidat
    Maroun Chamoun
    Abed Ellatif Samhat
    Antoine Feghali
    International Journal of Information Security, 2024, 23 : 1231 - 1249
  • [40] A Scalable Blockchain-Based Integrity Verification Scheme
    Zhou, Zequan
    Luo, Xiling
    Bai, Yi
    Wang, Xiaochao
    Liu, Feng
    Liu, Gang
    Xu, Yifu
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022