Towards Privacy-Preserving Sharing of Cyber Threat Intelligence for Effective Response and Recovery

被引:0
|
作者
Nitz, Lasse [1 ,2 ]
Gurabi, Mehdi Akbari [1 ,2 ]
Mandal, Avikarsha [1 ,2 ]
Heitmann, Benjamin [1 ,2 ]
机构
[1] Fraunhofer FIT, St Augustin, Germany
[2] Fraunhofer Inst Appl Informat Technol FIT, St Augustin, Germany
来源
ERCIM NEWS | 2021年 / 126期
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Many European organisations suffer from a lack of sufficient resources to provide satisfactory and timely response and recovery (R&R) actions when targeted by cyber-attacks. R&R capabilities can be significantly improved through sharing of information related to incident detection and handling. In this context, privacy-preserving technologies can enable data sharing, while protecting privacy- and security-critical information. The technologies to achieve this are being developed and evaluated in the SAPPAN project.
引用
收藏
页码:33 / 34
页数:2
相关论文
共 50 条
  • [1] Privacy-Preserving Polyglot Sharing and Analysis of Confidential Cyber Threat Intelligence
    Preuveneers, Davy
    Joosen, Wouter
    [J]. PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, ARES 2022, 2022,
  • [2] Enabling Privacy-preserving Sharing of Cyber Threat Information in the Cloud
    Fan, Wenjun
    Ziembicka, Joanna
    de Lemos, Rogerio
    Chadwick, David
    Di Cerbo, Francesco
    Sajjad, Ali
    Wang, Xiao-Si
    Herwono, Ian
    [J]. 2019 6TH IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (IEEE CSCLOUD 2019) / 2019 5TH IEEE INTERNATIONAL CONFERENCE ON EDGE COMPUTING AND SCALABLE CLOUD (IEEE EDGECOM 2019), 2019, : 74 - 80
  • [3] Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers
    Ali, Hisham
    Papadopoulos, Pavlos
    Ahmad, Jawad
    Pitropakis, Nikolaos
    Jaroucheh, Zakwan
    Buchanan, William J.
    [J]. 2021 14TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS (SIN 2021), 2021,
  • [4] Towards privacy preserving threat intelligence
    Dara, Sashank
    Zargar, Saman Taghavi
    Muralidhara, V. N.
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 38 : 28 - 39
  • [5] A Decentralized Approach to Threat Intelligence using Federated Learning in Privacy-Preserving Cyber Security
    Sakhare, Nitin N.
    Kulkarni, Raj
    Rizvi, Nuzhat
    Raich, Devashri
    Dhablia, Anishkumar
    Bendale, Shailesh P.
    [J]. JOURNAL OF ELECTRICAL SYSTEMS, 2023, 19 (03) : 106 - 125
  • [6] Privacy Preserving Cyber Threat Information Sharing and Learning for Cyber Defense
    Badsha, Shahriar
    Vakilinia, Iman
    Sengupta, Shamik
    [J]. 2019 IEEE 9TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2019, : 708 - 714
  • [7] Privacy-preserving correlation of cross-organizational cyber threat intelligence with private graph intersections
    Preuveneers, Davy
    Joosen, Wouter
    [J]. COMPUTERS & SECURITY, 2023, 135
  • [8] Towards Privacy-preserving Data Sharing in Smart Environments
    Hernandez-Ramos, Jose L.
    Bernal Bernabe, Jorge
    Skarmeta, Antonio F.
    [J]. 2014 EIGHTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS), 2014, : 334 - 339
  • [9] Priv-Share: A privacy-preserving framework for differential and trustless delegation of cyber threat intelligence using blockchain
    Dunnett, Kealan
    Pal, Shantanu
    Jadidi, Zahra
    Dedeoglu, Volkan
    Jurdak, Raja
    [J]. COMPUTER NETWORKS, 2024, 252
  • [10] Towards Privacy-Preserving Content Sharing for Online Social Networks
    Phithakkitnukoon, Santi
    [J]. PROCEEDINGS OF THE 2018 ACM INTERNATIONAL JOINT CONFERENCE ON PERVASIVE AND UBIQUITOUS COMPUTING AND PROCEEDINGS OF THE 2018 ACM INTERNATIONAL SYMPOSIUM ON WEARABLE COMPUTERS (UBICOMP/ISWC'18 ADJUNCT), 2018, : 1088 - 1095