2023
DOI: 10.3390/electronics12112454
|View full text |Cite
|
Sign up to set email alerts
|

A Blockchain-Based Incentive Mechanism for Sharing Cyber Threat Intelligence

Abstract: With the development of the Internet, cyberattacks are becoming increasingly complex, sustained, and organized. Cyber threat intelligence sharing is one of the effective ways to alleviate the pressure on organizational or individual cyber security defense. However, the current cyber threat intelligence sharing lacks effective incentive mechanisms, resulting in mutual distrust and a lack of motivation to share among sharing members, making the security of sharing questionable. In this paper, we propose a blockc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 25 publications
0
2
0
Order By: Relevance
“…Ma et al [37] propose a CTI sharing mechanism based on blockchain, applying game theory principles and smart contracts. Their approach is designed to motivate and promote active participation in CTI sharing, mitigate free-riding behavior among participants, and enhance enthusiasm and efficiency in the sharing process.…”
Section: Public Blockchainsmentioning
confidence: 99%
“…Ma et al [37] propose a CTI sharing mechanism based on blockchain, applying game theory principles and smart contracts. Their approach is designed to motivate and promote active participation in CTI sharing, mitigate free-riding behavior among participants, and enhance enthusiasm and efficiency in the sharing process.…”
Section: Public Blockchainsmentioning
confidence: 99%
“…In Ref. [107], Ma, Yu, Du, Li, Ni, and Lv suggest an incentive system for exchanging cyber threat intelligence based on blockchain technology. By promoting cooperation and information exchange amongst stakeholders, this method seeks to strengthen group cybersecurity defenses in an environment lacking in trust.…”
Section: Literature Reviewmentioning
confidence: 99%