2018
DOI: 10.1155/2018/9634507
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Trust Taxonomy for Shared Cyber Threat Intelligence

Abstract: Cyber threat intelligence sharing has become a focal point for many organizations to improve resilience against cyberattacks. The objective lies in sharing relevant information achieved through automating as many processes as possible without losing control or compromising security. The intelligence may be crowdsourced from decentralized stakeholders to collect and enrich existing information. Trust is an attribute of actionable cyber threat intelligence that has to be established between stakeholders. Sharing… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2020
2020
2025
2025

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 24 publications
(9 citation statements)
references
References 10 publications
0
9
0
Order By: Relevance
“…Applying privacy preserving mechanisms introduces a trade-off between the effectiveness of the process of information sharing and compliance with privacy preserving guidelines and policies [10], [11]. Moreover, trustworthiness of a CTI source is evaluated in the studies of [12], [13] in the aim of providing a more rigorous trust-model.…”
Section: A Cti Quality and Trustmentioning
confidence: 99%
See 1 more Smart Citation
“…Applying privacy preserving mechanisms introduces a trade-off between the effectiveness of the process of information sharing and compliance with privacy preserving guidelines and policies [10], [11]. Moreover, trustworthiness of a CTI source is evaluated in the studies of [12], [13] in the aim of providing a more rigorous trust-model.…”
Section: A Cti Quality and Trustmentioning
confidence: 99%
“…There are several approaches to determine Trust, further described in [12]. To the best of our knowledge, the TISPs that are mentioned in this study do not establish trust using automated mechanisms.…”
Section: A Cti Quality and Trustmentioning
confidence: 99%
“…CTI systems formalize and classify cyber threat patterns to increase the understanding of cyber threats. In [15], the types of CTI data in terms of data sharing are categorized. The CTI system can use the kill-chain model [16] as a threat response technique that formalizes cyber threat stages and uses optimal countermeasures for each attack phase.…”
Section: State Of the Artmentioning
confidence: 99%
“…In [20], the authors evaluate current standards, ontologies, and taxonomies for CTI sharing. Wagner et al [21] define a trust taxonomy of shared cyber threat intelligence, analyzing 30 threat intelligence platforms and providers according to their trust functionalities. Most solutions do not allow direct external connection or allow this with manual trust establishment among organizations.…”
Section: Related Workmentioning
confidence: 99%