2017 12th International Conference for Internet Technology and Secured Transactions (ICITST) 2017
DOI: 10.23919/icitst.2017.8356404
|View full text |Cite
|
Sign up to set email alerts
|

An architecture for privacy-preserving sharing of CTI with 3rd party analysis services

Abstract: Abstract-Increasing numbers of Small and Medium Enterprises (SME) are outsourcing or hosting their services on different Cloud Service Providers (CSP). They are also using different security services from these CSPs such as firewalls, intrusion detection/prevention systems and anti-malware. Although for the SMEs the main purpose of using these security services is to protect their cyber assets, either physical or virtual, from security threats and compromises, a very useful and valuable by-product of these sec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
3

Relationship

2
4

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 11 publications
0
8
0
Order By: Relevance
“…In [11] and [12], security analysis of CTI sharing with third party analysis platforms over cloud are presented. Both studies address the studies conducted towards this aim in the EU project of Collaborative and Confidential Information Sharing and Analysis for Cyber Protection (C3ISP).…”
Section: Related Workmentioning
confidence: 99%
“…In [11] and [12], security analysis of CTI sharing with third party analysis platforms over cloud are presented. Both studies address the studies conducted towards this aim in the EU project of Collaborative and Confidential Information Sharing and Analysis for Cyber Protection (C3ISP).…”
Section: Related Workmentioning
confidence: 99%
“…The quality of data of the shared feeds can be seen as a vector compiled by the criteria of timeliness, accuracy, scope, relevance and completeness are used in references [9], [10] to measure the quality of the data and further evaluate the available threat intelligent feeds. In [11], a threat score function is introduced to evaluate Indicators of Compromise (IoC) collected from various sources in order to support Security Operations Centre (SOC) analysts prioritise the incidents' analysis.…”
Section: A Cti Quality and Trustmentioning
confidence: 99%
“…In [11], a threat score function is introduced to evaluate Indicators of Compromise (IoC) collected from various sources in order to support Security Operations Centre (SOC) analysts prioritise the incidents' analysis. Another study [10] investigates the data quality dimensions of IoCs which are collected by several open sources in order to assess their effectiveness.…”
Section: A Cti Quality and Trustmentioning
confidence: 99%
“…Collaboration platforms are not limited to meetings or learning, and often aid users to achieve a common goal. Examples exist in the Intrusion Detection System (IDS) community, which has examined Collaborative Intrusion Detection Systems (CIDSs) for sharing Cyber Threat Intelligence (CTI) across different platforms (see Wagner et al, 2016;Giubilo et al, 2017;Happa, 2017;Nair et al, 2018). While these are driven by automation in sending event logs, the importance of making good use of the combination of automation and human analysts cognition cannot be understated.…”
Section: Introductionmentioning
confidence: 99%