2020
DOI: 10.3390/su12166401
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain-Based Cyber Threat Intelligence System Architecture for Sustainable Computing

Abstract: Nowadays, the designing of cyber-physical systems has a significant role and plays a substantial part in developing a sustainable computing ecosystem for secure and scalable network architecture. The introduction of Cyber Threat Intelligence (CTI) has emerged as a new security system to mitigate existing cyber terrorism for advanced applications. CTI demands a lot of requirements at every step. In particular, data collection is a critical source of information for analysis and sharing; it is highly dependent o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 34 publications
(19 citation statements)
references
References 37 publications
0
19
0
Order By: Relevance
“…Literature shows different approaches to the existing gaps in CTI sharing. Blockchain technologies were proposed as a sustainable computing architecture to share computing power for efficiency [23]. Blockchains were also leveraged to address the trust and quality issue to engage participation in CTI contribution [35].…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Literature shows different approaches to the existing gaps in CTI sharing. Blockchain technologies were proposed as a sustainable computing architecture to share computing power for efficiency [23]. Blockchains were also leveraged to address the trust and quality issue to engage participation in CTI contribution [35].…”
Section: Methodsmentioning
confidence: 99%
“…To better leverage IoT CTI, it is best that the secure methods do not assume central trust while offering equal access and quick propagation and action. A blockchain network is a great candidate for such secure methods, as shown by Cha et al [23]. They proposed a blockchain-based CTI system architecture for sustainable computing and used a blockchain network to provide sensitive data sharing.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Table 3 shows big data analysis methods and IoT applications via machine learning methods such as classification, clustering, association rule, prediction, and time series [45][46][47]. Proposed ELM methods are used in maximum IoT applications such as social networking, bioinformatics, smart energy, smart home, e-government, and others compare to other machine learning methods [48][49][50][51][52]. ELM based framework on the cloud layer provides excellent performance at a high data rate.…”
Section: Proposed Framework Evaluationmentioning
confidence: 99%
“…In this sense, it is worth noting current efforts in organizations as the International Association of Trusted Blockchain [28] or the European Telecommunications Standards Institute (ETSI) [29] to align efforts in pursuing standard data models and procedures for a broad set of application contexts, including the energy sector. Regarding incident management, standardization is crucial to ease the sharing, traceability, and trust evaluation of cyber threat intelligence sources [30]. Provenance evaluation is also critical for the identification of threats associated with inadequate software and firmware updates in the ecosystems of smart and micro grids.…”
Section: Distributed Ledger Technologies In Smart Gridsmentioning
confidence: 99%