2019 IEEE 10th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON) 2019
DOI: 10.1109/iemcon.2019.8936249
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain-Based Threat Registry Platform

Abstract: This document presents a reference architecture for a Blockchain-based Threat Registry platform, named BBTR, to share information about treats among different actors. The design of the BBTR guarantees integrity and availability of the data stored in it and is also compatible with privacy requirements, allowing different actors to participate as users of this shared BaaS (Blockchain as a Service). The paper also shows how this approach can be combined with AI techniques to extract valuable information from the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 13 publications
0
1
0
Order By: Relevance
“…The studied projects presented cases of automation and enforcement of IT processes such as the deletion of user data in an automated way based on the user's right to be forgotten, the triggering of contingency actions for cyber security such as the isolation of an infrastructure from the internet, or the automated closure of network ports based on threat intelligence information [47]. In the industrial area, automated actions are carried out in the operations infrastructure based on information from trusted third parties registered in the blockchain without these orders having to be supervised by humans, interaction between robotic swarm systems [48], or robotic process automation in an office environment [49].…”
Section: Automation Of Processesmentioning
confidence: 99%
“…The studied projects presented cases of automation and enforcement of IT processes such as the deletion of user data in an automated way based on the user's right to be forgotten, the triggering of contingency actions for cyber security such as the isolation of an infrastructure from the internet, or the automated closure of network ports based on threat intelligence information [47]. In the industrial area, automated actions are carried out in the operations infrastructure based on information from trusted third parties registered in the blockchain without these orders having to be supervised by humans, interaction between robotic swarm systems [48], or robotic process automation in an office environment [49].…”
Section: Automation Of Processesmentioning
confidence: 99%