Collaborative Cyber Threat Intelligence 2017
DOI: 10.4324/9781315397900-5
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Threat Intelligence Sharing through National and Sector-Oriented Communities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 1 publication
0
5
0
Order By: Relevance
“…There is also a need for better intra and inter team communication tools ( Fransen and Kerkdijk, 2017 ). Current tools used as explained in the interviews, such as chat applications, phone calls and wikis, are often inadequate for updating shared awareness within the team, let alone between different teams, especially when there is a need for in-depth technical communication.…”
Section: Resultsmentioning
confidence: 99%
“…There is also a need for better intra and inter team communication tools ( Fransen and Kerkdijk, 2017 ). Current tools used as explained in the interviews, such as chat applications, phone calls and wikis, are often inadequate for updating shared awareness within the team, let alone between different teams, especially when there is a need for in-depth technical communication.…”
Section: Resultsmentioning
confidence: 99%
“…The model allows the group of intelligence producers and consumers to share information [34]. Where private companies direct the source, this can be seen as controversial as they may be more interested in profit or competition with other providers [35].…”
Section: Cti Sharing Modelsmentioning
confidence: 99%
“…Noor et al [24] state that the hybrid model enables the best elements of both models, with Peer to Peer elements effectively collecting strategic CTI, while Hub and Spoke behaviour adds value to the raw CTI. The Hybrid model allows CTI from a central source to be shared with their peers [35], however, this could cause some issues for some proprietary platforms where the licensing only allows exclusive use by the subscriber and concerns around classification and source protection. This model could be useful for the energy sector, where feeds come from central government sources, with members being vetted before joining a community of sharers [6], while also facilitating timely peer sharing.…”
Section: Cti Sharing Modelsmentioning
confidence: 99%
“…Current Approach for Detecting Multi-Institutional Attacks. The main approach for handling multi-institution attacks currently is through sharing attack intelligence [14]. Cyber threat intelligence takes on many forms [14].…”
Section: Chapter 2 Related Workmentioning
confidence: 99%
“…Their networks are large, continuously changing, and there are a large number of attack attempts which overwhelms institution staff. They are also hesitant to share information [14] because:…”
Section: Chapter 2 Related Workmentioning
confidence: 99%