2020
DOI: 10.1155/2020/8833765
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Security Framework for Reliable Threat Intelligence Sharing

Abstract: Computer security incident response teams typically rely on threat intelligence platforms for information about sightings of cyber threat events and indicators of compromise. Other security building blocks, such as Network Intrusion Detection Systems, can leverage the information to prevent malicious adversaries from spreading malware across critical infrastructures. The effectiveness of threat intelligence platforms heavily depends on the willingness to share among organizations and the responsible use of sen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
4
2

Relationship

1
9

Authors

Journals

citations
Cited by 31 publications
(16 citation statements)
references
References 24 publications
0
15
0
1
Order By: Relevance
“…It analyzed the contextual data in the threat intelligence to predict the behavior of the malicious version. Preuveneers et al [15] proposed the security enhancement framework of TATIS to timely respond to new vulnerabilities and attack forms in network attacks via threat intelligence analysis. Hinne [16] established a joint analysis model in network attack events and threat intelligence to analyze the attacker's motive and exploit the vulnerability, steps, and specific actions.…”
Section: Reat Intelligence Analysismentioning
confidence: 99%
“…It analyzed the contextual data in the threat intelligence to predict the behavior of the malicious version. Preuveneers et al [15] proposed the security enhancement framework of TATIS to timely respond to new vulnerabilities and attack forms in network attacks via threat intelligence analysis. Hinne [16] established a joint analysis model in network attack events and threat intelligence to analyze the attacker's motive and exploit the vulnerability, steps, and specific actions.…”
Section: Reat Intelligence Analysismentioning
confidence: 99%
“…Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is another method that can be used to give producers with fine grained access control [45].…”
Section: Access Controlmentioning
confidence: 99%
“…The overall approach of our solution is depicted in Figure 10. For more details on the CP-ABE scheme itself, we refer to our previous work [56]. Figure 11 depicts a subset of the attributes of the MISP event (i.e., only the file attachments) after being imported into TheHive.…”
Section: Taxonomy For Threats and Attacks Against ML Modelsmentioning
confidence: 99%