2022
DOI: 10.3390/e24101379
|View full text |Cite
|
Sign up to set email alerts
|

Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform

Abstract: Historically, threat information sharing has relied on manual modelling and centralised network systems, which can be inefficient, insecure, and prone to errors. Alternatively, private blockchains are now widely used to address these issues and improve overall organisational security. An organisation’s vulnerabilities to attacks might change over time. It is utterly important to find a balance among a current threat, the potential countermeasures, their consequences and costs, and the estimation of the overall… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 25 publications
0
5
0
Order By: Relevance
“…Ali et al [49,50] introduce a system that ensures privacy and trust through the utilization of distributed ledger technology. The system employs smart contracts for secure decentralized operations and establishes a privacy-preserving ecosystem dedicated to the storage and sharing of threat information related to the MITRE ATT&CK framework.…”
Section: Private Blockchainsmentioning
confidence: 99%
See 1 more Smart Citation
“…Ali et al [49,50] introduce a system that ensures privacy and trust through the utilization of distributed ledger technology. The system employs smart contracts for secure decentralized operations and establishes a privacy-preserving ecosystem dedicated to the storage and sharing of threat information related to the MITRE ATT&CK framework.…”
Section: Private Blockchainsmentioning
confidence: 99%
“…Ensuring high-quality CTI not only enhances the efficacy of threat detection and response but also reinforces the foundation of trust by promoting a shared understanding of the threat landscape. Along with quality, other significant factors that are increasingly explored are the scalability and performance of the proposed solutions [36,39,40,42,50,57,71]. Scalability ensures that the system can accommodate a growing volume of CTI transactions effectively.…”
Section: Rq3: Research Focusmentioning
confidence: 99%
“…Threat intelligence in smart healthcare refers to the collection, transformation, observation, analysis, and interpretation of any information or knowledge about cyber threats or attacks that will assist healthcare providers in taking appropriate action to protect their healthcare systems and networks [183]. Zhang et al [184] and Ali et al [185] define threat intelligence sharing as a proactive approach in which security experts in healthcare organizations collaborate to share insights and information about suspicious activities, potential cyber threats, attack patterns, and threat incidents with only trusted partners to enhance the entire security of the SHS and network. Threat intelligence information is gathered from internal network logs, security tools, open-source intelligence, commercial threat intelligence feeds, and industry-specific sharing networks such as information sharing and analysis centers.…”
Section: Threat Intelligence Sharingmentioning
confidence: 99%
“…The blockchain stores verified medical data that cannot be edited or removed randomly. The shared ledger protects blockchain blocks using cryptographic methods, ensuring medical data integrity, transparency, and privacy[110][185]. Blockchain improves the interoperability of existing medical records by using an immutable database and masking user identity via public key transactions.…”
mentioning
confidence: 99%
“…Additionally, the performance aspect faces challenges, particularly in preserving high availability resources while maintaining low latency and scalability. For a comprehensive overview, Table 1 outlines different related works leveraging the benefit of using emergent technologies including Permissioned "Private Blockchain" or Permissionless "Public Blockchain" [20], IPFS, and encryption techniques in comparison to our proposed model which defines a new approach that incorporates emergent technologies to build and lightweight solution to provide medical services with high performance efficiency while preserving a maximum security measure to protect personal user's data over the network.…”
Section: E-health System Based On Public Blockchainmentioning
confidence: 99%