A Novel Trust Taxonomy for Shared Cyber Threat Intelligence

Cyber threat intelligence sharing has become a focal point for many organizations to improve resilience against cyberattacks. The objective lies in sharing relevant information achieved through automating as many processes as possible without losing control or compromising security. The intelligence...

Full description

Bibliographic Details
Main Authors: Thomas D. Wagner, Esther Palomar, Khaled Mahbub, Ali E. Abdallah
Format: Article
Language:English
Published: Hindawi-Wiley 2018-01-01
Series:Security and Communication Networks
Online Access:http://dx.doi.org/10.1155/2018/9634507
id doaj-04e2fa15439a4c54bc88951f24b37c17
record_format Article
spelling doaj-04e2fa15439a4c54bc88951f24b37c172020-11-24T21:26:40ZengHindawi-WileySecurity and Communication Networks1939-01141939-01222018-01-01201810.1155/2018/96345079634507A Novel Trust Taxonomy for Shared Cyber Threat IntelligenceThomas D. Wagner0Esther Palomar1Khaled Mahbub2Ali E. Abdallah3Birmingham City University, Curzon Street, Birmingham, B4 7XG, UKBirmingham City University, Curzon Street, Birmingham, B4 7XG, UKBirmingham City University, Curzon Street, Birmingham, B4 7XG, UKBirmingham City University, Curzon Street, Birmingham, B4 7XG, UKCyber threat intelligence sharing has become a focal point for many organizations to improve resilience against cyberattacks. The objective lies in sharing relevant information achieved through automating as many processes as possible without losing control or compromising security. The intelligence may be crowdsourced from decentralized stakeholders to collect and enrich existing information. Trust is an attribute of actionable cyber threat intelligence that has to be established between stakeholders. Sharing information about vulnerabilities requires a high level of trust because of the sensitive information. Some threat intelligence platforms/providers support trust establishment through internal vetting processes; others rely on stakeholders to manually build up trust. The latter may reduce the amount of intelligence sources. This work presents a novel trust taxonomy to establish a trusted threat sharing environment. 30 popular threat intelligence platforms/providers were analyzed and compared regarding trust functionalities. Trust taxonomies were analyzed and compared. Illustrative case studies were developed and analyzed applying our trust taxonomy.http://dx.doi.org/10.1155/2018/9634507
collection DOAJ
language English
format Article
sources DOAJ
author Thomas D. Wagner
Esther Palomar
Khaled Mahbub
Ali E. Abdallah
spellingShingle Thomas D. Wagner
Esther Palomar
Khaled Mahbub
Ali E. Abdallah
A Novel Trust Taxonomy for Shared Cyber Threat Intelligence
Security and Communication Networks
author_facet Thomas D. Wagner
Esther Palomar
Khaled Mahbub
Ali E. Abdallah
author_sort Thomas D. Wagner
title A Novel Trust Taxonomy for Shared Cyber Threat Intelligence
title_short A Novel Trust Taxonomy for Shared Cyber Threat Intelligence
title_full A Novel Trust Taxonomy for Shared Cyber Threat Intelligence
title_fullStr A Novel Trust Taxonomy for Shared Cyber Threat Intelligence
title_full_unstemmed A Novel Trust Taxonomy for Shared Cyber Threat Intelligence
title_sort novel trust taxonomy for shared cyber threat intelligence
publisher Hindawi-Wiley
series Security and Communication Networks
issn 1939-0114
1939-0122
publishDate 2018-01-01
description Cyber threat intelligence sharing has become a focal point for many organizations to improve resilience against cyberattacks. The objective lies in sharing relevant information achieved through automating as many processes as possible without losing control or compromising security. The intelligence may be crowdsourced from decentralized stakeholders to collect and enrich existing information. Trust is an attribute of actionable cyber threat intelligence that has to be established between stakeholders. Sharing information about vulnerabilities requires a high level of trust because of the sensitive information. Some threat intelligence platforms/providers support trust establishment through internal vetting processes; others rely on stakeholders to manually build up trust. The latter may reduce the amount of intelligence sources. This work presents a novel trust taxonomy to establish a trusted threat sharing environment. 30 popular threat intelligence platforms/providers were analyzed and compared regarding trust functionalities. Trust taxonomies were analyzed and compared. Illustrative case studies were developed and analyzed applying our trust taxonomy.
url http://dx.doi.org/10.1155/2018/9634507
work_keys_str_mv AT thomasdwagner anoveltrusttaxonomyforsharedcyberthreatintelligence
AT estherpalomar anoveltrusttaxonomyforsharedcyberthreatintelligence
AT khaledmahbub anoveltrusttaxonomyforsharedcyberthreatintelligence
AT alieabdallah anoveltrusttaxonomyforsharedcyberthreatintelligence
AT thomasdwagner noveltrusttaxonomyforsharedcyberthreatintelligence
AT estherpalomar noveltrusttaxonomyforsharedcyberthreatintelligence
AT khaledmahbub noveltrusttaxonomyforsharedcyberthreatintelligence
AT alieabdallah noveltrusttaxonomyforsharedcyberthreatintelligence
_version_ 1725978193994711040