A Novel Trust Taxonomy for Shared Cyber Threat Intelligence
Cyber threat intelligence sharing has become a focal point for many organizations to improve resilience against cyberattacks. The objective lies in sharing relevant information achieved through automating as many processes as possible without losing control or compromising security. The intelligence...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi-Wiley
2018-01-01
|
Series: | Security and Communication Networks |
Online Access: | http://dx.doi.org/10.1155/2018/9634507 |
id |
doaj-04e2fa15439a4c54bc88951f24b37c17 |
---|---|
record_format |
Article |
spelling |
doaj-04e2fa15439a4c54bc88951f24b37c172020-11-24T21:26:40ZengHindawi-WileySecurity and Communication Networks1939-01141939-01222018-01-01201810.1155/2018/96345079634507A Novel Trust Taxonomy for Shared Cyber Threat IntelligenceThomas D. Wagner0Esther Palomar1Khaled Mahbub2Ali E. Abdallah3Birmingham City University, Curzon Street, Birmingham, B4 7XG, UKBirmingham City University, Curzon Street, Birmingham, B4 7XG, UKBirmingham City University, Curzon Street, Birmingham, B4 7XG, UKBirmingham City University, Curzon Street, Birmingham, B4 7XG, UKCyber threat intelligence sharing has become a focal point for many organizations to improve resilience against cyberattacks. The objective lies in sharing relevant information achieved through automating as many processes as possible without losing control or compromising security. The intelligence may be crowdsourced from decentralized stakeholders to collect and enrich existing information. Trust is an attribute of actionable cyber threat intelligence that has to be established between stakeholders. Sharing information about vulnerabilities requires a high level of trust because of the sensitive information. Some threat intelligence platforms/providers support trust establishment through internal vetting processes; others rely on stakeholders to manually build up trust. The latter may reduce the amount of intelligence sources. This work presents a novel trust taxonomy to establish a trusted threat sharing environment. 30 popular threat intelligence platforms/providers were analyzed and compared regarding trust functionalities. Trust taxonomies were analyzed and compared. Illustrative case studies were developed and analyzed applying our trust taxonomy.http://dx.doi.org/10.1155/2018/9634507 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Thomas D. Wagner Esther Palomar Khaled Mahbub Ali E. Abdallah |
spellingShingle |
Thomas D. Wagner Esther Palomar Khaled Mahbub Ali E. Abdallah A Novel Trust Taxonomy for Shared Cyber Threat Intelligence Security and Communication Networks |
author_facet |
Thomas D. Wagner Esther Palomar Khaled Mahbub Ali E. Abdallah |
author_sort |
Thomas D. Wagner |
title |
A Novel Trust Taxonomy for Shared Cyber Threat Intelligence |
title_short |
A Novel Trust Taxonomy for Shared Cyber Threat Intelligence |
title_full |
A Novel Trust Taxonomy for Shared Cyber Threat Intelligence |
title_fullStr |
A Novel Trust Taxonomy for Shared Cyber Threat Intelligence |
title_full_unstemmed |
A Novel Trust Taxonomy for Shared Cyber Threat Intelligence |
title_sort |
novel trust taxonomy for shared cyber threat intelligence |
publisher |
Hindawi-Wiley |
series |
Security and Communication Networks |
issn |
1939-0114 1939-0122 |
publishDate |
2018-01-01 |
description |
Cyber threat intelligence sharing has become a focal point for many organizations to improve resilience against cyberattacks. The objective lies in sharing relevant information achieved through automating as many processes as possible without losing control or compromising security. The intelligence may be crowdsourced from decentralized stakeholders to collect and enrich existing information. Trust is an attribute of actionable cyber threat intelligence that has to be established between stakeholders. Sharing information about vulnerabilities requires a high level of trust because of the sensitive information. Some threat intelligence platforms/providers support trust establishment through internal vetting processes; others rely on stakeholders to manually build up trust. The latter may reduce the amount of intelligence sources. This work presents a novel trust taxonomy to establish a trusted threat sharing environment. 30 popular threat intelligence platforms/providers were analyzed and compared regarding trust functionalities. Trust taxonomies were analyzed and compared. Illustrative case studies were developed and analyzed applying our trust taxonomy. |
url |
http://dx.doi.org/10.1155/2018/9634507 |
work_keys_str_mv |
AT thomasdwagner anoveltrusttaxonomyforsharedcyberthreatintelligence AT estherpalomar anoveltrusttaxonomyforsharedcyberthreatintelligence AT khaledmahbub anoveltrusttaxonomyforsharedcyberthreatintelligence AT alieabdallah anoveltrusttaxonomyforsharedcyberthreatintelligence AT thomasdwagner noveltrusttaxonomyforsharedcyberthreatintelligence AT estherpalomar noveltrusttaxonomyforsharedcyberthreatintelligence AT khaledmahbub noveltrusttaxonomyforsharedcyberthreatintelligence AT alieabdallah noveltrusttaxonomyforsharedcyberthreatintelligence |
_version_ |
1725978193994711040 |