A Trusted, Verifiable and Differential Cyber Threat Intelligence Sharing Framework using Blockchain

Loading...
Thumbnail Image
File version

Accepted Manuscript (AM)

Author(s)
Dunnett, Kealan
Pal, Shantanu
Putra, Guntur Dharma
Jadidi, Zahra
Jurdak, Raja
Griffith University Author(s)
Primary Supervisor
Other Supervisors
Editor(s)
Date
2022
Size
File type(s)
Location

Wuhan, China

License
Abstract

Cyber Threat Intelligence (CTI) is the knowledge of cyber and physical threats that help mitigate potential cyber attacks. The rapid evolution of the current threat landscape has seen many organisations share CTI to strengthen their security posture for mutual benefit. However, in many cases, CTI data contains attributes (e.g., software versions) that have the potential to leak sensitive information or cause reputational damage to the sharing organisation. While current approaches allow restricting CTI sharing to trusted organisations, they lack solutions where the shared data can be verified and disseminated ‘differentially’ (i.e., selective information sharing) with policies and metrics flexibly defined by an organisation. In this paper, we propose a blockchain-based CTI sharing framework that allows organisations to share sensitive CTI data in a trusted, verifiable and differential manner. We discuss the limitations associated with existing approaches and highlight the advantages of the proposed CTI sharing framework. We further present a detailed proof of concept using the Ethereum blockchain network. Our experimental results show that the proposed framework can facilitate the exchange of CTI without creating significant additional overheads.

Journal Title
Conference Title

2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)

Book Title
Edition
Volume
Issue
Thesis Type
Degree Program
School
Publisher link
Patent number
Funder(s)
Grant identifier(s)
Rights Statement
Rights Statement

© 2022 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.

Item Access Status
Note
Access the data
Related item(s)
Subject

Cybersecurity and privacy

Persistent link to this record
Citation

Dunnett, K; Pal, S; Putra, GD; Jadidi, Z; Jurdak, R, A Trusted, Verifiable and Differential Cyber Threat Intelligence Sharing Framework using Blockchain, 2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2022, pp. 1107-1114