论文标题

使用区块链的值得信赖,可验证和差异的网络威胁情报共享框架

A Trusted, Verifiable and Differential Cyber Threat Intelligence Sharing Framework using Blockchain

论文作者

Dunnett, Kealan, Pal, Shantanu, Putra, Guntur Dharma, Jadidi, Zahra, Jurdak, Raja

论文摘要

网络威胁智能(CTI)是对有助于减轻潜在网络攻击的网络和身体威胁的了解。当前威胁格局的快速发展使许多组织共享CTI,以增强其安全姿势以互惠互利。但是,在许多情况下,CTI数据包含有可能泄漏敏感信息或对共享组织造成声誉损害的属性(例如软件版本)。尽管当前的方法允许将CTI共享限制为受信任的组织,但他们缺乏可以通过组织灵活地定义的策略和指标来验证和传播共享数据(即选择性信息共享)的解决方案。在本文中,我们提出了一个基于区块链的CTI共享框架,该框架允许组织以可信赖,可验证和差异方式共享敏感的CTI数据。我们讨论与现有方法相关的局限性,并突出提出的CTI共享框架的优势。我们进一步提出了使用以太坊区块链网络的概念详细证明。我们的实验结果表明,所提出的框架可以促进CTI的交换,而无需创建大量其他开销。

Cyber Threat Intelligence (CTI) is the knowledge of cyber and physical threats that help mitigate potential cyber attacks. The rapid evolution of the current threat landscape has seen many organisations share CTI to strengthen their security posture for mutual benefit. However, in many cases, CTI data contains attributes (e.g., software versions) that have the potential to leak sensitive information or cause reputational damage to the sharing organisation. While current approaches allow restricting CTI sharing to trusted organisations, they lack solutions where the shared data can be verified and disseminated `differentially' (i.e., selective information sharing) with policies and metrics flexibly defined by an organisation. In this paper, we propose a blockchain-based CTI sharing framework that allows organisations to share sensitive CTI data in a trusted, verifiable and differential manner. We discuss the limitations associated with existing approaches and highlight the advantages of the proposed CTI sharing framework. We further present a detailed proof of concept using the Ethereum blockchain network. Our experimental results show that the proposed framework can facilitate the exchange of CTI without creating significant additional overheads.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源