Blockchain-Based Model for Incentivized Cyber Threat Intelligence Sharing
<p>Pillars of the model.</p> "> Figure 2
<p>View of Hyperledger Fabric network and client.</p> "> Figure 3
<p>Data structures used in smart contracts.</p> "> Figure 4
<p>The general process of uploading and retrieving CTI data.</p> "> Figure 5
<p>The process of uploading CTI data into IPFS.</p> "> Figure 6
<p>Workflow of review of CTI data.</p> "> Figure 7
<p>The user interface of the designed application.</p> "> Figure 8
<p>The user interface for the reviewer.</p> "> Figure 9
<p>Value of reward score based on the number of participants.</p> ">
Abstract
:1. Introduction
- Creating a new model for incentivized cyber threat intelligence sharing on permissioned blockchain technology for trustworthy threat intelligence sharing.
- Choosing quality metrics for CTI data evaluation.
- Creating an algorithm for reward score calculation.
- Providing simulation experiments to establish the ratio of monetary rewards to reputation scores.
- Implementing a prototype of the proposed solution on the Hyperledger Fabric blockchain to verify the feasibility of the solution.
- Developing smart contracts for enabling a series of services, including posting, sharing, and reviewing CTI data, and maintaining the rating scores of blockchain users.
2. Related Work
- Many authors have used incentives to either enhance trust in CTI data or motivate sharing of CTI data, but never pursued both goals together. However, Jesus et al. [22] noticed that a CTI data-sharing model must include both economic incentives and the ability to maintain reputation management.
3. Proposed Solution
3.1. Model Structure
3.2. Building of Motivation and Trust
3.2.1. Cost Compensation and Reputation
3.2.2. Choice of Data Quality Metrics for Reviewers
3.2.3. Algorithm for Reward Score Calculation
Algorithm 1. Reward score calculation |
Input parameters:
|
- All data for calculation are stored in the data structures of smart contracts, which are directly accessible. The data structures are detailed in Section 3.3.
- The algorithm has no loops.
- The algorithm is only executed in the case of specific events, either on the provision of new CTI data or on the provision of new CTI data reviews.
3.3. Sharing of Sensitive Information
3.4. Implementation of the Model in the Blockchain
- The CTI data consumer submits a review to the Hyperledger Fabric blockchain.
- The CTI data producer retrieves the review from the Hyperledger Fabric blockchain.
- The CTI data producer assesses the review. If the review is valid, the producer informs the Hyperledger Fabric blockchain.
- If the review is valid, the CTI data producer uploads the review next to the CTI data into IPFS.
- IPFS returns a new hash for the CTI data, since the content of the data has changed.
4. Experimental Evaluation and Discussion
4.1. Experimental Evaluation
- All participants demonstrate maximum activity.
- All of the CTI data provided are of high quality.
- All of the reviews are valid.
4.2. Results and Discussion
- Hyperledger Fabric is a permissioned blockchain that enables the achievement of confidentiality and privacy goals through its design.
- Hyperledger Fabric supports channel-based privacy that is important for the implementation of the TLP. This feature is unique in comparison to Ethereum blockchain.
- Hyperledger Fabric does not require the use of digital currency to operate. This feature is unique in comparison to Ethereum blockchain.
- Smart contracts, called chaincodes in Hyperledger Fabric, are developed using well-known popular programming languages such as Golang, Java, and Node.js. There is no need to learn a specific language, as is the case for Ethereum.
- Hyperledger Fabric enables the low latency of transaction confirmation, as the confirmation can be acknowledged within only a few organizations [35].
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Brown, R.; Nickels, K. SANS 2023 CTI Survey: Keeping Up with a Changing Threat Landscape. 17 July 2023. Available online: https://www.sans.org/white-papers/2023-cti-survey-keeping-up-changing-threat-landscape/ (accessed on 7 March 2024).
- Moubarak, J.; Bassil, C.; Antoun, J. On the dissemination of Cyber Threat Intelligence through Hyperledger. In Proceedings of the 2021 17th International Conference on the Design of Reliable Communication Networks (DRCN), Milano, Italy, 19–22 April 2021; pp. 1–6. [Google Scholar] [CrossRef]
- Villalón-Huerta, A.; Ripoll-Ripoll, I.; Marco-Gisbert, H. Key Requirements for the Detection and Sharing of Behavioral Indicators of Compromise. Electronics 2022, 11, 416. [Google Scholar] [CrossRef]
- Chatziamanetoglou, D.; Rantos, K. Cyber Threat Intelligence on Blockchain: A Systematic Literature Review. Computers 2024, 13, 60. [Google Scholar] [CrossRef]
- Ainslie, S.; Thompson, D.; Maynard, S.; Ahmad, A. Cyber-threat intelligence for security decision-making: A review and research agenda for practice. Comput. Secur. 2023, 132, 103352. [Google Scholar] [CrossRef]
- Dunnett, K.; Pal, S.; Jadidi, Z. Challenges and Opportunities of Blockchain for Cyber Threat Intelligence Sharing. In Secure and Trusted Cyber Physical Systems. Smart Sensors, Measurement and Instrumentation; Pal, S., Jadidi, Z., Foo, E., Eds.; Springer: Cham, Switzerland, 2022; Volume 43. [Google Scholar] [CrossRef]
- Ihle, C.; Trautwein, D.; Schubotz, M.; Meuschke, N.; Gipp, B. Incentive Mechanisms in Peer-to-Peer Networks—A Systematic Literature Review. ACM Comput. Surv. July 2023, 55, 308. [Google Scholar] [CrossRef]
- Wagner, T.D.; Mahbub, K.; Palomar, E.; Abdallah, A.E. Cyber threat intelligence sharing: Survey and research directions. Comput. Secur. 2019, 87, 101589. [Google Scholar] [CrossRef]
- Olaifa, M.; van Vuuren, J.J.; Du Plessis, D.; Leenen, L. Security Issues in Cyber Threat Intelligence Exchange: A Review. In Intelligent Computing. SAI 2023. Lecture Notes in Networks and Systems; Arai, K., Ed.; Springer: Cham, Switzerland, 2023; Volume 739, pp. 1308–1319. [Google Scholar] [CrossRef]
- Lin, S.-Y.; Zhang, L.; Li, J.; Ji, L.-L.; Sun, Y. A survey of application research based on blockchain smart contract. Wireless Netw. 2022, 28, 635–690. [Google Scholar] [CrossRef]
- Wu, Y.; Qiao, Y.; Ye, Y.; Lee, B. Towards Improved Trust in Threat Intelligence Sharing using Blockchain and Trusted Computing. In Proceedings of the 2019 Sixth International Conference on Internet of Things: Systems, Management and Security (IOTSMS), Granada, Spain, 22–25 October 2019; pp. 474–481. [Google Scholar] [CrossRef]
- Riesco, R.; Larriva-Novo, X.; Villagra, V.A. Cybersecurity threat intelligence knowledge exchange based on blockchain. Telecommun. Syst. 2020, 73, 259–288. [Google Scholar] [CrossRef]
- Gong, S.; Lee, C. BLOCIS: Blockchain-Based Cyber Threat Intelligence Sharing Framework for Sybil-Resistance. Electronics 2020, 9, 521. [Google Scholar] [CrossRef]
- Gonçalo, R.; Pedrosa, T.; Lopes, R.P. An Architecture for Sharing Cyber-Intelligence Based on Blockchain. In Blockchain and Applications. BLOCKCHAIN 2020. Advances in Intelligent Systems and Computing; Prieto, J., Pinto, A., Das, A., Ferretti, S., Eds.; Springer: Cham, Switzerland, 2020; Volume 1238. [Google Scholar] [CrossRef]
- Menges, F.; Putz, B.; Pernul, G. DEALER: Decentralized incentives for threat intelligence reporting and exchange. Int. J. Inf. Secur. 2021, 20, 741–761. [Google Scholar] [CrossRef]
- Huff, P.; Li, Q. A Distributed Ledger for Non-attributable Cyber Threat Intelligence Exchange. In Security and Privacy in Communication Networks. SecureComm 2021. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Garcia-Alfaro, J., Li, S., Poovendran, R., Debar, H., Yung, M., Eds.; Springer: Cham, Switzerland, 2021; Volume 398. [Google Scholar] [CrossRef]
- Chatziamanetoglou, D.; Rantos, K. CTI Blockchain-Based Sharing using Proof-of-Quality Consensus Algorithm. In Proceedings of the 2021 IEEE International Conference on Cyber Security and Resilience (CSR), Rhodes, Greece, 26–28 July 2021; pp. 331–336. [Google Scholar] [CrossRef]
- Chatziamanetoglou, D.; Rantos, K. Blockchain-Based Cyber Threat Intelligence Sharing Using Proof-of-Quality Consensus. Secur. Commun. Netw. 2023, 2023, 3303122. [Google Scholar] [CrossRef]
- Nguyen, K.; Pal, S.; Jadidi, Z.; Dorri, A.; Jurdak, R. A Blockchain-Enabled Incentivised Framework for Cyber Threat Intelligence Sharing in ICS. In Proceedings of the 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops), Pisa, Italy, 21–25 March 2022; pp. 261–266. [Google Scholar] [CrossRef]
- Homan, D.; Shiel, I.; Thorpe, C. A New Network Model for Cyber Threat Intelligence Sharing using Blockchain Technology. In Proceedings of the 2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Canary Islands, Spain, 24–26 June 2019; pp. 1–6. [Google Scholar] [CrossRef]
- Zhang, X.; Miao, X.; Xue, M. A Reputation-Based Approach Using Consortium Blockchain for Cyber Threat Intelligence Sharing. Secur. Commun. Netw. 2022, 2022, 7760509. [Google Scholar] [CrossRef]
- Jesus, V.; Bains, B.; Chang, V. Sharing Is Caring: Hurdles and Prospects of Open, Crowd-Sourced Cyber Threat Intelligence. IEEE Trans. Eng. Manag. 2023, 71, 6854–6873. [Google Scholar] [CrossRef]
- Ma, X.; Yu, D.; Du, Y.; Li, L.; Ni, L.W.; Lv, H. A Blockchain-Based Incentive Mechanism for Sharing Cyber Threat Intelligence. Electronics 2023, 12, 2454. [Google Scholar] [CrossRef]
- Sakellariou, G.; Fouliras, P.; Mavridis, I.; Sarigiannidis, P. A Reference Model for Cyber Threat Intelligence (CTI) Systems. Electronics 2022, 11, 1401. [Google Scholar] [CrossRef]
- Sakellariou, G.; Fouliras, P.; Mavridis, I. A Methodology for Developing & Assessing CTI Quality Metrics. IEEE Access 2024, 12, 6225–6238. [Google Scholar] [CrossRef]
- Grispos, G.; Glisson, W.B.; Storer, T. How good is your data? Investigating the quality of data generated during security incident response investigations. In Proceedings of the 52nd Hawaii International Conference on System Sciences Scholar Space Hawaii International, Maui, HI, USA, 8–11 April 2019; pp. 7156–7165. Available online: https://hdl.handle.net/10125/60152 (accessed on 4 April 2024).
- Dalziel, H. A Problem Well-Defined is Half-Solved. In How to Define and Build an Effective Cyber Threat Intelligence Capability; Elsevier: London, UK, 2015; pp. 3–6. [Google Scholar]
- Schlette, D.; Böhm, F.; Caselli, M.; Pernul, G. Measuring and visualizing cyber threat intelligence quality. Int. J. Inf. Secur. 2021, 20, 21–38. [Google Scholar] [CrossRef]
- Mavzer, K.B.; Konieczna, E.; Alves, H.; Yucel, C.; Chalkias, I.; Mallis, D.; Cetinkaya, D.; Sanchez LA, G. Trust and Quality Computation for Cyber Threat Intelligence Sharing Platforms. In Proceedings of the 2021 IEEE International Conference on Cyber Security and Resilience (CSR), Rhodes, Greece, 26–28 July 2021; pp. 360–365. [Google Scholar] [CrossRef]
- America’s Cyber Defense Agency, USA. Traffic Light Protocol (TLP) Definitions and Usage. 22 August 2022. Available online: https://www.cisa.gov/news-events/news/traffic-light-protocol-tlp-definitions-and-usage (accessed on 4 April 2024).
- Kumar, R.; Tripathi, R. Implementation of Distributed File Storage and Access Framework using IPFS and Blockchain. In Proceedings of the 2019 Fifth International Conference on Image Information Processing (ICIIP), Shimla, India, 15–17 November 2019; pp. 246–251. [Google Scholar] [CrossRef]
- SOPHOS. The State of Ransom 2023. Available online: https://www.sophos.com/en-us/content/state-of-ransomware (accessed on 4 March 2024).
- IBM. Cost of a Data Breach Report 2023. Available online: https://www.ibm.com/reports/data-breach (accessed on 7 March 2024).
- Pahlevan, M.; Ionita, V. Secure and Efficient Exchange of Threat Information Using Blockchain Technology. Information 2022, 13, 463. [Google Scholar] [CrossRef]
- Ali, H.; Ahmad, J.; Jaroucheh, Z.; Papadopoulos, P.; Pitropakis, N.; Lo, O.; Abramson, W.; Buchanan, W.J. Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform. Entropy 2022, 24, 1379. [Google Scholar] [CrossRef] [PubMed]
- Verma, G.; Kanrar, S. Secure document sharing model based on blockchain technology and attribute-based encryption. Multimed Tools Appl. 2024, 83, 16377–16394. [Google Scholar] [CrossRef]
Reference | Incentive | Blockchain | Enhanced CTI Feature | User Roles | Storage |
---|---|---|---|---|---|
Wu et al. [11] | reputation | Ethereum | trust | not defined | on-chain |
Riesco et al. [12] | tokens | public Ethereum | motivation | CTI data provider, CTI data consumer, investor, owner, and donor | on-chain |
Gong and Lee [13] | reputation | public Ethereum | trust | contributor, consumer, and feed | on-chain |
Gonçalo et al. [14] | reputation | Hyperledger Fabric | trust | not defined | on-chain |
Menges et al. [15] | tokens | public EOS blockchain | motivation | CTI data provider, CTI data consumer, and verifier | off-chain |
Huff and Li [16] | tokens | Hyperledger Fabric | quantity and quality, anonymity | not defined | on-chain |
Chatziamanetoglou and Rantos [17,18] | reputation | permissionless | trust | CTI feed, validator, and consumer | on-chain |
Nguyen et al. [19] | fees | Hyperledger Fabric | motivation | CTI consumer, CTI contributor, authority, insurer, industry CERTs, CTI verifier, analytics | off-chain |
Zhang et al. [21] | reputation | consortium blockchain | trust | leader, candidate, follower, and supervisor | on-chain |
Ma et al. [23] | reputation | public Ethereum | trust | not defined | on-chain |
Parameter Definition | Value |
---|---|
Reward of CTI data producer | 100 |
Reward of CTI data consumer | 10 |
Reward of CTI data reviewer | 10 |
Subscription fee | EUR 500 |
Number of produced CTI data | 2 |
Weight coefficients of quality factors (all are equal) | 0.5 |
All CTI data consumers download and read provided CTI data | - |
Subscription Fee is EUR 500, CTI Data Producer Reward Score is 130 | |||
---|---|---|---|
Number of Participants | Reviewer Reward Score | Ordinary CTI Data Consumer Reward Score | Value of Score in Euros |
10 | 30 × 3 = 90 | 6 × 10 = 60 | |
10 | 30 × 3 = 90 | 6 × 10 = 60 | EUR 8.92 |
20 | 30 × 3 = 90 | 16 × 10 = 160 | |
20 | 30 × 3 = 90 | 16 × 10 = 160 | EUR 13.15 |
30 | 30 × 3 = 90 | 26 × 10 = 260 | |
30 | 30 × 3 = 90 | 26 × 10 = 260 | EUR 15.62 |
40 | 30 × 3 = 90 | 36 × 10 = 360 | |
40 | 30 × 3 = 90 | 36 × 10 = 360 | EUR 17.24 |
50 | 30 × 3 = 90 | 46 × 10 = 460 | |
50 | 30 × 3 = 90 | 46 × 10 = 460 | EUR 18.38 |
60 | 30 × 3 = 90 | 56 × 10 = 560 | |
60 | 30 × 3 = 90 | 56 × 10 = 560 | EUR 19.23 |
70 | 30 × 3 = 90 | 66 × 10 = 660 | |
70 | 30 × 3 = 90 | 66 × 10 = 660 | EUR 19.88 |
80 | 30 × 3 = 90 | 76 × 10 = 760 | |
80 | 30 × 3 = 90 | 76 × 10 = 760 | EUR 20.40 |
90 | 30 × 3 = 90 | 86 × 10 = 860 | |
90 | 30 × 3 = 90 | 86 × 10 = 860 | EUR 20.83 |
100 | 30 × 3 = 90 | 96 × 10 = 960 | |
100 | 30 × 3 = 90 | 96 × 10 = 960 | EUR 21.18 |
Features | ||||||||
---|---|---|---|---|---|---|---|---|
Reference | Prototype Implemented | View of Prototype Presented | Incentive Reputation | Incentive Monetary | Sharing of Sensitive Data | Implementation of TLP | Sharing of Large Data | Simulation Used |
Wu et al. [11] | * | |||||||
Riesco et al. [12] | * | * | * | * | ||||
Gong and Lee [13] | * | * | ||||||
Gonçalo et al. [14] | * | * | * | |||||
Menges et al. [15] | * | * | * | * | ||||
Huff and Li [16] | * | * | * | |||||
Chatziamanetoglou and Rantos [18] | * | * | ||||||
Nguyen et al. [19] | * | * | * | * | ||||
Zhang et al. [21] | * | * | ||||||
Ma et al. [23] | * | * | ||||||
Proposed model | * | * | * | * | * | * | * | * |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Venčkauskas, A.; Jusas, V.; Barisas, D.; Misnevs, B. Blockchain-Based Model for Incentivized Cyber Threat Intelligence Sharing. Appl. Sci. 2024, 14, 6872. https://doi.org/10.3390/app14166872
Venčkauskas A, Jusas V, Barisas D, Misnevs B. Blockchain-Based Model for Incentivized Cyber Threat Intelligence Sharing. Applied Sciences. 2024; 14(16):6872. https://doi.org/10.3390/app14166872
Chicago/Turabian StyleVenčkauskas, Algimantas, Vacius Jusas, Dominykas Barisas, and Boriss Misnevs. 2024. "Blockchain-Based Model for Incentivized Cyber Threat Intelligence Sharing" Applied Sciences 14, no. 16: 6872. https://doi.org/10.3390/app14166872
APA StyleVenčkauskas, A., Jusas, V., Barisas, D., & Misnevs, B. (2024). Blockchain-Based Model for Incentivized Cyber Threat Intelligence Sharing. Applied Sciences, 14(16), 6872. https://doi.org/10.3390/app14166872