Abstract
The cost and time required by individual organizations to build an effective cyber defence can become overwhelming with the growing number of cyber attacks. Hence, the introduction of platforms that encourage collaborative effort in the fight against cyber attacks is considered advantageous. However, the acceptability and efficiency of the CTI exchange platforms is massively challenged by lack of trust caused by security issues encountered in such communities. This review examines the security and participation cost issues revolving around the willingness of participants to either join or actively participate in CTI exchange communities and proposed solutions to the security issues from the research perspective.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Dandurand, L., Serrano, O.S.: Towards improved cyber security information sharing. In: 2013 5th International Conference on Cyber Conflick (CYCON 2013), pp. 1–16. IEEE (2013)
Locasto, M.E., Parekh, J.J., Keromytis, A.D., Stolfo, S.J.: Towards collaborative security and P2P intrusion detection. In: Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop, pp. 333–339. IEEE (2005)
Pala, A., Zhuang, J.: Information sharing in cybersecurity: a review. Decis. Anal. 16(3), 172–196 (2019)
Rutkowski, A., et al.: CYBEX-the cybersecurity information exchange framework (X.1500). ACM SIGCOMM Comput. Commun. Rev. 40(5), 59–64 (2010)
Riesco, R., Larriva-Novo, X., Villagra, V.A.: Cybersecurity threat intelligence knowledge exchange based on blockchain. Telecommun. Syst. 73(2), 259–288 (2020)
Vazquez, D.F., Acosta, O.P., Spirito, C., Brown, S., Reid, E.: Conceptual framework for cyber defense information sharing within trust relationships. In: 2012 4th International Conference on Cyber Conflict (CYCON 2012), pp. 1–17. IEEE (2012)
Rahman, N.H., Kessler, G.C., Choo, K.K.: Implications of emerging technologies to incident handling and digital forensic strategies: a routine activity theory. In: Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, pp. 131–146. Syngress (2017)
Clifton, C., et al.: Privacy-preserving data integration and sharing. In: Proceedings of the 9th ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery, pp. 19–26 (2004)
Sauerwein, C., Sillaber, C., Mussmann, A., Breu, R.: Threat intelligence sharing platforms: an exploratory study of software vendors and research perspective (2017)
Abu, M.S., Selamat, S.R., Ariffin, A., Yusof, R.: Cyber threat intelligence - issues and challenges. Indones. J. Electr. Eng. Comput. Sci. 10(1), 371–9 (2018)
Zibak, A., Simpson, A.: Cyber threat information sharing perceived benefits and barriers. In: Proceedings of the 14th International Conference on Availability, Reliability and Security, pp. 1–9 (2019)
Mkuzangwe, N.N., Khan, Z.C.: Cyber-threat information sharing standards: a review of evaluation literature. Afr. J. Inf. Commun. 25, 1–12 (2020)
Cascavilla, G., Tamburri, D.A., Van Den Heuvel, W.J.: Cybercrime threat intelligence: a systematic multi-vocal literature review. Comput. Secur. 105, 102258 (2021)
Saxena, R., Gayathri, E.: Cyber threat intelligence challenges: leveraging blockchain intelligence with possible solution. Mater. Today Proc. 51, 682–689 (2022)
Voutilainen, J., Kari, M.: Strategic cyber threat intelligence: buidling the situational picture with emerging technologies. In: Proceedings of the European Conference on Information Warfare and Security, Academic Conference International (2020)
Traffic Light Protocol (TLP) definitions and usage. https://www.cisa.gov/tlp
van de Kamp, T., Peter, A., Everts, MH., Jonker, W.: Private sharing of IOCs and sightings. In: Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security, pp. 35–38 (2016)
Preuveneers, D., Joosen, W.: TATIS: trustworthy APIs for threat intelligence sharing with UMA and CP-ABE. In: Benzekri, A., Barbeau, M., Gong, G., Laborde, R., Garcia-Alfaro, J. (eds.) FPS 2019. LNCS, vol. 12056, pp. 172–188. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-45371-8_11
Vakilinia, I., Tosh, D.K., Sengupta, S.: Attribute based sharing in cybersecurity information exchange framework. In: 2017 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS), pp. 1–6. IEEE (2017)
Vakilinia, I., Tosh, D.K., Sengupta, S.: Privacy-preserving cybersecurity information exchange mechanism. In: 2017 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS), pp. 1–7 (2017)
Wagner, T.D., Palomar, E., Mahbub, K., Abdallah, A.E.: Towards an anonymity supported platform for shared cyber threat intelligence. In: Cuppens, N., Cuppens, F., Lanet, J.-L., Legay, A., Garcia-Alfaro, J. (eds.) CRiSIS 2017. LNCS, vol. 10694, pp. 175–183. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-76687-4_12
Badsha, S., Vakilinia, I., Sengupta, S.: Privacy preserving cyber threat information sharing and learning for cyber defense. In: 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), pp. 908–714. IEEE (2019)
Rawat, D.B., Njilla, L., Kwiat, K., Kamhoua, C.: iShare: blockchain-based privacy-aware multi-agent information sharing games for cyber security. In: 2018 International Conference on Computing Networking and Communications (ICNC), pp. 425–431. IEEE (2018)
Cha, J., Singh, S.K., Pan, Y., Park, J.H.: Blockchain-based cyber threat intelligence system architecture for sustainable computing. Sustainability 12(16), 6401 (2020)
Gong, S., Lee, C.: Blocis: blockchain-based cyber threat intelligence sharing framework for sybil-resistance. Electronics 9(3), 521 (2020)
He, S., Fu, J., Jiang, W., Cheng, Y., Chen, J., Guo, Z.: Blotisrt: blockchain-based threat intelligence sharing and rating technology. In: Proceedings of the 2020 International Conference on Cyberspace Innovation of Advanced Technologies, pp. 524–534 (2020)
Menges, F., Putz, B., Pemul, G.: DEALER: decentralized incentives for threat intelligence reporting and exchange. Int. J. Inf. Secur. 20(5), 741–761 (2021)
Homan, D., Shiel, I., Thorpe, C.: A new network model for cyber threat intelligence sharing using blockchain technology. In: 2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS), pp. 1–6. IEEE (2019)
Nguyen, K., Pal, S., Jadidi, Z., Dorri, A., Jurdak, R.: A blockchain enabled incentivised framework for cyber threat intelligence sharing in ICS. arXiv: 2112.00262 (2021)
de Fuentes, J.M., Gonzalez-Manzano, L., Tapiador, J., Peris-Lopez, P.: PRACIS: privacy-preserving and aggregatable cybersecurity information sharing. Comput. Secur. 69, 127–141 (2017)
Moubarak, J., Bassil, C., Antoun, J.: On the dissemination of cyber threat intelligence through hyperledger. In: 2021 17th International Conference on the Design of Reliable Communication Networks (DRCN), pp. 1–6 (2021)
Kokkonen, T., Hautamaki, J., Siltanen, J., Hamalainen, T.: Model for sharing the information of cyber security situation awareness between organizations. In: 2016 23rd International Conference on Telecommunications (ICT), pp. 1–5. IEEE (2016)
Pahlevan, M., Voulkidis, A., Velivassaki, T.H.: Secure exchange of cyber threat intelligence using TAXII and distributed ledger technologies-application for electrical power and energy system. In: The 16th International Conference on Availability, Reliability and Security, pp. 1–8 (2021)
Vakilinia, I., Tosh, D.K. Sengupta, S.: 3-way game model for privacy-preserving cybersecurity information exchange framework. In: MILCOM 2017-2017 IEEE Military Communications Conference (MILCOM), pp. 829–834. IEEE (2017)
Tosh, D., Sengupta, S., Kamhoua, C., Kwiat, K., Martin, A.: An evolutionary game theoretic framework for cyber threat information sharing. In: 2015 IEEE International Conference on Communications (ICC), pp. 7341–7346. IEEE (2015)
Tosh, D.K., Sengupta, S., Mukhopadhyay, S., Kamhoua, C.A., Kwiat, K.A.: Game theoretic modeling to enforce security information sharing among firms. In: 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing 2015, pp. 7–12. IEEE (2015)
Vakilinia, I., Sengupta, S.: A coalitional game thoery approach for cybersecurity information sharing. In: MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM), pp. 237–242. IEEE (2017)
Vakilinia, I., Sengupta, S.: Fair and private rewarding in a coalitional game of cybersecurity information sharing. IET Inf. Secur. 13(6), 530–540 (2019)
Xie, W., Yu, X., Zhang, Y., Wang, H.: An improved shapley value benefit distribution mechanism in cooperative game of cyber threat intelligence sharing. In: IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workships (INFOCOM WKSHPS), pp. 810–815. IEEE (2020)
Thakkar, A., Badsha, S., Sengupta, S.: Game theoretic approach applied in cybersecurity information exchange framework. In: 2020 IEEE 17th Annual Consumer Communication and Networking Conference (CCNC), pp. 1–7. IEEE (2020)
Preuveneers, D., Joosen, W., Bernal Bernabe, J., Skarmeta, A.: Distributed security framework for reliable threat intelligence sharing. Secur. Commun. Netw. (2020)
Keim, Y., Mohapatra, A.K.: Cyber threat intelligence framework using advanced malware forensics. Int. J. Inf. Technol. 1–10 (2019)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Olaifa, M., van Vuuren, J.J., Du Plessis, D., Leenen, L. (2023). Security Issues in Cyber Threat Intelligence Exchange: A Review. In: Arai, K. (eds) Intelligent Computing. SAI 2023. Lecture Notes in Networks and Systems, vol 739. Springer, Cham. https://doi.org/10.1007/978-3-031-37963-5_89
Download citation
DOI: https://doi.org/10.1007/978-3-031-37963-5_89
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-37962-8
Online ISBN: 978-3-031-37963-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)