A trusted, verifiable and differential cyber threat intelligence sharing framework using blockchain

K Dunnett, S Pal, GD Putra, Z Jadidi… - … Conference on Trust …, 2022 - ieeexplore.ieee.org
Cyber Threat Intelligence (CTI) is the knowledge of cyber and physical threats that help
mitigate potential cyber attacks. The rapid evolution of the current threat landscape has seen …

A Democratically Anonymous and Trusted Architecture for CTI Sharing using Blockchain

K Dunnett, S Pal, Z Jadidi, GD Putra… - … and Networks (ICCCN …, 2022 - ieeexplore.ieee.org
Cyber Threat Intelligence (CTI) sharing has become a significant issue with the increasing
number of cyberattacks. In CTI sharing, one entity (eg, an organisation or a user) intends to …

A blockchain-enabled incentivised framework for cyber threat intelligence sharing in ics

K Nguyen, S Pal, Z Jadidi, A Dorri… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
Industrial Control Systems (ICS) have been targeted increasingly by sophisticated
cyberattacks. Improving ICS security has drawn significant attention in the literature that …

A blockchain-based framework for scalable and trustless delegation of cyber threat intelligence

K Dunnett, S Pal, Z Jadidi… - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
CTI sharing is increasingly used by organisations to strengthen security. The sensitivity of
CTI has led to research on trust-based sharing, yet most existing CTI sharing approaches …

Challenges and opportunities of blockchain for cyber threat intelligence sharing

K Dunnett, S Pal, Z Jadidi - Secure and Trusted Cyber Physical Systems …, 2022 - Springer
The emergence of the Internet of Things (IoT) technology has caused a powerful transition in
the cyber threat landscape. As a result, organisations have had to find new ways to better …

A distributed ledger for non-attributable cyber threat intelligence exchange

P Huff, Q Li - Security and Privacy in Communication Networks: 17th …, 2021 - Springer
Cyber threat intelligence (CTI) sharing provides cybersecurity operations an advantage over
adversaries by more quickly characterizing the threat, understanding its tactics, anticipating …

Trade: Trusted anonymous data exchange: Threat sharing using blockchain technology

Y Allouche, N Tapas, F Longo, A Shabtai… - arXiv preprint arXiv …, 2021 - arxiv.org
Cyber attacks are becoming more frequent and sophisticated, introducing significant
challenges for organizations to protect their systems and data from threat actors. Today …

A survey on cyber threat intelligence sharing based on Blockchain

A El-Kosairy, N Abdelbaki, H Aslan - Advances in Computational …, 2023 - Springer
In recent years, cyber security attacks have increased massively. This introduces the need to
defend against such attacks. Cyber security threat intelligence has recently been introduced …

A new network model for cyber threat intelligence sharing using blockchain technology

D Homan, I Shiel, C Thorpe - 2019 10th IFIP International …, 2019 - ieeexplore.ieee.org
The aim of this research is to propose a new blockchain network model that facilitates the
secure dissemination of Cyber Threat Intelligence (CTI) data. The primary motivations for …

SeCTIS: A Framework to Secure CTI Sharing

DR Arikkat, M Cihangiroglu, M Conti… - arXiv preprint arXiv …, 2024 - arxiv.org
The rise of IT-dependent operations in modern organizations has heightened their
vulnerability to cyberattacks. As a growing number of organizations include smart …