Cyber threat intelligence sharing for co-operative defense in multi-domain entities

S Purohit, R Neupane, NR Bhamidipati… - … on Dependable and …, 2022 - ieeexplore.ieee.org
Cloud-hosted applications are prone to targeted attacks such as DDoS, advanced persistent
threats, Cryptojacking which threaten service availability. Recently, methods for threat …

Defensechain: Consortium blockchain for cyber threat intelligence sharing and defense

S Purohit, P Calyam, S Wang… - … 2nd Conference on …, 2020 - ieeexplore.ieee.org
Cloud-hosted applications are prone to targeted attacks such as DDoS, advanced persistent
threats, cryptojacking which threaten service availability. Recently, methods for threat …

Collaborative cyber attack defense in SDN networks using blockchain technology

M Hajizadeh, N Afraz, M Ruffini… - 2020 6th IEEE …, 2020 - ieeexplore.ieee.org
The legacy security defense mechanisms cannot resist where emerging sophisticated
threats such as zero-day and malware campaigns have profoundly changed the dimensions …

A distributed ledger for non-attributable cyber threat intelligence exchange

P Huff, Q Li - Security and Privacy in Communication Networks: 17th …, 2021 - Springer
Cyber threat intelligence (CTI) sharing provides cybersecurity operations an advantage over
adversaries by more quickly characterizing the threat, understanding its tactics, anticipating …

Threat management dashboard for a blockchain collaborative defense

C Killer, B Rodrigues, B Stiller - 2019 IEEE globecom …, 2019 - ieeexplore.ieee.org
The increasing number of Distributed Denial-of-Service (DDoS) attacks leads to a growing
research and development interest in DDoS defense systems. As a response to the …

A trusted, verifiable and differential cyber threat intelligence sharing framework using blockchain

K Dunnett, S Pal, GD Putra, Z Jadidi… - … Conference on Trust …, 2022 - ieeexplore.ieee.org
Cyber Threat Intelligence (CTI) is the knowledge of cyber and physical threats that help
mitigate potential cyber attacks. The rapid evolution of the current threat landscape has seen …

A novel trust taxonomy for shared cyber threat intelligence

TD Wagner, E Palomar, K Mahbub… - Security and …, 2018 - Wiley Online Library
Cyber threat intelligence sharing has become a focal point for many organizations to
improve resilience against cyberattacks. The objective lies in sharing relevant information …

Trade: Trusted anonymous data exchange: Threat sharing using blockchain technology

Y Allouche, N Tapas, F Longo, A Shabtai… - arXiv preprint arXiv …, 2021 - arxiv.org
Cyber attacks are becoming more frequent and sophisticated, introducing significant
challenges for organizations to protect their systems and data from threat actors. Today …

Towards improved trust in threat intelligence sharing using blockchain and trusted computing

Y Wu, Y Qiao, Y Ye, B Lee - 2019 Sixth International …, 2019 - ieeexplore.ieee.org
Threat intelligence sharing is posited as an important aid to help counter cybersecurity
attacks and a number of threat intelligence sharing communities exist. There is a general …

[HTML][HTML] A cloud-edge based data security architecture for sharing and analysing cyber threat information

DW Chadwick, W Fan, G Costantino… - Future generation …, 2020 - Elsevier
Cyber-attacks affect every aspect of our lives. These attacks have serious consequences,
not only for cyber-security, but also for safety, as the cyber and physical worlds are …