Defensechain: Consortium blockchain for cyber threat intelligence sharing and defense

S Purohit, P Calyam, S Wang… - … 2nd Conference on …, 2020 - ieeexplore.ieee.org
Cloud-hosted applications are prone to targeted attacks such as DDoS, advanced persistent
threats, cryptojacking which threaten service availability. Recently, methods for threat …

Cyber threat intelligence sharing for co-operative defense in multi-domain entities

S Purohit, R Neupane, NR Bhamidipati… - … on Dependable and …, 2022 - ieeexplore.ieee.org
Cloud-hosted applications are prone to targeted attacks such as DDoS, advanced persistent
threats, Cryptojacking which threaten service availability. Recently, methods for threat …

Threat management dashboard for a blockchain collaborative defense

C Killer, B Rodrigues, B Stiller - 2019 IEEE globecom …, 2019 - ieeexplore.ieee.org
The increasing number of Distributed Denial-of-Service (DDoS) attacks leads to a growing
research and development interest in DDoS defense systems. As a response to the …

Collaborative cyber attack defense in SDN networks using blockchain technology

M Hajizadeh, N Afraz, M Ruffini… - 2020 6th IEEE …, 2020 - ieeexplore.ieee.org
The legacy security defense mechanisms cannot resist where emerging sophisticated
threats such as zero-day and malware campaigns have profoundly changed the dimensions …

Towards improved trust in threat intelligence sharing using blockchain and trusted computing

Y Wu, Y Qiao, Y Ye, B Lee - 2019 Sixth International …, 2019 - ieeexplore.ieee.org
Threat intelligence sharing is posited as an important aid to help counter cybersecurity
attacks and a number of threat intelligence sharing communities exist. There is a general …

A distributed ledger for non-attributable cyber threat intelligence exchange

P Huff, Q Li - Security and Privacy in Communication Networks: 17th …, 2021 - Springer
Cyber threat intelligence (CTI) sharing provides cybersecurity operations an advantage over
adversaries by more quickly characterizing the threat, understanding its tactics, anticipating …

BFLS: Blockchain and Federated Learning for sharing threat detection models as Cyber Threat Intelligence

T Jiang, G Shen, C Guo, Y Cui, B Xie - Computer Networks, 2023 - Elsevier
Abstract Recently, Cyber Threat Intelligence (CTI) sharing has become an important weapon
for cyber defenders to mitigate the increasing number of cyber attacks in a proactive and …

A reputation-based approach using consortium blockchain for cyber threat intelligence sharing

Z Xiaohui, M Xianghua - arXiv preprint arXiv:2107.06662, 2021 - arxiv.org
The CTI (Cyber Threat Intelligence) sharing and exchange is an effective method to improve
the responsiveness of the protection party. Blockchain technology enables sharing …

A trusted, verifiable and differential cyber threat intelligence sharing framework using blockchain

K Dunnett, S Pal, GD Putra, Z Jadidi… - … Conference on Trust …, 2022 - ieeexplore.ieee.org
Cyber Threat Intelligence (CTI) is the knowledge of cyber and physical threats that help
mitigate potential cyber attacks. The rapid evolution of the current threat landscape has seen …

Blockchain and explainable AI for enhanced decision making in cyber threat detection

P Kumar, D Javeed, R Kumar… - Software: Practice and …, 2024 - Wiley Online Library
Artificial Intelligence (AI) based cyber threat detection tools are widely used to process and
analyze a large amount of data for improved intrusion detection performance. However …