Study on Hybrid Cloud-based Cyber Threat Intelligence Sharing Model Requirements Analysis

JJ Heo, YE Gebremariam, H Park, B Kim… - Proceedings of the 2020 …, 2020 - dl.acm.org
Because of the phenomenal growth of internet connectivity and unceasing improvements
over hardware and software technology, everything is connected without any boundaries …

Cyber threat intelligence sharing: Survey and research directions

TD Wagner, K Mahbub, E Palomar, AE Abdallah - Computers & Security, 2019 - Elsevier
Abstract Cyber Threat Intelligence (CTI) sharing has become a novel weapon in the arsenal
of cyber defenders to proactively mitigate increasing cyber attacks. Automating the process …

Cyber Threat Intelligence Model: An Evaluation of Taxonomies and Sharing Platforms

HJ Hadi, MA Riaz, Z Abbas… - Big Data Analytics and …, 2023 - taylorfrancis.com
To defend assets, data, and information against state-of-the-art and increasing number of
cyber threats, cyber defenders should be one step ahead of these cybercriminals. This …

[HTML][HTML] Current approaches and future directions for Cyber Threat Intelligence sharing: A survey

P Alaeifar, S Pal, Z Jadidi, M Hussain, E Foo - Journal of Information …, 2024 - Elsevier
Abstract Cyber Threat Intelligence (CTI) is essential knowledge concerning cyber and
physical threats aimed at mitigating potential cyber attacks. The rapid evolution of …

A workflow and toolchain proposal for analyzing users' perceptions in cyber threat intelligence sharing platforms

B Stojkovski, G Lenzini - 2021 IEEE International Conference …, 2021 - ieeexplore.ieee.org
Cyber Threat Intelligence (CTI) sharing platforms are valuable tools in cybersecurity.
However, despite the fact that effective CTI exchange highly depends on human aspects …

Enabling privacy-preserving sharing of cyber threat information in the cloud

W Fan, J Ziembicka, R de Lemos… - 2019 6th IEEE …, 2019 - ieeexplore.ieee.org
Network threats often come from multiple sources and affect a variety of domains.
Collaborative sharing and analysis of Cyber Threat Information (CTI) can greatly improve the …

Luunu—blockchain, misp, model cards and federated learning enabled cyber threat intelligence sharing platform

E Bandara, S Shetty, R Mukkamala… - 2022 Annual …, 2022 - ieeexplore.ieee.org
Cyber Threat Intelligence (CTI) is a process of threat data collection, processing, and
analysis to understand a threat actor's motives, targets, and attack behaviors. CTI involves …

A trusted, verifiable and differential cyber threat intelligence sharing framework using blockchain

K Dunnett, S Pal, GD Putra, Z Jadidi… - … Conference on Trust …, 2022 - ieeexplore.ieee.org
Cyber Threat Intelligence (CTI) is the knowledge of cyber and physical threats that help
mitigate potential cyber attacks. The rapid evolution of the current threat landscape has seen …

A blockchain-enabled incentivised framework for cyber threat intelligence sharing in ics

K Nguyen, S Pal, Z Jadidi, A Dorri… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
Industrial Control Systems (ICS) have been targeted increasingly by sophisticated
cyberattacks. Improving ICS security has drawn significant attention in the literature that …

[HTML][HTML] Priv-Share: A privacy-preserving framework for differential and trustless delegation of cyber threat intelligence using blockchain

K Dunnett, S Pal, Z Jadidi, V Dedeoglu, R Jurdak - Computer Networks, 2024 - Elsevier
The emergence of the Internet of Things (IoT), Industry 5.0 applications and associated
services have caused a powerful transition in the cyber threat landscape. As a result …