Enabling privacy-preserving sharing of cyber threat information in the cloud

W Fan, J Ziembicka, R de Lemos… - 2019 6th IEEE …, 2019 - ieeexplore.ieee.org
Network threats often come from multiple sources and affect a variety of domains.
Collaborative sharing and analysis of Cyber Threat Information (CTI) can greatly improve the …

A system architecture of cybersecurity information exchange with privacy (cybex-p)

F Sadique, K Bakhshaliyev, J Springer… - 2019 IEEE 9th Annual …, 2019 - ieeexplore.ieee.org
Rapid evolution of cyber threats and recent trends in the increasing number of cyber-attacks
call for adopting robust and agile cybersecurity techniques. Cybersecurity information …

SeCTIS: A Framework to Secure CTI Sharing

DR Arikkat, M Cihangiroglu, M Conti… - arXiv preprint arXiv …, 2024 - arxiv.org
The rise of IT-dependent operations in modern organizations has heightened their
vulnerability to cyberattacks. As a growing number of organizations include smart …

Sharing is caring: Hurdles and prospects of open, crowd-sourced cyber threat intelligence

V Jesus, B Bains, V Chang - IEEE Transactions on Engineering …, 2023 - ieeexplore.ieee.org
Cyber threat intelligence (CTI) is widely recognized as an important area in cybersecurity but
it remains an area showing silos and reserved for large organizations. For an area whose …

Surveying Cyber Threat Intelligence and Collaboration: A Concise Analysis of Current Landscape and Trends

P Radoglou-Grammatikis, E Kioseoglou… - … on Cloud Computing …, 2023 - ieeexplore.ieee.org
The evolution of cyberattacks has been significantly impacted by the rise of Artificial
Intelligence (AI). In particular, AI-driven attacks leverage Machine Learning (ML) and Deep …

Orchestrating collaborative cybersecurity: a secure framework for distributed privacy-preserving threat intelligence sharing

JR Trocoso-Pastoriza, A Mermoud, R Bouyé… - arXiv preprint arXiv …, 2022 - arxiv.org
Cyber Threat Intelligence (CTI) sharing is an important activity to reduce information
asymmetries between attackers and defenders. However, this activity presents challenges …

Risk assessment of sharing cyber threat intelligence

A Albakri, E Boiten, R Smith - … DeSECSys, MPS, and SPOSE, Guildford, UK …, 2020 - Springer
Abstract Sharing Cyber Threat Intelligence (CTI) is advocated to get better defence against
new sophisticated cyber-attacks. CTI may contain critical information about the victim …

Sharing cyber threat intelligence under the general data protection regulation

A Albakri, E Boiten, R De Lemos - … and Policy: 7th Annual Privacy Forum …, 2019 - Springer
Abstract Sharing Cyber Threat Intelligence (CTI) is a key strategy for improving cyber
defense, but there are risks of breaching regulations and laws regarding privacy. With …

Enabling cyber security data sharing for large-scale enterprises using managed security services

XS Wang, I Herwono, F Di Cerbo… - … IEEE Conference on …, 2018 - ieeexplore.ieee.org
Large enterprises and organizations from both private and public sectors typically outsource
a platform solution, as part of the Managed Security Services (MSSs), from 3 rd party …

[HTML][HTML] A cloud-edge based data security architecture for sharing and analysing cyber threat information

DW Chadwick, W Fan, G Costantino… - Future generation …, 2020 - Elsevier
Cyber-attacks affect every aspect of our lives. These attacks have serious consequences,
not only for cyber-security, but also for safety, as the cyber and physical worlds are …