Sharing is caring: Hurdles and prospects of open, crowd-sourced cyber threat intelligence

V Jesus, B Bains, V Chang - IEEE Transactions on Engineering …, 2023 - ieeexplore.ieee.org
Cyber threat intelligence (CTI) is widely recognized as an important area in cybersecurity but
it remains an area showing silos and reserved for large organizations. For an area whose …

[HTML][HTML] Current approaches and future directions for Cyber Threat Intelligence sharing: A survey

P Alaeifar, S Pal, Z Jadidi, M Hussain, E Foo - Journal of Information …, 2024 - Elsevier
Abstract Cyber Threat Intelligence (CTI) is essential knowledge concerning cyber and
physical threats aimed at mitigating potential cyber attacks. The rapid evolution of …

Orchestrating collaborative cybersecurity: a secure framework for distributed privacy-preserving threat intelligence sharing

JR Trocoso-Pastoriza, A Mermoud, R Bouyé… - arXiv preprint arXiv …, 2022 - arxiv.org
Cyber Threat Intelligence (CTI) sharing is an important activity to reduce information
asymmetries between attackers and defenders. However, this activity presents challenges …

Enabling privacy-preserving sharing of cyber threat information in the cloud

W Fan, J Ziembicka, R de Lemos… - 2019 6th IEEE …, 2019 - ieeexplore.ieee.org
Network threats often come from multiple sources and affect a variety of domains.
Collaborative sharing and analysis of Cyber Threat Information (CTI) can greatly improve the …

What's in a cyber threat intelligence sharing platform? A mixed-methods user experience investigation of MISP

B Stojkovski, G Lenzini, V Koenig, S Rivas - Proceedings of the 37th …, 2021 - dl.acm.org
The ever-increasing scale and complexity of cyber attacks and cyber-criminal activities
necessitate secure and effective sharing of cyber threat intelligence (CTI) among a diverse …

Generating quality threat intelligence leveraging OSINT and a cyber threat unified taxonomy

C Martins, I Medeiros - ACM Transactions on Privacy and Security, 2022 - dl.acm.org
Today's threats use multiple means of propagation, such as social engineering, email, and
application vulnerabilities, and often operate in different phases, such as single device …

Cyber threat intelligence sharing: Survey and research directions

TD Wagner, K Mahbub, E Palomar, AE Abdallah - Computers & Security, 2019 - Elsevier
Abstract Cyber Threat Intelligence (CTI) sharing has become a novel weapon in the arsenal
of cyber defenders to proactively mitigate increasing cyber attacks. Automating the process …

A system for automated open-source threat intelligence gathering and management

P Gao, X Liu, E Choi, B Soman, C Mishra… - Proceedings of the …, 2021 - dl.acm.org
To remain aware of the fast-evolving cyber threat landscape, open-source Cyber Threat
Intelligence (OSCTI) has received growing attention from the community. Commonly …

Sharing machine learning models as indicators of compromise for cyber threat intelligence

D Preuveneers, W Joosen - Journal of Cybersecurity and Privacy, 2021 - mdpi.com
Cyber threat intelligence (CTI) sharing is the collaborative effort of sharing information about
cyber attacks to help organizations gain a better understanding of threats and proactively …

The role of cyber threat intelligence sharing in the metaverse

K Dunnett, S Pal, Z Jadidi… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
The emergence of the Metaverse promises to provide several benefits to society, eg, fully
immersive and interactive environments in health-care, the workplace, and everyday life …