skip to main content
research-article

CYBEX: the cybersecurity information exchange framework (x.1500)

Published: 22 October 2010 Publication History

Abstract

The cybersecurity information exchange framework, known as CYBEX, is currently undergoing its first iteration of standardization efforts within ITU-T. The framework describes how cybersecurity information is exchanged between cybersecurity entities on a global scale and how the exchange is assured. The worldwide implementation of the framework will eventually minimize the disparate availability of cybersecurity information. This paper provides a specification overview, use cases, and the current status of CYBEX.

References

[1]
TS23.271 : Handover for Location Services. European Telecommunications Standards Institute, March 2001.
[2]
TS102232 : Handover Interface and Service-Specific Details (SSD) for IP delivery. European Telecommunications Standards Institute, December 2006.
[3]
TS102657 : Handover interface for the request and delivery of retained data. European Telecommunications Standards Institute, December 2009.
[4]
The Electronic Discovery Reference Model. URL http://edrm.net, August 2010.
[5]
F. Baker, B. Foster, and C. Sharp. Cisco Architecture for Lawful Intercept in IP Networks. IETF RFC 3924, October 2004.
[6]
R. Danyliw, J. Meijer, and Y. Demchenko. The Incident Object Description Exchange Format. IETF Request For Comments 5070, December 2007.
[7]
M. Fossi, D. Turner, E. Johnson, T. Mack, T. Adams, J. Blackbird, S. Entwisle, B. Graveland, D. McKinney, J. Mulcahy, and C. Wueest. Symantec Global Internet Security Threat Report. XV, April 2010.
[8]
International Telecommunication Union. Information technology - Open Systems Interconnection - Procedures for the operation of OSI Registration Authorities: General procedures and top arcs of the International Object Identifier tree. X.660, August 2008.
[9]
R. A. Martin. Making Security Measurable and Manageable. CrossTalk, the Journal of Defense Software Engineering, September/October 2009.
[10]
National Institute of Standards and Technology. National Vulnerability Database (NVD). http://nvd.nist.gov/, August 2010.
[11]
T. Takahashi, Y. Kadobayashi, and H. Fujiwara. Ontological approach toward cybersecurity in cloud computing. International Conference on Security of Information and Networks, 2010.
[12]
The MITRE Corporation. Common Weakness Scoring System (CWSS). URL http://cwe.mitre.org/cwss/, August 2010.
[13]
The MITRE Corporation. Making Security Measurable. URL http://msm.mitre.org/, August 2010.
[14]
The World Wide Web Consortium (W3C). Resource Description Framework (RDF). URL http://www.w3.org/RDF/, August 2010.

Cited By

View all
  • (2024)Artificial intelligence and quantum cryptographyJournal of Analytical Science and Technology10.1186/s40543-024-00416-615:1Online publication date: 9-Feb-2024
  • (2024)Game Theory for Privacy-Preserving Cybersecurity Information Exchange Framework2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)10.1109/CCNC51664.2024.10454694(730-735)Online publication date: 6-Jan-2024
  • (2023)A Model for Cyber Threat Intelligence for Organisations2023 International Conference on Artificial Intelligence, Big Data, Computing and Data Communication Systems (icABCD)10.1109/icABCD59051.2023.10220503(1-7)Online publication date: 3-Aug-2023
  • Show More Cited By

Index Terms

  1. CYBEX: the cybersecurity information exchange framework (x.1500)

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM SIGCOMM Computer Communication Review
      ACM SIGCOMM Computer Communication Review  Volume 40, Issue 5
      October 2010
      73 pages
      ISSN:0146-4833
      DOI:10.1145/1880153
      Issue’s Table of Contents

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 22 October 2010
      Published in SIGCOMM-CCR Volume 40, Issue 5

      Check for updates

      Author Tags

      1. cybersecurity
      2. cybex
      3. information exchange
      4. security

      Qualifiers

      • Research-article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)21
      • Downloads (Last 6 weeks)3
      Reflects downloads up to 25 Aug 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Artificial intelligence and quantum cryptographyJournal of Analytical Science and Technology10.1186/s40543-024-00416-615:1Online publication date: 9-Feb-2024
      • (2024)Game Theory for Privacy-Preserving Cybersecurity Information Exchange Framework2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)10.1109/CCNC51664.2024.10454694(730-735)Online publication date: 6-Jan-2024
      • (2023)A Model for Cyber Threat Intelligence for Organisations2023 International Conference on Artificial Intelligence, Big Data, Computing and Data Communication Systems (icABCD)10.1109/icABCD59051.2023.10220503(1-7)Online publication date: 3-Aug-2023
      • (2023)Security Issues in Cyber Threat Intelligence Exchange: A ReviewIntelligent Computing10.1007/978-3-031-37963-5_89(1308-1319)Online publication date: 20-Aug-2023
      • (2023)Review of System-Scientific Perspectives for Analysis, Exploitation, and Mitigation of Cognitive VulnerabilitiesCognitive Security10.1007/978-3-031-30709-6_4(49-65)Online publication date: 31-Mar-2023
      • (2022)TIIAFuture Generation Computer Systems10.1016/j.future.2022.02.023132:C(254-265)Online publication date: 1-Jul-2022
      • (2021)Open Data-driven Usability Improvements of Static Code Analysis and its ChallengesProceedings of the 25th International Conference on Evaluation and Assessment in Software Engineering10.1145/3463274.3463808(272-277)Online publication date: 21-Jun-2021
      • (2021)Dynamic scheduling mechanism for software-defined security resources based on multi-mode load balancingJournal of Physics: Conference Series10.1088/1742-6596/2010/1/0120132010:1(012013)Online publication date: 1-Sep-2021
      • (2021)Economic model for evaluating the value creation through information sharing within the cybersecurity information sharing ecosystemFuture Generation Computer Systems10.1016/j.future.2021.05.033124:C(436-466)Online publication date: 1-Nov-2021
      • (2021)Threat Intelligence Sharing Model and Profit Distribution Based on Blockchain and Smart ContractsProceedings of the 11th International Conference on Computer Engineering and Networks10.1007/978-981-16-6554-7_70(645-654)Online publication date: 12-Nov-2021
      • Show More Cited By

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media