Privacy-preserving correlation of cross-organizational cyber threat intelligence with private graph intersections

被引:1
|
作者
Preuveneers, Davy [1 ]
Joosen, Wouter [1 ]
机构
[1] Katholieke Univ Leuven, imec DistriNet, Celestijnenlaan 200A, B-3001 Leuven, Belgium
关键词
Threat intelligence sharing; Security; Privacy; Polyglot persistence and analysis; Private graph intersection;
D O I
10.1016/j.cose.2023.103505
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Sharing cyber threat intelligence is important because it allows organizations to stay ahead of new and emerging threats, prevent downtime and improve their overall security posture. Information about known vulnerabilities and post-mortem analyses of successful attacks is instrumental to make tactical decisions and implement adequate countermeasures. However, organizations are hesitant or cautious to share their locally collected cyber threat intelligence with third parties because of possible damage to the organization's reputation, legal or liability concerns, or the risk that the information is used against them.In order to promote a collaborative cybersecurity environment that accommodates the varying confidentiality requirements of both threat intelligence producers and consumers, we introduce and assess a viable solution for preserving privacy while sharing and analyzing sensitive or confidential data. This solution is designed to work seamlessly with modern cyber threat intelligence platforms. Furthermore, we examine the security implications and computational impact associated with these techniques, enabling the analysis of correlations between threat events in a manner that respects confidentiality and extends across multiple organizations involved in information sharing.
引用
收藏
页数:19
相关论文
共 24 条
  • [1] Privacy-preserving Stacking with Application to Cross-organizational Diabetes Prediction
    Yao, Quanming
    Guo, Xiawei
    Kwok, James
    Tu, Weiwei
    Chen, Yugiang
    Dai, Wenyuan
    Yang, Qiang
    PROCEEDINGS OF THE TWENTY-EIGHTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2019, : 4114 - 4120
  • [2] Privacy-Preserving Polyglot Sharing and Analysis of Confidential Cyber Threat Intelligence
    Preuveneers, Davy
    Joosen, Wouter
    PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, ARES 2022, 2022,
  • [3] Towards Privacy-Preserving Sharing of Cyber Threat Intelligence for Effective Response and Recovery
    Nitz, Lasse
    Gurabi, Mehdi Akbari
    Mandal, Avikarsha
    Heitmann, Benjamin
    ERCIM NEWS, 2021, (126): : 33 - 34
  • [4] An Privacy-preserving Cross-organizational Authentication/Authorization/Accounting System using Blockchain Technology
    Lu, Peggy Joy
    Yeh, Lo-Yao
    Huang, Jiun-Long
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [5] Privacy-Preserving Behavioral Correctness Verification of Cross-Organizational Workflow With Task Synchronization Patterns
    Liu, Cong
    Zeng, Qingtian
    Cheng, Long
    Duan, Hua
    Zhou, Mengchu
    Cheng, Jiujun
    IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2021, 18 (03) : 1037 - 1048
  • [6] A Decentralized Approach to Threat Intelligence using Federated Learning in Privacy-Preserving Cyber Security
    Sakhare, Nitin N.
    Kulkarni, Raj
    Rizvi, Nuzhat
    Raich, Devashri
    Dhablia, Anishkumar
    Bendale, Shailesh P.
    JOURNAL OF ELECTRICAL SYSTEMS, 2023, 19 (03) : 106 - 125
  • [7] Enabling Privacy-preserving Sharing of Cyber Threat Information in the Cloud
    Fan, Wenjun
    Ziembicka, Joanna
    de Lemos, Rogerio
    Chadwick, David
    Di Cerbo, Francesco
    Sajjad, Ali
    Wang, Xiao-Si
    Herwono, Ian
    2019 6TH IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (IEEE CSCLOUD 2019) / 2019 5TH IEEE INTERNATIONAL CONFERENCE ON EDGE COMPUTING AND SCALABLE CLOUD (IEEE EDGECOM 2019), 2019, : 74 - 80
  • [8] Priv-Share: A privacy-preserving framework for differential and trustless delegation of cyber threat intelligence using blockchain
    Dunnett, Kealan
    Pal, Shantanu
    Jadidi, Zahra
    Dedeoglu, Volkan
    Jurdak, Raja
    COMPUTER NETWORKS, 2024, 252
  • [9] Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers
    Ali, Hisham
    Papadopoulos, Pavlos
    Ahmad, Jawad
    Pitropakis, Nikolaos
    Jaroucheh, Zakwan
    Buchanan, William J.
    2021 14TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS (SIN 2021), 2021,
  • [10] Compare Before You Buy: Privacy-Preserving Selection of Threat Intelligence Providers
    Vos, Jelle
    Erkin, Zekeriya
    Doerr, Christian
    2021 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS), 2021, : 44 - 49