Information Sharing Models for Cooperative Cyber Defence

被引:0
|
作者
Hernandez-Ardieta, Jorge L. [1 ]
Tapiador, Juan E. [2 ]
Suarez-Tangil, Guillermo [2 ]
机构
[1] Indra, Cybersecur Unit, Madrid, Spain
[2] Univ Carlos III Madrid, Dept Comp Sci, COSEC Lab, Madrid, Spain
关键词
Cyber security; Cyber defence; Information sharing; Cooperation; SYSTEMS; STUXNET; TRUST;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The globalisation and increasing complexity of modern cyber security operations have made it virtually impossible for any organisation to properly manage cyber threats and cyber incidents without leveraging various collaboration instruments with different partners and allies. This is especially relevant in certain areas of national security, like the protection of critical infrastructures, where the partnership amongst public and private sectors is paramount to adequately protect those infrastructures from emerging threats. Over the last years consensus has emerged that sharing information about threats, actors, tactics and other cyber security information will play a central role in deploying an effective cooperative cyber defence. Near real-time information sharing has recently gained momentum as a means to redress the imbalance between defenders and attackers. In practical terms, the majority of current efforts in this area revolve around the idea of developing infrastructures and mechanisms that facilitate information sharing, notably through standardization of data formats and exchange protocols. While developing and deploying such an infrastructure is certainly essential to solve the problem of "how" to effectively share information, we believe that some key aspects still remain unaddressed, namely those related to deciding on "what" to share, "with whom", "when", as well as reasoning about the repercussions of sharing sensitive data. In this paper, we argue that effective policies for near real-time information sharing must rely on, at least, two pillars. First, formal models to estimate the subjective value of the information shared should be developed. Second, trust/reputation models that consider the dynamic behaviour and changing factors of the sharing community have to be identified. For the latter, we propose to model information sharing communities as directed graphs, with nodes representing community members and edges modelling sharing relationships among them. Relevant properties of both nodes and edges are captured through attributes attached to each of them, which subsequently facilitate reasoning about particular data exchanges.
引用
收藏
页数:28
相关论文
共 50 条
  • [1] Cyber Defence Information Sharing in a Federated Network
    Kantola, H.
    Jaitner, M. Levin
    2016 IEEE INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON U.S.), 2016, : 86 - 93
  • [2] Cyber Society and Cooperative Cyber Defence
    Lorents, Peeter
    Ottis, Rain
    Rikk, Raul
    INTERNATIONALIZATION, DESIGN AND GLOBAL DEVELOPMENT, PROCEEDINGS, 2009, 5623 : 180 - +
  • [3] Overcoming information-sharing challenges in cyber defence exercises
    Brilingaite, Agne
    Bukauskas, Linas
    Juozapavicius, Ausrius
    Kutka, Eduardas
    JOURNAL OF CYBERSECURITY, 2022, 8 (01):
  • [4] ON THE SHARING OF CYBER SECURITY INFORMATION
    Luiijf, Eric
    Klaver, Marieke
    CRITICAL INFRASTRUCTURE PROTECTION IX, 2015, 466 : 29 - 46
  • [5] Information Sharing & Cyber Threats
    Hsu, Sonya H. Y.
    Dick, Steven J.
    2017 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2017, : 89 - 94
  • [6] RT-Based Administrative Models for Community Cyber Security Information Sharing
    Sandhu, Ravi
    Bijon, Khalid Zaman
    Jin, Xin
    Krishnan, Ram
    PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING (COLLABORATECOM), 2011, : 473 - 478
  • [7] Risks of Sharing Cyber Incident Information
    Albakri, Adham
    Boiten, Eerke
    De Lemos, Rogerio
    13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
  • [8] Towards Improved Cyber Security Information Sharing
    Dandurand, Luc
    Serrano, Oscar Serrano
    2013 5TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON), 2013,
  • [9] Strategic Aspects of Cyber Risk Information Sharing
    Laube, Stefan
    Boehme, Rainer
    ACM COMPUTING SURVEYS, 2018, 50 (05)
  • [10] Information sharing: Competitive strategy or cyber fad?
    Slovensky, DJ
    Van Matre, JG
    Paustian, PE
    Roberge, L
    ISSUES AND TRENDS OF INFORMATION TECHNOLOGY MANAGEMENT IN CONTEMPORARY ORGANIZATIONS, VOLS 1 AND 2, 2002, : 1106 - 1107