skip to main content
10.1145/3664476.3670444acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
research-article

Towards the adoption of automated cyber threat intelligence information sharing with integrated risk assessment

Published: 30 July 2024 Publication History

Abstract

In the domain of cybersecurity, effective threat intelligence and information sharing are critical operations for ensuring appropriate and timely response against threats, but limited in automation, standardization, and ease of use in current platforms. This paper introduces a Cyber Threat Intelligence (CTI) Information Sharing platform, designed for critical infrastructures and cyber-physical systems. Our platform integrates existing cybersecurity tools and leverages digital twin technology, enhancing threat analysis and mitigation capabilities. It features an automated process for disseminating standardized and structured intelligence, utilizing the Malware Information Sharing Platform (MISP) for effective dissemination. A significant enhancement is the integration of risk assessment tools, which enriches the shared intelligence with detailed risk information, supporting an informed decision-making. The platform encompasses a user-friendly dashboard and a robust backend, streamlining the threat intelligence cycle and transforming raw data coming from diverse sources into actionable insights. Overall the CTI4BC platform presents a solution to overcome challenges in the CTI sharing, contributing to a more resilient cybersecurity domain.

References

[1]
Elias Bou-Harb, Walter Lucia, Nicola Forti, Sean Weerakkody, Nasir Ghani, and Bruno Sinopoli. 2017. Cyber Meets Control: A Novel Federated Approach for Resilient CPS Leveraging Real Cyber Threat Intelligence. IEEE Communications Magazine 55, 5 (2017), 198–204. https://doi.org/10.1109/MCOM.2017.1600292CM
[2]
Thanasis Chantzios., Paris Koloveas., Spiros Skiadopoulos., Nikos Kolokotronis., Christos Tryfonopoulos., Vasiliki-Georgia Bilali., and Dimitris Kavallieros.2019. The Quest for the Appropriate Cyber-threat Intelligence Sharing Platform. In Proceedings of the 8th International Conference on Data Science, Technology and Applications - DATA. INSTICC, SciTePress, 369–376. https://doi.org/10.5220/0007978103690376
[3]
Django Software Foundation. 2024. Django Documentation. https://docs.djangoproject.com/en/3.2/ Accessed: 2024-03-28.
[4]
Facebook, Inc.2024. React - A JavaScript library for building user interfaces. https://reactjs.org/. Accessed: 2024-03-28.
[5]
MISP Project. 2024. MISP - Malware Information Sharing Platform and Threat Sharing. https://www.misp-project.org/. Accessed: 2024-03-28.
[6]
Georgios Sakellariou, Panagiotis Fouliras, Ioannis Mavridis, and Panagiotis Sarigiannidis. 2022. A Reference Model for Cyber Threat Intelligence (CTI) Systems. Electronics 11, 9 (April 2022), 1401. https://doi.org/10.3390/electronics11091401
[7]
The Apache Software Foundation. 2024. Apache Kafka. https://kafka.apache.org/. Accessed: 2024-03-28.
[8]
Cynthia Wagner, Alexandre Dulaunoy, Gérard Wagener, and Andras Iklody. 2016. MISP: The Design and Implementation of a Collaborative Threat Intelligence Sharing Platform. In Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security (Vienna, Austria) (WISCS ’16). Association for Computing Machinery, New York, NY, USA, 49–56. https://doi.org/10.1145/2994539.2994542

Index Terms

  1. Towards the adoption of automated cyber threat intelligence information sharing with integrated risk assessment

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Other conferences
        ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and Security
        July 2024
        2032 pages
        ISBN:9798400717185
        DOI:10.1145/3664476
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 30 July 2024

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. Automation
        2. Cyber Threat Intelligence
        3. Cyber-Physical Systems
        4. Cybersecurity
        5. Information Sharing
        6. Standardized Threat Intelligence

        Qualifiers

        • Research-article
        • Research
        • Refereed limited

        Funding Sources

        Conference

        ARES 2024

        Acceptance Rates

        Overall Acceptance Rate 228 of 451 submissions, 51%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • 0
          Total Citations
        • 29
          Total Downloads
        • Downloads (Last 12 months)29
        • Downloads (Last 6 weeks)25
        Reflects downloads up to 15 Sep 2024

        Other Metrics

        Citations

        View Options

        Get Access

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format.

        HTML Format

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media