A Novel Trust Taxonomy for Shared Cyber Threat Intelligence

Cyber threat intelligence sharing has become a focal point for many organizations to improve resilience against cyberattacks. The objective lies in sharing relevant information achieved through automating as many processes as possible without losing control or compromising security. The intelligence may be crowdsourced from decentralized stakeholders to collect and enrich existing information. Trust is an attribute of actionable cyber threat intelligence that has to be established between stakeholders. Sharing information about vulnerabilities requires a high level of trust because of the sensitive information. Some threat intelligence platforms/providers support trust establishment through internal vetting processes; others rely on stakeholders to manually build up trust. The latter may reduce the amount of intelligence sources. This work presents a novel trust taxonomy to establish a trusted threat sharing environment. 30 popular threat intelligence platforms/providers were analyzed and compared regarding trust functionalities. Trust taxonomies were analyzed and compared. Illustrative case studies were developed and analyzed applying our trust taxonomy.

[1]  Yun Zhang,et al.  Research of P2P Network Trust Model , 2013, 2013 5th International Conference on Intelligent Human-Machine Systems and Cybernetics.

[2]  Pieter van der Wolf State of the Art and Requirements , 1994 .

[3]  Gordon Inverarity,et al.  50th anniversary of Numerical Weather Prediction (NWP) in the UK , 2016 .

[4]  Eva Riccomagno,et al.  Some security considerations on crowd-sourcing an ontology , 2013, 2013 36th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).

[5]  Muhammad Al-Qurishi,et al.  A novel prevention mechanism for Sybil attack in online social network , 2015, 2015 2nd World Symposium on Web Applications and Networking (WSWAN).

[6]  Erran Carmel,et al.  Brazil software crowdsourcing: a first step in a multi-year study , 2014, CSI-SE 2014.

[7]  Abiola Abimbola Incident Response: Information security incident response , 2007 .

[8]  Hector Garcia-Molina,et al.  Taxonomy of trust: Categorizing P2P reputation systems , 2006, Comput. Networks.

[9]  Humayun Zafar,et al.  Rethinking FS-ISAC: An IT Security Information Sharing Network Model for the Financial Services Sector , 2014, Commun. Assoc. Inf. Syst..

[10]  Kevin C. Almeroth,et al.  A Taxonomy to Express Open Challenges in Trust and Reputation Systems , 2012, J. Commun..

[11]  Octavian Catrina,et al.  Secure Collaborative Supply-Chain Management , 2011, Computer.

[12]  Andrew P. Martin,et al.  A taxonomy for securely sharing information among others in a trust domain , 2013, 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013).

[13]  Clifton Forlines,et al.  Crowdsourcing the future: predictions made with a social network , 2014, CHI.