Managing Effective Collaboration in Cybersecurity Alliances Using Social Computational Trust

To enable effective collaboration, trust in the ability of an alliance member to adequately perform joined tasks is an essential element. Such trust needs to be organized, evaluated and maintained amongst all alliance members. In this paper, we present a social computational trust model (SCTM) to evaluate trust as featured by alliance members. Specifically, we consider three different distinctive trustworthiness elements: competence, benevolence ,and integrity. To evaluate the trust of a particular member, we take into account two sources of evidence as well as the context of interactions between the parties. Based on our SCTM model, we have developed an algorithm that ranks the members based on their capabilities, behavior, and integrity in the context of a task that is expected to be performed. A cybersecurity alliance case study is presented to demonstrate the applicability of the SCTM model. Experimental results from a real-world testbed are used to validate the presented SCTM model in selecting the right partner to defend against cyberattacks.

[1]  Ana Paula Rocha,et al.  The Impact of Benevolence in Computational Trust , 2013, AT.

[2]  Jaideep Srivastava,et al.  Predicting trusts among users of online communities: an epinions case study , 2008, EC '08.

[3]  Daniel Tranel,et al.  The human amygdala is necessary for developing and expressing normal interpersonal trust , 2011, Neuropsychologia.

[4]  Timothy W. Finin,et al.  Trust-Based Security in Pervasive Computing Environments , 2022 .

[5]  Ameneh Deljoo,et al.  Enabling E-science applications with dynamic optical networks: Secure autonomous response networks , 2017, 2017 Optical Fiber Communications Conference and Exhibition (OFC).

[6]  Kai Hwang,et al.  Collaborative Detection of DDoS Attacks over Multiple Network Domains , 2007, IEEE Transactions on Parallel and Distributed Systems.

[7]  Ameneh Deljoo,et al.  Towards Trustworthy Information Sharing by Creating Cyber Security Alliances , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).

[8]  Winfried Lamersdorf,et al.  Jadex: Implementing a BDI-Infrastructure for JADE Agents , 2003 .

[9]  J. Barney,et al.  Trustworthiness as a Source of Competitive Advantage , 1994 .

[10]  N. Noorderhaven,et al.  When Does Trust Matter to Alliance Performance , 2006 .

[11]  Daniel Z. Levin,et al.  Trust and knowledge sharing: A critical combination , 2002 .

[12]  Rino Falcone,et al.  Trust Theory: A Socio-Cognitive and Computational Model , 2010 .

[13]  P. Ring,et al.  Structuring cooperative relationships between organizations , 1992 .

[14]  Daniel Thalmann,et al.  ETAF: An extended trust antecedents framework for trust prediction , 2014, 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014).

[15]  Cees T. A. M. de Laat,et al.  Measuring the efficiency of SDN mitigations against attacks on computer infrastructures , 2019, Future Gener. Comput. Syst..

[16]  Gregory D. Abowd,et al.  Towards a Better Understanding of Context and Context-Awareness , 1999, HUC.

[17]  J. H. Davis,et al.  An Integrative Model Of Organizational Trust , 1995 .

[18]  Ameneh Deljoo,et al.  Social Computational Trust Model (SCTM): A Framework to Facilitate Selection of Partners , 2018, 2018 IEEE/ACM Innovating the Network for Data-Intensive Science (INDIS).

[19]  Cees T. A. M. de Laat,et al.  Approaches for Collaborative Security Defences in Multi Network Environments , 2019, 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom).

[20]  Ameneh Deljoo,et al.  The Impact of Competence and Benevolence in a Computational Model of Trust , 2018, IFIPTM.

[21]  Stephen Marsh,et al.  Formalising Trust as a Computational Concept , 1994 .