skip to main content
10.1145/3132465.3132468acmconferencesArticle/Chapter ViewAbstractPublication PagessecConference Proceedingsconference-collections
research-article

Rethinking information sharing for threat intelligence

Published:14 October 2017Publication History

ABSTRACT

In the past decade, the information security and threat landscape has grown significantly making it difficult for a single defender to defend against all attacks at the same time. This called for introducing information sharing, a paradigm in which threat indicators are shared in a community of trust to facilitate defenses. Standards for representation, exchange, and consumption of indicators are proposed in the literature, although various issues are undermined. In this paper, we take the position of rethinking information sharing for actionable intelligence, by highlighting various issues that deserve further exploration. We argue that information sharing can benefit from well-defined use models, threat models, well-understood risk by measurement and robust scoring, well-understood and preserved privacy and quality of indicators and robust mechanism to avoid free riding behavior of selfish agents. We call for using the differential nature of data and community structures for optimizing sharing designs and structures.

References

  1. -. 2016. Cyber Information Sharing and Collaboration Program. http://www.dhs.gov/topic/cybersecurity-information-sharing. (May 2016).Google ScholarGoogle Scholar
  2. 2014. Framework for improving critical infrastructure cybersecurity. Technical Report. National Institute of Standards and Technology.Google ScholarGoogle Scholar
  3. R Barnes, B Schneier, C Jennings, T Hardie, B Trammell, C Huitema, and D Borkmann. 2015. Confidentiality in the Face of Pervasive Surveillance: A Threat Model and Problem Statement. Technical Report.Google ScholarGoogle Scholar
  4. Facebook Inc. 2016. ThreatExchange. https://developers.facebook.com/products/threat-exchange/. (May 2016).Google ScholarGoogle Scholar
  5. Shafi Goldwasser. 1997. Multi party computations: past and present. In Proceedings of the sixteenth annual ACM symposium on Principles of distributed computing. ACM, 1--6. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Chris Johnson, Lee Badger, David Waltermire, Julie Snyder, and Clem Skorupka. 2016. Guide to Cyber Threat Information Sharing. Technical Report. NIST. Google ScholarGoogle ScholarCross RefCross Ref
  7. Charles A. Kamhoua, Andrew P. Martin, Deepak K. Tosh, Kevin A. Kwiat, Chad Heitzenrater, and Shamik Sengupta. 2015. Cyber-Threats Information Sharing in Cloud Computing: A Game Theoretic Approach. In IEEE CSCloud. 382--389. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Charles A. Kamhoua, Anbang Ruan, Andrew P. Martin, and Kevin A. Kwiat. 2015. On the Feasibility of an Open-Implementation Cloud Infrastructure: A Game Theoretic Analysis. In 8th IEEE/ACM UCC. 217--226.Google ScholarGoogle Scholar
  9. Myungsun Kim, Aziz Mohaisen, Jung Hee Cheon, and Yongdae Kim. 2016. Private Over-Threshold Aggregation Protocols over Distributed Datasets. IEEE Trans. Knowl. Data Eng. 28, 9 (2016), 2467--2479. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Javvad Malik. 2016. Threat Intelligence Sharing: The Only Way to Combat Our Growing Skills Gap. Information Security Magazine. (May 2016).Google ScholarGoogle Scholar
  11. Aziz Mohaisen and Omar Alrawi. 2013. Unveiling Zeus: automated classification of malware samples. In Proc. of ACM WWW. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Aziz Mohaisen and Omar Alrawi. 2014. AV-Meter: An Evaluation of Antivirus Scans and Labels. In Proc. of DIMVA. Google ScholarGoogle ScholarCross RefCross Ref
  13. Helen Nissenbaum. 2009. Privacy in context: Technology, policy, and the integrity of social life. Stanford University Press.Google ScholarGoogle Scholar
  14. Teri Robinson. 2014. Breaches, malware to cost $491 billion in 2014, study says. http://bit.ly/1gNXu90. (2014).Google ScholarGoogle Scholar
  15. Julie Ryan. 2012. Use of Information Sharing Between Government and Industry as a Weapon. Leading Issues in Information Warfare & Security Research 1 (2012).Google ScholarGoogle Scholar
  16. Deepak K. Tosh, Shamik Sengupta, Charles A. Kamhoua, Kevin A. Kwiat, and Andrew P. Martin. 2015. An evolutionary game-theoretic framework for cyber-threat information sharing. In IEEE ICC, London, United Kingdom, June 8--12, 2015. 7341--7346. Google ScholarGoogle ScholarCross RefCross Ref
  17. Deepak K. Tosh, Shamik Sengupta, Sankar Mukhopadhyay, Charles A. Kamhoua, and Kevin A. Kwiat. 2015. Game Theoretic Modeling to Enforce Security Information Sharing among Firms. In IEEE CSCloud. 7--12. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. An Wang, Aziz Mohaisen, Wentao Chang, and Songqing Chen. 2015. Delving into Internet DDoS Attacks by Botnets: Characterization and Analysis. In Proc. of IEEE DSN. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. An Wang, Aziz Mohaisen, Wentao Chang, and Songqing Chen. 2015. Revealing DDoS Attack Dynamics behind the Scenes. In Proc. of DIMVA.Google ScholarGoogle Scholar
  20. An Wang, Aziz Mohaisen, and Songqing Chen. 2017. An Adversary-Centric Behavior Modeling of DDoS Attacks. In 37th IEEE International Conference on Distributed Computing Systems, ICDCS 2017, Atlanta, GA, USA, June 5--8, 2017. 1126--1136. Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Rethinking information sharing for threat intelligence

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      HotWeb '17: Proceedings of the fifth ACM/IEEE Workshop on Hot Topics in Web Systems and Technologies
      October 2017
      97 pages
      ISBN:9781450355278
      DOI:10.1145/3132465

      Copyright © 2017 ACM

      © 2017 Association for Computing Machinery. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of the United States government. As such, the United States Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 14 October 2017

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader