Threat Intelligence Sharing Platforms: An Exploratory Study of Software Vendors and Research Perspectives

نویسندگان

  • Clemens Sauerwein
  • Christian Sillaber
  • Andrea Mussmann
  • Ruth Breu
چکیده

In the last couple of years, organizations have demonstrated an increased willingness to exchange information and knowledge regarding vulnerabilities, threats, incidents and mitigation strategies in order to collectively protect against today’s sophisticated cyberattacks. As a reaction to this trend, software vendors started to create offerings that facilitate this exchange and appear under the umbrella term “Threat Intelligence Sharing Platforms”. To which extent these platforms provide the needed means for exchange and information sharing remains unclear as they lack a common definition, innovation in this area is mostly driven by vendors and empirical research is rare. To close this gap, we examine the state-of-the-art software vendor landscape of these platforms, identify gaps and present arising research perspectives. Therefore, we conducted a systematic study of 22 threat intelligence sharing platforms and compared them. We derived eight key findings and discuss how existing gaps should be addressed by future research.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Open vs.Closed standards for ambient intelligence: an exploratory study of adoption

Emerging forms of structurally complex information systems, such as Ambient Intelligence (AmI), requires the integration of a range of technologies. To enable such systems’ development there is a reliance on interoperability standards. However, due to their inherent characteristics, the adoption of open or closed standards by technology vendors can have impacts the later stages of the adoption ...

متن کامل

Decaying Indicators of Compromise

The steady increase in the volume of indicators of compromise (IoC) as well as their volatile nature makes their processing challenging. Once compromised infrastructures are cleaned up, threat actors are moving to on to other target infrastructures or simply changing attack strategies. To ease the evaluation of IoCs as well as to harness the combined analysis capabilities, threat intelligence s...

متن کامل

Research in Design Computing: an Artificial Intelligence Framework

Design computing has often been considered a subset of computer applications that assist the designer in documenting and analysing complex designs. As one of many areas in which computer applications have been developed, design computing has relied on software developers and vendors to implement and market software with the relevant features and utilities to support some aspects of design activ...

متن کامل

Add-on Solution Success: A Configurational View on Knowledge Sharing in Digital Platforms

Digital platforms serve as a foundation upon which manifold firms develop complementary add-ons to address heterogeneous customer needs. In order to successfully stimulate partner contributions platform vendors need to share knowledge with partners that enables them to develop add-ons. Vendors face a trade-off between addressing idiosyncratic needs of partners while ensuring the scalability of ...

متن کامل

The Impact Of Software-As-A-Service On Business Models Of Leading Software Vendors: Experiences From Three Exploratory Case Studies

The number of software vendors offering ‘Software-as-a-Service’ has been increasing in recent years. In the Software-as-a-Service model software is operated by the software vendor and delivered to the customer as a service. Existing business models and industry structures are challenged by the changes to the deployment and pricing model compared to traditional software. However, the full implic...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017