Privacy-Friendly Collaboration for Cyber Threat Mitigation
نویسندگان
چکیده
In recent years, security solutions have increasingly focused on actively predicting future attacks. Since prediction accuracy can improve with more information about the attackers, sharing securityrelevant data among organizations is often being advocated. However, collaborative security approaches are rarely implemented due to related trust, privacy, and liability concerns. In this paper, we explore a novel approach to collaborative threat mitigation where organizations estimate the benefits of data sharing with potential partners in a privacy-preserving way (i.e., without actually disclosing their dataset). Data sharing then occurs securely within coalitions of allied organizations. We focus on collaborative predictive blacklisting, i.e., predicting sources of future attacks based on both one’s own data and that of a few selected partners. We study how different collaboration strategies affect prediction accuracy by experimenting on a real-world dataset of 2 billion IP addresses and observe up to a 105% improvement.
منابع مشابه
Mitigating malicious insider cyber threat
This paper examines malicious insider threat and explains the key differences from other types of insider threat and from external threat actors. A phase based “kill-chain” malicious insider threat model is developed and proposed to help inform selection of mitigation countermeasures which are complementary or incremental to a typically implemented traditional ISO 17799/27002 information securi...
متن کاملAn Artificial Neural Network Based Decision Support System for Budgeting
As large-scale Cyber attacks become more sophisticated, local network defenders should employ strength-in-numbers to achieve mission success. Group collaboration reduces individual efforts to analyze and assess network traffic. Network defenders must evolve from an isolated defense in sector policy and move toward a collaborative strength-in-numbers defense policy that rethinks traditional netw...
متن کاملA Privacy-Level Model of User-Centric Cyber-Physical Systems
In an interconnected cyber-world, Cyber-Physical Systems (CPSs) appear to play an increasingly important role in smart ecosystems. A variety of resource-constrained thin clients, such as sensors, RFIDs, actuators and smart devices, are included in the list of CPS. These devices can be used in a number of medical, vehicular, aviation, military and smart cities applications. A plethora of sensiti...
متن کاملAddressing the Dilema Between Collaboration and Privacy in Coworking Spaces
This paper aims to inform design strategies for regulating privacy in coworking spaces. Coworking spaces are growing at a high rate, yet studies related to the social, psychological, behavioral and physical needs associated with these environments are limited. The growth of coworking spaces is in greater part facilitated by a drive towards greater interaction and collaboration among the workfor...
متن کاملMITIGATE: An Innovative Cyber-Security Maritime Supply Chain Risk Management System
Despite the importance of Critical Information Infrastructures (CIIs) and dynamic ICT-based maritime Supply Chains (SCs) for ports operations, state-of-the-art Risk Management (RM) methodologies for maritime environments pay limited attention to cyber-security and do not adequately address security processes for international SCs. Motivated by these limitations, we have developed and will valid...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1403.2123 شماره
صفحات -
تاریخ انتشار 2014