Privacy-Friendly Collaboration for Cyber Threat Mitigation

نویسندگان

  • Julien Freudiger
  • Emiliano De Cristofaro
  • Alex Brito
چکیده

In recent years, security solutions have increasingly focused on actively predicting future attacks. Since prediction accuracy can improve with more information about the attackers, sharing securityrelevant data among organizations is often being advocated. However, collaborative security approaches are rarely implemented due to related trust, privacy, and liability concerns. In this paper, we explore a novel approach to collaborative threat mitigation where organizations estimate the benefits of data sharing with potential partners in a privacy-preserving way (i.e., without actually disclosing their dataset). Data sharing then occurs securely within coalitions of allied organizations. We focus on collaborative predictive blacklisting, i.e., predicting sources of future attacks based on both one’s own data and that of a few selected partners. We study how different collaboration strategies affect prediction accuracy by experimenting on a real-world dataset of 2 billion IP addresses and observe up to a 105% improvement.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mitigating malicious insider cyber threat

This paper examines malicious insider threat and explains the key differences from other types of insider threat and from external threat actors. A phase based “kill-chain” malicious insider threat model is developed and proposed to help inform selection of mitigation countermeasures which are complementary or incremental to a typically implemented traditional ISO 17799/27002 information securi...

متن کامل

An Artificial Neural Network Based Decision Support System for Budgeting

As large-scale Cyber attacks become more sophisticated, local network defenders should employ strength-in-numbers to achieve mission success. Group collaboration reduces individual efforts to analyze and assess network traffic. Network defenders must evolve from an isolated defense in sector policy and move toward a collaborative strength-in-numbers defense policy that rethinks traditional netw...

متن کامل

A Privacy-Level Model of User-Centric Cyber-Physical Systems

In an interconnected cyber-world, Cyber-Physical Systems (CPSs) appear to play an increasingly important role in smart ecosystems. A variety of resource-constrained thin clients, such as sensors, RFIDs, actuators and smart devices, are included in the list of CPS. These devices can be used in a number of medical, vehicular, aviation, military and smart cities applications. A plethora of sensiti...

متن کامل

Addressing the Dilema Between Collaboration and Privacy in Coworking Spaces

This paper aims to inform design strategies for regulating privacy in coworking spaces. Coworking spaces are growing at a high rate, yet studies related to the social, psychological, behavioral and physical needs associated with these environments are limited. The growth of coworking spaces is in greater part facilitated by a drive towards greater interaction and collaboration among the workfor...

متن کامل

MITIGATE: An Innovative Cyber-Security Maritime Supply Chain Risk Management System

Despite the importance of Critical Information Infrastructures (CIIs) and dynamic ICT-based maritime Supply Chains (SCs) for ports operations, state-of-the-art Risk Management (RM) methodologies for maritime environments pay limited attention to cyber-security and do not adequately address security processes for international SCs. Motivated by these limitations, we have developed and will valid...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1403.2123  شماره 

صفحات  -

تاریخ انتشار 2014