• Corpus ID: 235828707

A Reputation-based Approach using Consortium Blockchain for Cyber Threat Intelligence Sharing

  title={A Reputation-based Approach using Consortium Blockchain for Cyber Threat Intelligence Sharing},
  author={Zhang Xiaohui and Miao Xianghua},
The CTI (Cyber Threat Intelligence) sharing and exchange is an effective method to improve the responsiveness of the protection party. Blockchain technology enables sharing collaboration consortium to conduct a trusted CTI sharing and exchange without a trusted centralized institution. However, the distributed connectivity of the blockchain-based CTI sharing model proposed before exposes the systems into byzantine attacks, the compromised members of partner organizations will further decrease… 

Figures and Tables from this paper

Challenges and Opportunities of Blockchain for Cyber Threat Intelligence Sharing
To determine the role of blockchain-based sharing moving forward, a number of general CTI sharing challenges are presented, and how blockchain can bring opportunities to address these challenges in a secure and efficient manner is discussed.


iShare: Blockchain-Based Privacy-Aware Multi-Agent Information Sharing Games for Cybersecurity
The main aim of the Blockchain-based iShare framework is to constantly collect high-resolution, cyber-attack information across organizational boundaries of which the organizations have no specific knowledge or control over any other organizations’ data or damage caused by cyber-attacks.
A New Network Model for Cyber Threat Intelligence Sharing using Blockchain Technology
The model provides a more effective and efficient framework for a CTI sharing network that has the potential to overcome the trust barriers and data privacy issues inherent in this domain.
Toward a blockchain-based framework for challenge-based collaborative intrusion detection
The evaluation demonstrates that blockchain technology has the potential to enhance the robustness of challenge-based CIDNs in the aspects of trust management and alarm aggregation under adversary scenarios.
Blockchain-Based Distributed Trust and Reputation Management Systems: A Survey
This paper defines two taxonomies for both Blockchain and DTRMS and applies a Formal Concept Analysis and reveals significant trends and emerging practices in the current implementations that have been distilled into recommendations to guide Blockchain’s adoption in D TRMS systems.
A Reputation Scheme for a Blockchain-based Network Cooperative Defense
This paper presents the design, implementation, and evaluation of a reputation scheme for the Blockchain Signaling System (BloSS), a smart contract-enabled process automates reputation management to diminish malicious behavior by incentive design.
A Proof-of-Trust Consensus Protocol for Enhancing Accountability in Crowdsourcing Services
The paper demonstrates that the approach can provide a viable accountability solution for the online service industry and avoids the low throughput and resource intensive pitfalls associated with Bitcoin’ s “Proof-of-Work” (PoW) mining.
When Intrusion Detection Meets Blockchain Technology: A Review
The background of intrusion detection and blockchain is introduced, the applicability of blockchain to intrusion detection is discussed, and open challenges in this direction are identified.
A Blockchain Approach to Identifying Compromised Nodes in Collaborative Intrusion Detection Systems
  • Chandralekha Yenugunti, S. Yau
  • Computer Science
    2020 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)
  • 2020
An approach based on trust score system is presented to identify and suspend the compromised nodes in CIDS to improve the trust among the nodes for collaboration.
A survey of Blockchain consensus algorithms: mechanism, design and applications
A unified consensus algorithm process model that is suitable for Blockchains based on both the chain and directed acyclic graph (DAG) structure is proposed and some suggestions for selecting consensus algorithms in different Blockchain application scenarios are provided.