{"title":"基于声誉的网络安全信任中心模型","authors":"H. Kilinç, Ugur Cagal","doi":"10.1109/ISDFS.2016.7473508","DOIUrl":null,"url":null,"abstract":"One of the most effective defense mechanisms against threats is to establish threat intelligence platform and early warning systems and to understand the adversary's behavior, capability, and intent. Threat intelligence and early warning systems require collaboration among legitimate participants which have cyber security solutions and trustworthy cyber security services. The cyber security service is a part of information driven cyber security management and is a result of information shared from cyber security solutions such as NGFW, VoIP and web firewalls. It provides timely and accurate information about known malicious sources such as an application, a web address, an IP address or a file. This study proposes a reputation based trust center model as a threat intelligence platform for legitimate participants and also it offers cloud-based cyber security services to report malicious or deficient data resources. Proposed model has a deterrent structure that uses simple mathematical methods.","PeriodicalId":136977,"journal":{"name":"2016 4th International Symposium on Digital Forensic and Security (ISDFS)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"A reputation based trust center model for cyber security\",\"authors\":\"H. Kilinç, Ugur Cagal\",\"doi\":\"10.1109/ISDFS.2016.7473508\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"One of the most effective defense mechanisms against threats is to establish threat intelligence platform and early warning systems and to understand the adversary's behavior, capability, and intent. Threat intelligence and early warning systems require collaboration among legitimate participants which have cyber security solutions and trustworthy cyber security services. The cyber security service is a part of information driven cyber security management and is a result of information shared from cyber security solutions such as NGFW, VoIP and web firewalls. It provides timely and accurate information about known malicious sources such as an application, a web address, an IP address or a file. This study proposes a reputation based trust center model as a threat intelligence platform for legitimate participants and also it offers cloud-based cyber security services to report malicious or deficient data resources. Proposed model has a deterrent structure that uses simple mathematical methods.\",\"PeriodicalId\":136977,\"journal\":{\"name\":\"2016 4th International Symposium on Digital Forensic and Security (ISDFS)\",\"volume\":\"57 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-04-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 4th International Symposium on Digital Forensic and Security (ISDFS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISDFS.2016.7473508\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 4th International Symposium on Digital Forensic and Security (ISDFS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISDFS.2016.7473508","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A reputation based trust center model for cyber security
One of the most effective defense mechanisms against threats is to establish threat intelligence platform and early warning systems and to understand the adversary's behavior, capability, and intent. Threat intelligence and early warning systems require collaboration among legitimate participants which have cyber security solutions and trustworthy cyber security services. The cyber security service is a part of information driven cyber security management and is a result of information shared from cyber security solutions such as NGFW, VoIP and web firewalls. It provides timely and accurate information about known malicious sources such as an application, a web address, an IP address or a file. This study proposes a reputation based trust center model as a threat intelligence platform for legitimate participants and also it offers cloud-based cyber security services to report malicious or deficient data resources. Proposed model has a deterrent structure that uses simple mathematical methods.