{"title":"基于新型网络拓扑结构的网络威胁信息共享模型","authors":"J. Hautamaki, T. Hamalainen","doi":"10.1145/3468784.3468885","DOIUrl":null,"url":null,"abstract":"The digitized environments are particularly vulnerable to various attacks. In such a situation of a security attack, detecting and responding to attacks require effective actions. One of the most significant ways to improve resilience to security attacks is to obtain accurate and timely situational aspect of the security awareness. The efficient production and utilization of situation information is achieved by sharing information with other actors in the information sharing network quickly and reliably without compromising the confidential information of one's own organization. At the same time, it should also be possible to avoid a flood of irrelevant information in the sharing network, which wastes resources and slows down the implementation of security measures. In our study, we have investigated how security-related information can be shared online as efficiently as possible by building a security information sharing topology based on the two most widely used network optimization algorithms. In the article, we present a model of an information sharing network, in which three different parameters have been used to optimize the network topology: the activity level of organization, the similarity of information systems between different actors and the requirement for the level of information privacy generally in the organization.","PeriodicalId":341589,"journal":{"name":"The 12th International Conference on Advances in Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A model of Cyber Threat Information Sharing with the Novel Network Topology\",\"authors\":\"J. Hautamaki, T. Hamalainen\",\"doi\":\"10.1145/3468784.3468885\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The digitized environments are particularly vulnerable to various attacks. In such a situation of a security attack, detecting and responding to attacks require effective actions. One of the most significant ways to improve resilience to security attacks is to obtain accurate and timely situational aspect of the security awareness. The efficient production and utilization of situation information is achieved by sharing information with other actors in the information sharing network quickly and reliably without compromising the confidential information of one's own organization. At the same time, it should also be possible to avoid a flood of irrelevant information in the sharing network, which wastes resources and slows down the implementation of security measures. In our study, we have investigated how security-related information can be shared online as efficiently as possible by building a security information sharing topology based on the two most widely used network optimization algorithms. In the article, we present a model of an information sharing network, in which three different parameters have been used to optimize the network topology: the activity level of organization, the similarity of information systems between different actors and the requirement for the level of information privacy generally in the organization.\",\"PeriodicalId\":341589,\"journal\":{\"name\":\"The 12th International Conference on Advances in Information Technology\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-06-29\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"The 12th International Conference on Advances in Information Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3468784.3468885\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"The 12th International Conference on Advances in Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3468784.3468885","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A model of Cyber Threat Information Sharing with the Novel Network Topology
The digitized environments are particularly vulnerable to various attacks. In such a situation of a security attack, detecting and responding to attacks require effective actions. One of the most significant ways to improve resilience to security attacks is to obtain accurate and timely situational aspect of the security awareness. The efficient production and utilization of situation information is achieved by sharing information with other actors in the information sharing network quickly and reliably without compromising the confidential information of one's own organization. At the same time, it should also be possible to avoid a flood of irrelevant information in the sharing network, which wastes resources and slows down the implementation of security measures. In our study, we have investigated how security-related information can be shared online as efficiently as possible by building a security information sharing topology based on the two most widely used network optimization algorithms. In the article, we present a model of an information sharing network, in which three different parameters have been used to optimize the network topology: the activity level of organization, the similarity of information systems between different actors and the requirement for the level of information privacy generally in the organization.