{"title":"使用质量证明共识算法的CTI区块链共享","authors":"Dimitrios Chatziamanetoglou, K. Rantos","doi":"10.1109/CSR51186.2021.9527959","DOIUrl":null,"url":null,"abstract":"The importance of Cyber Threat Intelligence (CTI) lies in its ability to be shared, consumed and actioned. For threat intelligence to be actionable, it must be shared with the right audience, at the right time and must fulfil quality standards. Without actionable and contextualised CTI, security teams will be making best guesses and assumptions instead of intelligence-based informed decisions. This paper proposes a decentralised, tamper-proof and reputation based solution for delivering vetted CTI information, using quality based CTI parameters in order to further evaluate the quality of CTI Feeds and the reputation of CTI Feed Sources.","PeriodicalId":253300,"journal":{"name":"2021 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"CTI Blockchain-Based Sharing using Proof-of-Quality Consensus Algorithm\",\"authors\":\"Dimitrios Chatziamanetoglou, K. Rantos\",\"doi\":\"10.1109/CSR51186.2021.9527959\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The importance of Cyber Threat Intelligence (CTI) lies in its ability to be shared, consumed and actioned. For threat intelligence to be actionable, it must be shared with the right audience, at the right time and must fulfil quality standards. Without actionable and contextualised CTI, security teams will be making best guesses and assumptions instead of intelligence-based informed decisions. This paper proposes a decentralised, tamper-proof and reputation based solution for delivering vetted CTI information, using quality based CTI parameters in order to further evaluate the quality of CTI Feeds and the reputation of CTI Feed Sources.\",\"PeriodicalId\":253300,\"journal\":{\"name\":\"2021 IEEE International Conference on Cyber Security and Resilience (CSR)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-07-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 IEEE International Conference on Cyber Security and Resilience (CSR)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CSR51186.2021.9527959\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE International Conference on Cyber Security and Resilience (CSR)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSR51186.2021.9527959","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
CTI Blockchain-Based Sharing using Proof-of-Quality Consensus Algorithm
The importance of Cyber Threat Intelligence (CTI) lies in its ability to be shared, consumed and actioned. For threat intelligence to be actionable, it must be shared with the right audience, at the right time and must fulfil quality standards. Without actionable and contextualised CTI, security teams will be making best guesses and assumptions instead of intelligence-based informed decisions. This paper proposes a decentralised, tamper-proof and reputation based solution for delivering vetted CTI information, using quality based CTI parameters in order to further evaluate the quality of CTI Feeds and the reputation of CTI Feed Sources.