Cyber-Threat Information-Sharing Standards: A Review of Evaluation Literature

Authors

DOI:

https://doi.org/10.23962/10539/29191

Keywords:

cybersecurity, cyber-threats, information-sharing, standards, protocols, harmonisation, computer security incident response teams (CSIRTs), ontologies, use cases, semantic elements, syntactic elements, privacy, information security

Abstract

Cyber-threat information-sharing tools, through which cybersecurity teams share threat information, are essential to combatting today's increasingly frequent and sophisticated cyber-attacks. Several cyber-threat information-sharing standards exist, but there is at present no single standard or set of standards widely adopted by organisations and by computer security incident response teams (CSIRTs) operating at organisational, sectoral, national, and international levels. This introduces an interoperability problem in respect of communication across the various organisations and CSIRTs. Harmonised adoption of threat information-sharing standards would be of great benefit to cybersecurity efforts. In an effort to support harmonised use of cyber-threat information-sharing standards, this article provides findings from a review of the extant literature on such standards.

References

Albakri, A., Boiten, E., & De Lemos, R. (2018). Risks of sharing cyber incident information. In Proceedings of the 13th International Conference on Availability, Reliability and Security (pp. 1–10). Association for Computing Machinery (ACM). https://doi.org/10.1145/3230833.3233284 DOI: https://doi.org/10.1145/3230833.3233284

Asgarli, E., & Burger, E. (2016). Semantic ontologies for cyber threat sharing standards. In 2016 IEEE Symposium on Technologies for Homeland Security (HST) (pp. 1–6). Institute of Electrical and Electronics Engineers (IEEE). https://doi.org/10.1109/ths.2016.7568896 DOI: https://doi.org/10.1109/THS.2016.7568896

Burger, E. W., Goodman, M. D., Kampanakis, P., & Zhu, K. A. (2014). Taxonomy model for cyber threat intelligence information exchange technologies. In Proceedings of the 2014 ACM Workshop on Information Sharing C Collaborative Security (pp. 51–60). Association for Computing Machinery (ACM). https://doi.org/10.1145/2663876.2663883 DOI: https://doi.org/10.1145/2663876.2663883

Fenz, S., Ekelhart, A., & Weippl, E. (2008). Semantic potential of existing security advisory standards. In Proceedings of the FIRST 2008 Conference-Forum of Incident Response and Security Teams. https://doi.org/10.1109/aina.2008.69 DOI: https://doi.org/10.1109/AINA.2008.69

Johnson, C., Badger, L., Waltermire, D., Snyder, J., & Skorupka, C. (2016). Guide to cyber threat information sharing. NIST Special Publication 800-150. https://doi.org/10.6028/nist.sp.800-150 DOI: https://doi.org/10.6028/NIST.SP.800-150

Kampanakis, P. (2014). Security automation and threat information-sharing options. IEEE Security C Privacy, 12(5), 42–51. https://doi.org/10.1109/msp.2014.99 DOI: https://doi.org/10.1109/MSP.2014.99

Mavroeidis, V., & Bromander, S. (2017). Cyber threat intelligence model: An evaluation of taxonomies, sharing standards, and ontologies within cyber threat intelligence. In Intelligence and Security Informatics Conference (EISIC), 2017 European (pp. 91–98). Institute of Electrical and Electronics Engineers (IEEE). https://doi.org/10.1109/eisic.2017.20 DOI: https://doi.org/10.1109/EISIC.2017.20

Menges,F.,& Pernul,G.(2018).A comparative analysis of incident reporting formats.Computers C Security, 73(March), 87–101. https://doi.org/10.1016/j.cose.2017.10.009 Mohaisen,A.,Al-Ibrahim, O., Kamhoua, C., Kwiat, K., & Njilla, L. (2017, October). Rethinking information sharing for threat intelligence. In Proceedings of the Fifth ACM/IEEE Workshop on Hot Topics in Web Systems and Technologies (pp. 1–7). Association for Computing Machinery (ACM). https://doi.org/10.1145/3132465.3132468 DOI: https://doi.org/10.1145/3132465.3132468

NIST. (2013). Improving Critical Infrastructure Cybersecurity Executive Order 13636: Preliminary Cybersecurity Framework. https://doi.org/10.1002/9781119369141.app3 DOI: https://doi.org/10.1002/9781119369141.app3

Rantos, K., Spyros, A., Papanikolaou, A., Kritsas, A., Ilioudis, C., & Katos, V. (2020). Interoperability challenges in the cybersecurity information sharing ecosystem. Computers, 9(1), 18. https://doi.org/10.3390/computers9010018 DOI: https://doi.org/10.3390/computers9010018

Steinberger, J., Sperotto, A., Golling, M., & Baier, H. (2015). How to exchange security events? Overview and evaluation of formats and protocols. In Integrated Network Management (IM), 2015 IFIP/IEEE International Symposium on Integrated Network Management (pp. 261–269). Institute of Electrical and Electronics Engineers (IEEE). https://doi.org/10.1109/inm.2015.7140300 DOI: https://doi.org/10.1109/INM.2015.7140300

Downloads

Published

30-06-2020

Issue

Section

Research Articles

How to Cite

Mkuzangwe, N.N.P. and Khan, Z.C. (2020) “Cyber-Threat Information-Sharing Standards: A Review of Evaluation Literature”, The African Journal of Information and Communication (AJIC) [Preprint], (25). doi:10.23962/10539/29191.
Views
  • Abstract 489
  • pdf 262