Blockchain Based Information Sharing Mechanism for Cyber Threat Intelligence

Blockchain Based Information Sharing Mechanism for Cyber Threat Intelligence

In recent years, networked computers are extensively used in every aspect of our daily lives. Besides, the anonymous structure of the Internet results in an increase in the number of attacks not only for individual users but also for local area networks. Current attacks are more sophisticated, and they are developed by experienced intruders with the use of automated malware production methods. These organized intrusions can go over the defense lines of the systems due to the weakness of the detection/prevention mechanisms or carelessness of individual users. After sneaking into the system, these attacks can work until they are detected, and they can access many critical resources of the company. Earlier detection of these attacks is very trivial issue for the security admins. This can be accomplished by acquiring the signature (critical information) of the newest attacks as early as possible. One suggested solution is the use of a Threat Information Sharing system, which is set up between security firms and authorities. This approach enables the distribution of the marks of the recent (zero-day) attacks and the development of some proactive prevention mechanisms for them. The use of both peer to peer and centralized sharing mechanisms have some inherited deficiencies. Therefore, in this paper, a pure decentralized cybersecurity information sharing system is proposed with the use of blockchain technology. A controlled decision-making mechanism, authorization termination, and rule-sets maintenance are proposed to make distributed decisions within the system. For making a decision, two smart contracts should be used in the blockchain. One holds the positive votes while the other holds the negative ones. Members of the system are able to access cyber threat data by using company-related queries. The system can facilitate the integration of many data sources into cybersecurity management system. Additionally, it enables us to collect in a single repository that can be accessed for implementing real-time cybersecurity applications.

___

  • [1] Ninth Annual Cost Of Cybercrime Study, THE COST OF CYBERCRIME, https://www.accenture.com/_acnmedia/pdf-6/accenture-2019-cost-of-cybercrime-study-final.pdf, The Last Access: May 2020
  • [2] G. Karatas, O. Demir and O. K. Sahingoz, "A Deep Learning Based Intrusion Detection System on GPUs," 2019 11th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), Pitesti, Romania, 2019, pp. 1-6, doi: 10.1109/ECAI46879.2019.9042132.
  • [3] B. Reis, S. B. Kaya, O. K. Sahingoz, "A Clustering Approach for Intrusion Detection with Big Data Processing on Parallel Computing Platform", Balkan Journal of Electrical and Computer Engineering Volume 7 , Issue 3, Pages 286 - 293, 2019
  • [4] B. Reis, S. B. Kaya, G. Karatas and O. K. Sahingoz, "Intrusion Detection Systems with GPU-Accelerated Deep Neural Networks and Effect of the Depth," 2018 6th International Conference on Control Engineering & Information Technology (CEIT), Istanbul, Turkey, 2018, pp. 1-8, doi: 10.1109/CEIT.2018.8751784.
  • [5] PhishTank | Join the fight against phishing, https:// www.phishtank.com/ , The Last Access: May 2020
  • [6] IBM X-Force Exchange,https://exchange.xforce.ibmcloud .com/, The Last Access: May 2020
  • [7] AutoFocus Threat Intelligence, https://www.paloaltonetworks.com/products/secure-the-network/subscriptions/autofocus , The Last Access: May 2020
  • [8] LogRhythm Threat Lifecycle Management (TLM) Platform, https://logrhythm.com/products/threat-lifecycle-management-platform/, The Last Access: May 2020
  • [9] iSIGHT Intelligence Subscriptions, https://www.fireeye. com/products/isight-cyber-threat-intelligence-subscriptions.html, The Last Access: May 2020
  • [10] LookingGlass Cyber Solutions, https://www.lookingglasscyber.com/ , The Last Access: May 2020
  • [11] Normshield Free Cyber Threat Intelligence, https://services. normshield.com/honeypotfeed , The Last Access: June 2020
  • [12] FireHOL IP Lists | IP Blacklists | IP Blocklists | IP Reputation, http://iplists.firehol.org/, The Last Access: October 2019
  • [13] R. Koch, & M. Golling, (2018, May). The cyber decade: cyber defence at a x-ing point. In 2018 10th International Conference on Cyber Conflict (CyCon) (pp. 159-186). IEEE.
  • [14] T. R. Vance, & A. Vance (2019, October). Cybersecurity in the Blockchain Era: A Survey on Examining Critical Infrastructure Protection with Blockchain-Based Technology. In 2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T) (pp. 107-112). IEEE.
  • [15] P. J. Taylor, T. Dargahi, A. Dehghantanha, R. M. Parizi, & K. K. R. Choo, (2019). A systematic literature review of blockchain cyber security. Digital Communications and Networks.
  • [16] I. Makhdoom, I. Zhou, M. Abolhasan, J. Lipman, & W. Ni, (2020). PrivySharing: A blockchain-based framework for privacy-preserving and secure data sharing in smart cities. Computers & Security, 88, 101653.
  • [17] Meng, W., Tischhauser, E. W., Wang, Q., Wang, Y., & Han, J. (2018). When intrusion detection meets blockchain technology: a review. Ieee Access, 6, 10179-10188.
  • [18] R. Graf, & R. King, (2018, May). Neural network and blockchain based technique for cyber threat intelligence and situational awareness. In 2018 10th International Conference on Cyber Conflict (CyCon) (pp. 409-426). IEEE.
  • [19] D. Homan, I. Shiel, & C. Thorpe (2019, June). A New Network Model for Cyber Threat Intelligence Sharing using Blockchain Technology. In 2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS) (pp. 1-6). IEEE.
  • [20] Y. Wu, Y. Qiao, Y. Ye, & B. Lee (2019, October). Towards Improved Trust in Threat Intelligence Sharing using Blockchain and Trusted Computing. In 2019 Sixth International Conference on Internet of Things: Systems, Management and Security (IOTSMS) (pp. 474-481). IEEE.
  • [21] C. Killer, B. Rodrigues, & B. Stiller, (2019, May). Security Management and Visualization in a Blockchain-based Collaborative Defense. In 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC) (pp. 108-111). IEEE.
  • [22] Cybersecurity Tech Basics: Blockchain Technology Cyber Risks and Issues: Overview, https://www.steptoe.com/images/ content/1/8/v2/189187/Cybersecurity-Tech-Basics-Blockchain-Technology-Cyber-Risks-and.pdf, The Last Access: June 2020
  • [23] Feng, S., Xiong, Z., Niyato, D., Wang, P., Wang, S. S., & Zhang, Y. (2018, December). Cyber Risk Management with Risk Aware Cyber-Insurance in Blockchain Networks. In 2018 IEEE Global Communications Conference (GLOBECOM) (pp. 1-7). IEEE.
  • [24] G. Ahmadi-Assalemi, H. M. Al-Khateeb, G. Epiphaniou, J. Cosson, H. Jahankhani, & P. Pillai (2019, January). Federated blockchain-based tracking and liability attribution framework for employees and cyber-physical objects in a smart workplace. In 2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3) (pp. 1-9). IEEE.
  • [25] R. Yetis and O. K. Sahingoz, "Blockchain Based Secure Communication for IoT Devices in Smart Cities," 2019 7th International Istanbul Smart Grids and Cities Congress and Fair (ICSG), Istanbul, Turkey, 2019, pp. 134-138, doi: 10.1109/SGCF.2019.8782285.
  • [26] G. Dinc and O. K. Sahingoz, "Smart Home Security with the use of WSNs on Future Intelligent Cities," 2019 7th International Istanbul Smart Grids and Cities Congress and Fair (ICSG), Istanbul, Turkey, 2019, pp. 164-168, doi: 10.1109/SGCF.2019.8782396.
  • [27] S. Nakamoto. “Bitcoin: A peer-to-peer electronic cash system.”, 2008.
  • [28] G. Wood. “Ethereum: A secure decentralized generalized transaction ledger.”, Ethereum Project Yellow Paper, 2014.
  • [29] G. Foroglou, A. L. Tsilidou, “Further applications of the blockchain.”, In 12th Student Conference on Managerial Science and Technology, 2015.
  • [30] S. Sayeed, H. Marco-Gisbert and T. Caira, "Smart Contract: Attacks and Protections," in IEEE Access, vol. 8, pp. 24416-24427, 2020, doi: 10.1109/ACCESS.2020.2970495.
  • [31] K. Lee, J. I. James, T. G. Ejeta, H. J. Kim, “Electronic voting service using block-chain.”, The Journal of Digital Forensics,
  • Security and Law: JDFSL, 11(2), 123, 2016
  • [32] Z. Zheng, S. Xie, H. N. Dai, H. Wang, “Blockchain challenges and opportunities: A survey.”, International Journal of Web and Grid Services, 14(4), 352-375, 2018
  • [33] R. Adams, G. Parry, P. Godsiff, P. Ward. The future of money and further applications of the blockchain. Strategic Change. 2017; 26: 417– 422. https://doi.org/10.1002/jsc.2141.
  • [34] A. Kosba, A. Miller, E. Shi, Z. Wen, C. Papamanthou, “Hawk: The blockchain model of cryptography and privacy -preserving smart contracts.”, In Proceedings of IEEE Symposium on Security and Privacy (SP), pages 839–858, San Jose, CA, USA, 2016.
  • [35] B. W. Akins, J. L. Chapman, J. M. Gordon, “A whole new world: Income tax considerations of the bitcoin economy.”, 2013.
  • [36] Y. Zhang, J. Wen, “An IOT electric business model based on the protocol of bitcoin.”, In Proceedings of 18th International Conference on Intelligence in Next Generation Networks (ICIN), pages 184–191, Paris, France, 2015.
  • [37] M. Sharples, J. Domingue, “The blockchain and kudos: A distributed system for educational record, reputation and reward.”, In Proceedings of 11th European Conference on Technology Enhanced Learning (EC-TEL 2015), pages 490– 496, Lyon, France, 2015.
  • [38] C. Noyes, “Bitav: Fast anti-malware by distributed blockchain consensus and feedforward scanning.”, arXiv preprint arXiv:1601.01405, 2016.
  • [39] Z. Zheng, S. Xie, H. N. Dai, H. Wang, “Blockchain challenges and opportunities: A survey. Work Pap”, 2016.
  • [40] NRI, “Survey on blockchain technologies and related services. Technical report”, 2015