A Blockchain-Based Incentive Mechanism for Sharing Cyber Threat Intelligence
-
Published:2023-05-29
Issue:11
Volume:12
Page:2454
-
ISSN:2079-9292
-
Container-title:Electronics
-
language:en
-
Short-container-title:Electronics
Author:
Ma Xingbang1, Yu Dongsheng2, Du Yanhui1, Li Lanting1, Ni Wenkai1, Lv Haibin1
Affiliation:
1. School of Information Network Security, People’s Public Security University of China, Beijing 100038, China 2. MPS Information Classified Security Protection Evaluation Center, Beijing 100142, China
Abstract
With the development of the Internet, cyberattacks are becoming increasingly complex, sustained, and organized. Cyber threat intelligence sharing is one of the effective ways to alleviate the pressure on organizational or individual cyber security defense. However, the current cyber threat intelligence sharing lacks effective incentive mechanisms, resulting in mutual distrust and a lack of motivation to share among sharing members, making the security of sharing questionable. In this paper, we propose a blockchain-based cyber threat intelligence sharing mechanism (B-CTISM) to address the problems of free riding and lack of trust among sharing members faced in cyber threat intelligence sharing. We use evolutionary game theory to analyze the incentive strategy; the resulting evolutionarily stable strategy achieves the effect of promoting sharing and effectively curbing free-riding behavior. Then, the incentive strategy is deployed to smart contracts running in the trusted environment of blockchain, whose decentralization and tamper-evident properties can provide a trusted environment for participating members and establish trust without a third-party central institution to achieve secure and efficient cyber threat intelligence sharing. Finally, the effectiveness of the B-CTISM in facilitating and regulating threat intelligence sharing is verified through experimental simulation and comparative analysis.
Funder
National Engineering Research Center of Classified Protection and Safeguard Technology for Cybersecurity
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Signal Processing,Control and Systems Engineering
Reference32 articles.
1. van Haastrecht, M., Golpur, G., Tzismadia, G., Kab, R., Priboi, C., David, D., Racataian, A., Baumgartner, L., Fricker, S., and Ruiz, J.F. (2022). A Shared Cyber Threat Intelligence Solution for SMEs (vol 10, 2913, 2021). Electronics, 11. 2. Cha, J., Singh, S.K., Pan, Y., and Park, J.H. (2020). Blockchain-based cyber threat intelligence system architecture for sustainable computing. Sustainability, 12. 3. Brown, R., and Lee, R.M. (2021, July 12). The Evolution of Cyber Threat Intelligence (cti): 2019 Sans Cti Survey. SANS Institute. Available online: https://www.sans.org/white-papers/38790/. 4. Cybersecurity threat intelligence knowledge exchange based on blockchain: Proposal of a new incentive model based on blockchain and Smart contracts to foster the cyber threat and risk intelligence exchange of information;Riesco;Telecommun. Syst.,2020 5. Lin, S., Yin, J., Pei, Q., Wang, L., and Wang, Z. (2021, January 13–15). A Nested Incentive Scheme for Distributed File Sharing Systems. Proceedings of the 2021 IEEE International Conference on Smart Internet of Things (SmartIoT), Jeju, Republic of Korea.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
|
|