The aim of this research is to propose a new blockchain network model that facilitates the secure dissemination of Cyber Threat Intelligence (CTI) data. The primary motivations for this study are based around the recent changes to information security legislation in the European Union and the challenges that Computer Security and Incident Response Teams (CSIRT) face when trying to share actionable and highly sensitive data within systems where participants do not always share the same interests or motivations. We discuss the common problems within the domain of CTI sharing and we propose a new model, that leverages the security properties of blockchain. Our model provides a more effective and efficient framework for a CTI sharing network th...
Cyber threat intelligence sharing has become a focal point for many organizations to improve resilie...
Blockchain Technology is defined as a decentralized system of distributed registers that are used to...
Blockchain technology has attracted appreciable attention as a result of its big selection of possib...
Cyber Threat Intelligence (CTI) is the knowledge of cyber and physical threats that help mitigate po...
Cyber Threat Intelligence (CTI) sharing has become a significant issue with the increasing number of...
The emergence of the Internet of Things (IoT) technology has caused a powerful transition in the cyb...
Industrial Control Systems (ICS) have been targeted increasingly by sophisticated cyberattacks. Impr...
Although cyber threat intelligence (CTI) exchange is a theoretically useful technique for improving ...
Funding Information: This work was funded by the EU H2020 PHOENIX project, Contract no. 832989. Publ...
Historically, threat information sharing has relied on manual modelling and centralised network syst...
We designed and developed a novel application that applies blockchain technology in cybersecurity. T...
Security for businesses and organizations is essential to protect operational activities, trust rela...
Blockchain has been widely known thanks to Bitcoin and the cryptocurrencies. In this chapter, we ana...
Blockchain is a decentralised ledger used to secure digital currency, perform deals and transactions...
Cyber Threat Intelligence (CTI) sharing has become a novel weapon in the arsenal of cyber defenders ...
Cyber threat intelligence sharing has become a focal point for many organizations to improve resilie...
Blockchain Technology is defined as a decentralized system of distributed registers that are used to...
Blockchain technology has attracted appreciable attention as a result of its big selection of possib...
Cyber Threat Intelligence (CTI) is the knowledge of cyber and physical threats that help mitigate po...
Cyber Threat Intelligence (CTI) sharing has become a significant issue with the increasing number of...
The emergence of the Internet of Things (IoT) technology has caused a powerful transition in the cyb...
Industrial Control Systems (ICS) have been targeted increasingly by sophisticated cyberattacks. Impr...
Although cyber threat intelligence (CTI) exchange is a theoretically useful technique for improving ...
Funding Information: This work was funded by the EU H2020 PHOENIX project, Contract no. 832989. Publ...
Historically, threat information sharing has relied on manual modelling and centralised network syst...
We designed and developed a novel application that applies blockchain technology in cybersecurity. T...
Security for businesses and organizations is essential to protect operational activities, trust rela...
Blockchain has been widely known thanks to Bitcoin and the cryptocurrencies. In this chapter, we ana...
Blockchain is a decentralised ledger used to secure digital currency, perform deals and transactions...
Cyber Threat Intelligence (CTI) sharing has become a novel weapon in the arsenal of cyber defenders ...
Cyber threat intelligence sharing has become a focal point for many organizations to improve resilie...
Blockchain Technology is defined as a decentralized system of distributed registers that are used to...
Blockchain technology has attracted appreciable attention as a result of its big selection of possib...