Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2994539.2994544acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
short-paper

Private Sharing of IOCs and Sightings

Published: 24 October 2016 Publication History

Abstract

Information sharing helps to better protect computer systems against digital threats and known attacks. However, since security information is usually considered sensitive, parties are hesitant to share all their information through public channels. Instead, they only exchange this information with parties with whom they already established trust relationships. We propose the use of two complementary techniques to allow parties to share information without the need to immediately reveal private information. We consider a cryptographic approach to hide the details of an indicator of compromise so that it can be shared with other parties. These other parties are still able to detect intrusions with these cryptographic indicators. Additionally, we apply another cryptographic construction to let parties report back their number of sightings to a central party. This central party can aggregate the messages from the various parties to learn the total number of sightings for each indicator, without learning the number of sightings from each individual party.
An evaluation of our open-source proof-of-concept implementations shows that both techniques incur only little overhead, making the techniques prime candidates for practice.

References

[1]
M. Allman, E. Blanton, V. Paxson, and S. Shenker. Fighting coordinated attackers with cross-organizational information sharing. In HotNets, pages 121--126, 2006.
[2]
B. Applebaum, H. Ringberg, M.,J. Freedman, M. Caesar, and J. Rexford. Collaborative, privacy-preserving data aggregation at scale. In M.,J. Atallah and N.,J. Hopper, editors, PETS, pages 56--74. Springer, 2010.
[3]
M. Bellare, A. Desai, E. Jokipii, and P. Rogaway. A concrete security treatment of symmetric encryption. In FOCS, pages 394--403. IEEE, Oct. 1997.
[4]
M. Burkhart, M. Strasser, D. Many, and X. Dimitropoulos. SEPIA: Privacy-preserving aggregation of multi-domain network events and statistics. In USENIX Security, 2010.
[5]
C. Clifton, M. Kantarcioglu, J. Vaidya, X. Lin, and M.,Y. Zhu. Tools for privacy preserving distributed data mining. SIGKDD Explorations Newsletter, 4(2):28--34, Dec. 2002.
[6]
J. Freudiger, E. De Cristofaro, and A. Brito. Privacy-friendly collaboration for cyber threat mitigation. Tech. rep. Nov. 2014. \hrefhttp://arxiv.org/abs/1403.2123arXiv:1403.2123 {cs.CR}.
[7]
P. Gross, J. Parekh, and G. Kaiser. Secure "selecticast" for collaborative intrusion detection systems. In DEBS, pages 50--55, 2004.
[8]
P. Lincoln, P. Porras, and V. Shmatikov. Privacy-preserving sharing and correction of security alerts. In M. Blaze, editor, USENIX Security, pages 239--254, 2004.
[9]
V. Paxson. Bro: A system for detecting network intruders in real-time. In A.,D. Rubin, editor, USENIX Security, 1998.
[10]
J. Sherry, C. Lan, R.,A. Popa, and S. Ratnasamy. BlindBox: Deep packet inspection over encrypted traffic. In SIGCOMM, pages 213--226. ACM, 2015.
[11]
E. Shi, T.,H. Chan, E.,G. Rieffel, R. Chow, and D. Song. Privacy-preserving aggregation of time-series data. In NDSS. The Internet Society, 2011.

Cited By

View all
  • (2023)Referenzarchitektur Cybersicherheit im Föderalsystem DeutschlandsReference Architecture Cybersecurity in the Federal System of GermanyHMD Praxis der Wirtschaftsinformatik10.1365/s40702-023-01014-761:4(1042-1058)Online publication date: 10-Nov-2023
  • (2023)Privacy-preserving correlation of cross-organizational cyber threat intelligence with private graph intersectionsComputers and Security10.1016/j.cose.2023.103505135:COnline publication date: 1-Dec-2023
  • (2023)Security Issues in Cyber Threat Intelligence Exchange: A ReviewIntelligent Computing10.1007/978-3-031-37963-5_89(1308-1319)Online publication date: 20-Aug-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
WISCS '16: Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security
October 2016
88 pages
ISBN:9781450345651
DOI:10.1145/2994539
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 24 October 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. cryptography
  2. evaluation
  3. private information sharing

Qualifiers

  • Short-paper

Conference

CCS'16
Sponsor:

Acceptance Rates

WISCS '16 Paper Acceptance Rate 8 of 24 submissions, 33%;
Overall Acceptance Rate 23 of 58 submissions, 40%

Upcoming Conference

CCS '24
ACM SIGSAC Conference on Computer and Communications Security
October 14 - 18, 2024
Salt Lake City , UT , USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)13
  • Downloads (Last 6 weeks)0
Reflects downloads up to 01 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Referenzarchitektur Cybersicherheit im Föderalsystem DeutschlandsReference Architecture Cybersecurity in the Federal System of GermanyHMD Praxis der Wirtschaftsinformatik10.1365/s40702-023-01014-761:4(1042-1058)Online publication date: 10-Nov-2023
  • (2023)Privacy-preserving correlation of cross-organizational cyber threat intelligence with private graph intersectionsComputers and Security10.1016/j.cose.2023.103505135:COnline publication date: 1-Dec-2023
  • (2023)Security Issues in Cyber Threat Intelligence Exchange: A ReviewIntelligent Computing10.1007/978-3-031-37963-5_89(1308-1319)Online publication date: 20-Aug-2023
  • (2022)Privacy-Preserving Polyglot Sharing and Analysis of Confidential Cyber Threat IntelligenceProceedings of the 17th International Conference on Availability, Reliability and Security10.1145/3538969.3538982(1-11)Online publication date: 23-Aug-2022
  • (2022)Overcoming information-sharing challenges in cyber defence exercisesJournal of Cybersecurity10.1093/cybsec/tyac0018:1Online publication date: 28-Jan-2022
  • (2020)The Creation of Network Intrusion Fingerprints by Graph HomomorphismWSEAS TRANSACTIONS ON INFORMATION SCIENCE AND APPLICATIONS10.37394/23209.2020.17.1517Online publication date: 7-Aug-2020
  • (2020)Distributed Security Framework for Reliable Threat Intelligence SharingSecurity and Communication Networks10.1155/2020/88337652020Online publication date: 1-Jan-2020
  • (2020)privy: Privacy Preserving Collaboration Across Multiple Service Providers to Combat Telecom SpamsIEEE Transactions on Emerging Topics in Computing10.1109/TETC.2017.27712518:2(313-327)Online publication date: 1-Apr-2020
  • (2020)TATIS: Trustworthy APIs for Threat Intelligence Sharing with UMA and CP-ABEFoundations and Practice of Security10.1007/978-3-030-45371-8_11(172-188)Online publication date: 17-Apr-2020
  • (2018)A Systems Approach to Indicators of Compromise Utilizing Graph Theory2018 IEEE International Symposium on Technologies for Homeland Security (HST)10.1109/THS.2018.8574187(1-6)Online publication date: Oct-2018
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media