Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2808128.2808134acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
short-paper

Anonymity vs. Trust in Cyber-Security Collaboration

Published: 12 October 2015 Publication History

Abstract

With the growing threat from overseas and domestic cyber attacks inter-organization cyber-security information sharing is an essential contributor to helping governments and industry to protect and defend their critical network infrastructure from attack. Encouraging collaboration directly impacts the defensive capabilities of all organizations involved in any cyber-information sharing community. A barrier to successful collaboration is the conflicting needs of collaborators to be able to both protect the source of their information for sensitivity, legal, or public relations reasons, but also to validate and trust the information shared with them. This paper uses as an example the UK government's Cyber-Security Information Sharing Partnership (CiSP), an online collaboration environment created by Surevine for sharing and collaborating on cyber-security information across UK industry and government. We discuss the organization and operating principles of the collaboration environment, how the community is structured, and the barriers to participation caused by the conflict between the need for anonymity versus the need to trust the information shared.

References

[1]
Kuchler, H. 2014. Cisco warns of 'unprecedented growth' in cyber attacks. FT.com http://on.ft.com/LiQyVD
[2]
US-CERT Traffic Light Protocol (TLP): https://www.us-cert.gov/tlp
[3]
CiSP terms and conditions: https://www.cert.gov.uk/wp-content/uploads/2014/08/UK-CISP-Terms-and-Conditions-v2.0-dated-1-August-2013.pdf
[4]
The Chatham House Rule: http://www.chathamhouse.org/about/chatham-house-rule
[5]
Nonaka, I., and Konno, N. The concept of "Ba": building a foundation for knowledge creation. California Management Review; Spring 98; Vol. 40 Issue 3, p 40.
[6]
Krishnamurthy, S. On the intrinsic and extrinsic motivation of free/libre/open source (FLOSS) developers. Knowledge, Technology & Policy, Winter 2006, Vol. 18 No. 4, pp. 17--39.

Cited By

View all
  • (2024)Sharing Is Caring: Hurdles and Prospects of Open, Crowd-Sourced Cyber Threat IntelligenceIEEE Transactions on Engineering Management10.1109/TEM.2023.3279274(1-20)Online publication date: 2024
  • (2024)Using Situational Crime Prevention (SCP)-C3 cycle and common inventory of cybersecurity controls from ISO/IEC 27002:2022 to prevent cybercrimesJournal of Cybersecurity10.1093/cybsec/tyae02010:1Online publication date: 19-Nov-2024
  • (2024)Social botnets and the challenges of cyber situation awarenessAI and Ethics10.1007/s43681-024-00530-6Online publication date: 14-Aug-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
WISCS '15: Proceedings of the 2nd ACM Workshop on Information Sharing and Collaborative Security
October 2015
84 pages
ISBN:9781450338226
DOI:10.1145/2808128
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 12 October 2015

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. collaboration
  2. cyber-security
  3. government
  4. privacy
  5. trust

Qualifiers

  • Short-paper

Conference

CCS'15
Sponsor:

Acceptance Rates

WISCS '15 Paper Acceptance Rate 6 of 16 submissions, 38%;
Overall Acceptance Rate 23 of 58 submissions, 40%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)70
  • Downloads (Last 6 weeks)6
Reflects downloads up to 23 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Sharing Is Caring: Hurdles and Prospects of Open, Crowd-Sourced Cyber Threat IntelligenceIEEE Transactions on Engineering Management10.1109/TEM.2023.3279274(1-20)Online publication date: 2024
  • (2024)Using Situational Crime Prevention (SCP)-C3 cycle and common inventory of cybersecurity controls from ISO/IEC 27002:2022 to prevent cybercrimesJournal of Cybersecurity10.1093/cybsec/tyae02010:1Online publication date: 19-Nov-2024
  • (2024)Social botnets and the challenges of cyber situation awarenessAI and Ethics10.1007/s43681-024-00530-6Online publication date: 14-Aug-2024
  • (2023)Counterattacking Cyber Threats: A Framework for the Future of CybersecuritySustainability10.3390/su15181336915:18(13369)Online publication date: 6-Sep-2023
  • (2023)Building Collaborative Cybersecurity for Critical Infrastructure Protection: Empirical Evidence of Collective Intelligence Information Sharing Dynamics on ThreatFoxCritical Information Infrastructures Security10.1007/978-3-031-35190-7_10(140-157)Online publication date: 8-Jun-2023
  • (2023)Next Generation ISACs: Simulating Crowdsourced Intelligence for Faster Incident ResponseCyberdefense10.1007/978-3-031-30191-9_4(49-66)Online publication date: 20-Sep-2023
  • (2022)Threat Intelligence Quality Dimensions for Research and PracticeDigital Threats: Research and Practice10.1145/34842023:4(1-22)Online publication date: 10-Mar-2022
  • (2022)Overcoming information-sharing challenges in cyber defence exercisesJournal of Cybersecurity10.1093/cybsec/tyac0018:1Online publication date: 28-Jan-2022
  • (2022)Challenges and Opportunities of Blockchain for Cyber Threat Intelligence SharingSecure and Trusted Cyber Physical Systems10.1007/978-3-031-08270-2_1(1-24)Online publication date: 3-Sep-2022
  • (2021)From Threat Data to Actionable Intelligence: An Exploratory Analysis of the Intelligence Cycle Implementation in Cyber Threat Intelligence Sharing PlatformsProceedings of the 16th International Conference on Availability, Reliability and Security10.1145/3465481.3470048(1-9)Online publication date: 17-Aug-2021
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media