Blockchain-Based Cyber Threat Intelligence System Architecture for Sustainable Computing
Abstract
:1. Introduction
- We identify data collection issues and requirements that may arise during the data collection process for sharing threat information.
- We propose a blockchain-based cyber threat intelligence system architecture to address the limitations in the legacy system. The proposed model can obtain data in real-world scenarios from the information consumer perspective.
- We conduct a comparative analysis of the proposed model with the existing system based on the requirements of the data collection process.
- To assess the effectiveness of the proposed model, we perform the experimental analysis taking into account various measures. Experimental results show that the proposed model saves about 15% of storage space compared to total network resources in a limited test environment.
2. Related Works
2.1. Cyber Threat Intelligence
2.2. Requirements of Data Collection in CTI
2.3. Existing Research
3. Proposed Blockchain-Based CTI System Architecture
3.1. Design Overview
3.2. The Methodological Flow of the Proposed Architecture
3.3. Service Scenario
4. Analysis and Discussion
4.1. Comparative Analysis
- Reliability: There are two kinds of reliability of data handled in related studies. There are two methods, (1) verifying the data provided by a trusted organization, and (2) verifying the reliability of data itself. The problem in the first case is that the reliability of the institution is relatively judged. If logical reliability is assured, then the information the organization distributes will be trusted. However, a relatively reliable institution can be interpreted to mean that it can be manipulated at any time. Therefore, direct verification of the data is needed rather than the reliability of the institution. In this paper, it is possible to verify the data itself because distributed feeds judge reliability by using only information about data transmitted through cooperation.
- Privacy: The privacy issue is that data collected inside the organization is not leaked to the outside. This may be the leakage of data about internal users, or to prevent damage to the organization by exposing the organization’s resources collected outside. Therefore, basically, the collected data is stored and managed only in the organization so that the information inside the organization is not leaked to the outside by using a Hash Function that verifies the data and increases the organization’s contribution, but does not restore the original data. Even if CS does not leak information to other competitive feeds and CS leaks data through cyber-attacks, CS information alone does not risk leaking information inside the organization.
- Scalability: In the CTI concept, file hashes are used as direct evidence of an attacker’s attack behavior and are very important information. Similarly, indicator information for identifying an attacker can be obtained through network information such as an IP address. However, the attacker’s indicator can be modified in various ways. For example, IP tampering with IP spoofing can recognize an attacker as if it were a normal user. For this reason, using an IP address with other information rather than using it as independent information can improve identification. The indicator mentioned in this paper uses the only IP address, but the Indicator Table of CS can be flexibly changed by adding various identification elements such as Domain, URL, and Network Artifacts in packet information collected by feed.
- Sustainability: For efficient resource management of any organization feeds, there are various requirements such as collective actions, smart allocation, and analytic opportunities with relevant data sources. So, the proposed architecture provides a sustainable environment and optimizes data at the cloud layer with improved sustainability performance in the network. Both cloud server and data feed node are used in the blockchain network and have different functionalities for providing sustainable infrastructure with smart allocation using collective actions properly. Comparison between existing research studied with proposed architecture is shown in Table 3.
4.2. Experimental Evaluation
- Create a reliable data set through the cooperation of feeds that provide data.
- Efficient resource management is available in a vast network environment.
- According to CS policy, feeds participating in cooperation can be rewarded by measuring contribution.
4.3. Discussion
5. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- Tounsi, W.; Helmi, R. A survey on technical threat intelligence in the age of sophisticated cyber attacks. Comput. Secur. 2018, 72, 212–233. [Google Scholar] [CrossRef]
- Shin, B.; Lowry, P.B. A review and theoretical explanation of the ‘Cyberthreat-Intelligence (CTI) capability’that needs to be fostered in information security practitioners and how this can be accomplished. Comput. Secur. 2020, 92, 101761. [Google Scholar] [CrossRef]
- Brown, R.; Robert, M.L. The Evolution of Cyber Threat Intelligence (CTI): 2019 SANS CTI Survey; SANS Institute: Singapore, 2019. [Google Scholar]
- Barnum, S. Standardizing cyber threat intelligence information with the Structured Threat Information eXpression (STIX). Mitre Corp. 2012, 11, 1–22. [Google Scholar]
- Casey, E.; Back, G.; Barnum, S. Leveraging CybOX™ to standardize representation and exchange of digital forensic information. Digit. Investig. 2015, 12, S102–S110. [Google Scholar] [CrossRef] [Green Version]
- Connolly, J. Davidson, M.Schmidt, C., Ed.; The Trusted Automated Exchange of Indicator Information (Taxii)The MITRE Corporation: Bedford, MA, USA; McLean, VA, USA, 2014; pp. 1–20.
- Skopik, F.; Settanni, G.; Fiedler, R. A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing. Comput. Secur. 2016, 60, 154–176. [Google Scholar] [CrossRef]
- Schaberreiter, T.; Kupfersberger, V.; Rantos, K.; Spyros, A.; Papanikolaou, A.; Ilioudis, C.A.; Quirchmayr, G. A quantitative evaluation of trust in the quality of cyber threat intelligence sources. In Proceedings of the 14th International Conference on Availability, Reliability and Security, Canterbury, UK, 26–29 August 2019. [Google Scholar]
- Wagner, T.D.; Mahbub, K.; Palomar, E.; Abdallah, A.E. Cyber threat intelligence sharing: Survey and research directions. Comput. Secur. 2019, 87, 101589. [Google Scholar] [CrossRef]
- Liu, M.; He, X.; Chen, J. Cyberthreat-intelligence information sharing: Enhancing collaborative security. IEEE Consum. Electron. Mag. 2019, 8, 17–22. [Google Scholar] [CrossRef]
- Khan, T.; Alan, M.; Akhunzada, A.; Hur, A.; Asif, M.; Khan, M.K. Towards augmented proactive cyberthreat intelligence. J. Parallel Distrib. Comput. 2019, 124, 47–59. [Google Scholar] [CrossRef]
- Griffioen, H.; Tim, M.B.; Christian, D. Quality Evaluation of Cyber Threat Intelligence Feeds. In Proceedings of the 19th International Conference on Applied Cryptography and Network Security, Kanagawa, Japan, 21–24 June 2021. [Google Scholar]
- Afzaliseresht, N.; Miao, Y.; Michalska, S.; Liu, Q.; Wang, H. From logs to Stories: Human-Centred Data Mining for Cyber Threat Intelligence. IEEE Access 2020, 8, 19089–19099. [Google Scholar] [CrossRef]
- Serckumecka, A.; Medeiros, I.; Bernardo, F. A Cost-Effective Cloud Event Archival for SIEMs. In Proceedings of the 38th International Symposium on Reliable Distributed Systems Workshops (SRDSW), Lyon, France, 1–4 October 2019. [Google Scholar]
- Sookhak, M.; Tang, H.; He, Y.; Yu, F.R. Security and privacy of smart cities: A survey, research issues and challenges. IEEE Commun. Surv. Tutor. 2018, 21, 1718–1743. [Google Scholar] [CrossRef]
- Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System. 2008. Available online: https://bitcoin.org/bitcoin.pdf (accessed on 20 April 2020).
- Groš, S. Research Directions in Cyber Threat Intelligence. arXiv 2020, arXiv:2001.06616. [Google Scholar]
- Gong, S.; Cho, J.; Lee, C. A Reliability Comparison Method for OSINT Validity Analysis. IEEE Trans. Ind. Inform. 2018, 14, 5428–5435. [Google Scholar] [CrossRef]
- Almukaynizi, M.; Grimm, A.; Nunes, E.; Shakarian, J.; Shakarian, P. Predicting cyber threats through the dynamics of user connectivity in darkweb and deepweb forums. ACM Comput. Soc. Sci. 2017. Available online: https://usc-isi-i2.github.io/papers/kristina02.pdf (accessed on 4 August 2020).
- Cinque, M.; Cotroneo, D.; Pecchia, A. Challenges and directions in security information and event management (SIEM). In Proceedings of the 2018 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), Memphis, TN, USA, 15–18 October 2018. [Google Scholar]
- Mokalled, H.; Catelli, R.; Casola, V.; Debertol, D.; Meda, E.; Zunino, R. The Applicability of a SIEM Solution: Requirements and Evaluation. In Proceedings of the IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), Napoli, Italy, 12–14 June 2019. [Google Scholar]
- Meier, R.; Scherrer, C.; Gugelmann, D.; Lenders, V.; Vanbever, L. FeedRank: A tamper-resistant method for the ranking of cyber threat intelligence feeds. In Proceedings of the 10th International Conference on Cyber Conflict (CyCon), Tallinn, Estonia, 29 May–1 June 2018. [Google Scholar]
- Le, B.; Wang, G.; Nasim, M.; Babar, A. Gathering Cyber Threat Intelligence from Twitter Using Novelty Classification. In Proceedings of the International Conference on Cyberworlds (CW), Kyoto, Japan, 2–4 October 2019. [Google Scholar]
- Koloveas, P.; Chantzios, T.; Tryfonopoulos, C.; Skiadopoulos, S. A crawler architecture for harvesting the clear, social, and dark web for IoT-related cyber-threat intelligence. In Proceedings of the 2019 IEEE World Congress on Services (SERVICES), Milan, Italy, 8–13 July 2019; Volume 2642. [Google Scholar]
- Wagner, C.; Dulaunoy, A.; Wagener, G.; Iklody, A. Misp: The design and implementation of a collaborative threat intelligence sharing platform. In Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security, Vienna, Austria, 24 October 2016. [Google Scholar]
- Seigneur, J.; Seigneur, J.-M.; Slagell, A. Collaborative Computer Security and Trust Management; Adam, S., Ed.; Information Science Reference: UK, 2010. [Google Scholar]
- Homan, D.; Shiel, I.; Thorpe, C. A New Network Model for Cyber Threat Intelligence Sharing using Blockchain Technology. In Proceedings of the 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Canary Islands, Spain, 24–26 June 2019. [Google Scholar]
- Zhou, D.; Yan, Z.; Fu, Y.; Yao, Z. A survey on network data collection. J. Netw. Comput. Appl. 2018, 116, 9–23. [Google Scholar] [CrossRef]
- Lin, H.; Yan, Z.; Chen, Y.; Zhang, L. A Survey on Network Security-Related Data Collection Technologies. IEEE 2018, 6, 18345–18365. [Google Scholar] [CrossRef]
- Sharma, P.K.; Moon, S.Y.; Park, J.H. Block-VN: A distributed Blockchain based vehicular network architecture in smart city. J. Inf. Process. Syst. 2017, 13, 184–195. [Google Scholar] [CrossRef]
- Park, J.; Park, J.H.; Salim, M.M.; Jo, J.H.; Sicato, J.C.S.; Rathore, S.; Park, J.H. CIoT-Net: A scalable cognitive IoT based smart city network architecture. Hum.-Cent. Comput. Inf. Sci. 2019, 9, 29. [Google Scholar]
- Singh, S.K.; Rathore, S.; Park, J.H. BlockIoTIntelligence: A Blockchain-enabled Intelligent IoT Architecture with Artificial Intelligence. Future Gener. Comput. Syst. 2019. [Google Scholar] [CrossRef]
- Lee, Y.; Rathore, S.; Park, J.H.; Park, J.H. A blockchain-based smart home gateway architecture for preventing data forgery. Hum.-Cent. Comput. Inf. Sci. 2020, 10, 1–14. [Google Scholar] [CrossRef]
- Yin, C.; Zhou, B.; Yin, Z.; Wang, J. Local privacy protection classification based on human-centric computing. Hum.-Cent. Comput. Inf. Sci. 2019, 9, 33. [Google Scholar] [CrossRef]
- Zhang, J.; Zhong, S.; Wang, T.; Chao, H.C.; Wang, J. Blockchain-based systems and applications: A survey. J. Internet Technol. 2020, 21, 1–14. [Google Scholar]
- Gu, K.; Yang, L.; Yin, B. Location Data Record Privacy Protection based on Differential Privacy Mechanism. Inf. Technol. Control 2018, 47, 639–654. [Google Scholar] [CrossRef] [Green Version]
- Singh, S.K.; Jeong, Y.S.; Park, J.H. A deep learning-based IoT-oriented infrastructure for secure smart City. Sustain. Cities Soc. 2020, 60, 10225. [Google Scholar] [CrossRef]
- Singh, S.K.; Rastogi, N. Role of Cyber Cell to Handle Cyber Crime within the Public and Private Sector: An Indian Case Study. In Proceedings of the 2018 3rd International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU), Bhimtal, India, 23–24 February 2018; pp. 1–6. [Google Scholar]
- Yin, C.; Ding, S.; Wang, J. Mobile marketing recommendation method based on user location feedback. Hum.-Cent. Comput. Inf. Sci. 2019, 9, 14. [Google Scholar] [CrossRef] [Green Version]
- Liu, M.; Cheng, L.; Qian, K.; Wang, J.; Wang, J.; Liu, Y. Indoor acoustic localization: A survey. Hum.-Cent. Comput. Inf. Sci. 2020, 10, 2. [Google Scholar] [CrossRef]
- Wang, J.; Gu, X.; Liu, W.; Sangaiah, A.K.; Kim, H.J. An empower hamilton loop based data collection algorithm with mobile agent for WSNs. Hum.-Cent. Comput. Inf. Sci. 2019, 9, 1–14. [Google Scholar] [CrossRef]
- Li, T.M.; Chao, H.C.; Zhang, J. Emotion classification based on brain wave: A survey. Hum.-Cent. Comput. Inf. Sci. 2019, 9, 42. [Google Scholar] [CrossRef] [Green Version]
Symbol | Explanation |
---|---|
The specific i-th data | |
Maximum value of File Hash Table Cumulation | |
Maximum value of Indicator Table Cumulation | |
Indicator Data | |
File hash Data | |
The specific i-th Feed |
Block Num | 13 | Block Hash | bc1abd0b888e6636aad892451 |
---|---|---|---|
Previous Hash | 382bc3dce38f86d52c34af93… | Timestamp | Mon 01 06 2019 16:34:52 (KST) |
Data Num | 500 | Feed Num | 78 |
Data | No:1/Feed:7/01e0d128e0651e5e512103dea55690409edc4942210f946bceccc61… | ||
No:2/Feed:52/92e7202e4703a048acf3ddebe66c3d8a49fcc9af5c52a24bf1dca6… |
Research | Reliability | Privacy | Scalability | Sustainability |
---|---|---|---|---|
Open source intelligence (OSINT) Method [18] | It ensures reliability in an open source-based data collection stage and verifies the feed organization’s trustworthiness and the trustworthiness of the shared data itself. | It is not a matter of leaking personal information or violating information resources between feeds with this method. | This study has a high dependency on the data collected by the feed to obtain the data’s reliability. | This method didn’t use sustainable environment |
Feed Rank Method [22] | It evaluates the credibility of the organization by evaluating and ranking the reliability of feed organizations, but did not secure the reliability of data. | This study does not cover privacy issues within the feed organization because it only uses information from feeds. | The relative comparison is made based on the feeds’ data, so it can flexibly cope with the necessary change in different information. | It is use-only feed rank, not sustainability. |
Gathering CTI Method from Twitter [23] | This method collects CTI data using Common Vulnerabilities and Exposure (CVE) identifiers, and the CTI data source must be premised, so it isn’t easy to verify the reliability. | It does not follow a privacy issue because it collects information from social network platforms associated with CTI information from a consumer perspective. | It is a framework that extracts only specific external data through data crawling. Therefore, it has low scalability to collect various extended data. | It didn’t consider sustainability |
Proposed Model | The architecture presented in this paper has high reliability because it verifies data itself, not organization through the cooperation of feeds. | The feed that collects data is powerful in privacy problems because it uses an only hash value that can indirectly verify data without leaking original data. | It manages important information extracted from packet data and indicator table, which enables higher-level data collection and flexible coping. | It provides optimal management of sustainable data with improved sustainability in the network. |
CTI Feed | IPv4 Resources | SHA-256 Resources | Remarks |
---|---|---|---|
Abuse | 1453 | X | F1 |
Bambenekconsulting | 162 | X | F2 |
Blocklist.de | 766 | X | F3 |
Emerging Threat | 778 | X | F4 |
FireHOL | 404 | X | F5 |
GreenSnow | 3902 | X | F6 |
IPsum | 3077 | X | F7 |
MalSilo | 585 | O | F8 |
Mirai tracker | 1000 | X | F9 |
Snort | 1115 | X | F10 |
Total | 13242 |
No. | Feed Information | RATE | Indicator (IPv4) | Cumulation |
---|---|---|---|---|
1 | F3, F4, F6, F7 | 4 | 59.10.5.156 | 4 |
2 | F3, F6, F7 | 3 | 103.27.238.202 | 3 |
3 | F3, F4, F7 | 3 | 104.236.72.187 | 3 |
CTI Feed | Number of Resources | Reduced Resources | Second Resources | First Resources | Contribution (%) |
---|---|---|---|---|---|
F1 | 1453 | 1453 | 0 | 166 | 6.42 |
F2 | 162 | 162 | 0 | 89 | 3.44 |
F3 | 766 | 766 | 0 | 423 | 16.36 |
F4 | 778 | 768 | 10 | 378 | 14.75 |
F5 | 404 | 315 | 89 | 0 | 1.15 |
F6 | 3902 | 3674 | 228 | 508 | 22.59 |
F7 | 3077 | 1929 | 1148 | 341 | 27.99 |
F8 | 585 | 425 | 160 | 4 | 2.22 |
F9 | 1000 | 990 | 10 | 0 | 0.13 |
F10 | 1115 | 731 | 384 | 0 | 4.95 |
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Cha, J.; Singh, S.K.; Pan, Y.; Park, J.H. Blockchain-Based Cyber Threat Intelligence System Architecture for Sustainable Computing. Sustainability 2020, 12, 6401. https://doi.org/10.3390/su12166401
Cha J, Singh SK, Pan Y, Park JH. Blockchain-Based Cyber Threat Intelligence System Architecture for Sustainable Computing. Sustainability. 2020; 12(16):6401. https://doi.org/10.3390/su12166401
Chicago/Turabian StyleCha, Jeonghun, Sushil Kumar Singh, Yi Pan, and Jong Hyuk Park. 2020. "Blockchain-Based Cyber Threat Intelligence System Architecture for Sustainable Computing" Sustainability 12, no. 16: 6401. https://doi.org/10.3390/su12166401