作者: Thomas D. Wagner , Esther Palomar , Khaled Mahbub , Ali E. Abdallah
DOI: 10.1155/2018/9634507
关键词:
摘要: Cyber threat intelligence sharing has become a focal point for many organizations to improve resilience against cyberattacks. The objective lies in relevant information achieved through automating as processes possible without losing control or compromising security. may be crowdsourced from decentralized stakeholders collect and enrich existing information. Trust is an attribute of actionable cyber that established between stakeholders. Sharing about vulnerabilities requires high level trust because the sensitive Some platforms/providers support establishment internal vetting processes; others rely on manually build up trust. latter reduce amount sources. This work presents novel taxonomy establish trusted environment. 30 popular were analyzed compared regarding functionalities. taxonomies compared. Illustrative case studies developed applying our taxonomy.