Core Concepts
The author argues for the importance of secure and trusted threat information sharing through a combination of encryption techniques and permissioned blockchain technology to combat cyber threats effectively.
Abstract
The content discusses the necessity of sharing threat information in cybersecurity, highlighting the limitations of traditional methods like email. It proposes a solution that integrates Attribute-Based Encryption (ABE), Homomorphic Encryption (HE), and Zero Knowledge Proofs (ZKP) into Hyperledger Fabric for secure information exchange. The paper emphasizes the need for privacy-aware techniques to comply with regulations like GDPR and outlines a protocol for encrypted threat-sharing between agencies. Additionally, it reviews existing standards and platforms for threat information sharing, such as STIX, CybOX, IODEF, and TAXII. The implementation details include user registration on MSP, encryption approaches, message exchange phases, environment setup, test configurations, interaction system implementation, results from performance benchmarking using Hyperledger Caliper Benchmarking Tool.
Stats
Achieving approximately 91.6 transactions per second.
Maximum latency observed: 0.65 seconds.
Minimum latency observed: 0.01 seconds.
Average latency recorded: 0.20 seconds.
Quotes
"Ghosts in the machines." - C. Baraniuk
"Sharing Cyber Threat Information (CTI) can significantly aid in forecasting, preventing, and mitigating cyber-attacks." - David W.C.