How to cite this article:
B. Stojkovski and G. Lenzini, "A workflow and toolchain proposal for analyzing users’ perceptions in cyber threat intelligence sharing platforms," 2021 IEEE International Conference on Cyber Security and Resilience (CSR), 2021, pp. 324-330, doi: 10.1109/ CSR51186.2021.9527903.
The original publication is available at: https://ieeexplore.ieee.org/document/9527903 © 2021 IEEE
All documents in ORBilu are protected by a user license.
Abstract :
[en] Cyber Threat Intelligence (CTI) sharing platforms are valuable tools in cybersecurity. However, despite the fact that effective CTI exchange highly depends on human aspects, cyber behavior in CTI sharing platforms has been notably less investigated by the security research community. Motivated by this research gap, we ground our work in the concrete challenge of understanding users’ perceptions of information sharing in CTI platforms. To this end, we propose a conceptual workflow and toolchain that would seek to verify whether users have an accurate comprehension of how far information travels when shared in a CTI sharing platform. We contextualize our concept within MISP as a use case, and discuss the benefits of our socio-technical approach as a potential tool for security analysis, simulation, or education/training support. We conclude with a brief outline of future work that would seek to evaluate and validate the proposed model.
Focus Area :
Security, Reliability and Trust
Security, Reliability and Trust
Security, Reliability and Trust
Security, Reliability and Trust
Scopus citations®
without self-citations
3