To read this content please select one of the options below:

A scheme for the sticky policy representation supporting secure cyber-threat intelligence analysis and sharing

Oleksii Osliak (Istituto di informatica e telematica, Consiglio Nazionale delle Ricerche, Pisa, Italy)
Andrea Saracino (Istituto di informatica e telematica, Consiglio Nazionale delle Ricerche, Pisa, Italy)
Fabio Martinelli (Istituto di informatica e telematica, Consiglio Nazionale delle Ricerche, Pisa, Italy)

Information and Computer Security

ISSN: 2056-4961

Article publication date: 25 September 2019

Issue publication date: 23 October 2019

207

Abstract

Purpose

This paper aims to propose a structured threat information expression (STIX)-based data representation for privacy-preserving data analysis to report format and semantics of specific data types and to represent sticky policies in the format of embedded human-readable data sharing agreements (DSAs). More specifically, the authors exploit and extend the STIX standard to represent in a structured way analysis-ready pieces of data and the attached privacy policies.

Design/methodology/approach

The whole scheme is designed to be completely compatible with the STIX 2.0 standard for cyber-threat intelligence (CTI) representation. The proposed scheme will be implemented in this work by defining the complete scheme for representing an email, which is more expressive than the standard one defined for STIX, designed specifically for spam email analysis.

Findings

Moreover, the paper provides a new scheme for general DSA representation that has been practically applied for the process of encoding specific attributes in different CTI reports.

Research limitations/implications

Because of the chosen approach, the research results may have limitations. Specifically, current practice for entity recognition has the limitation that was discovered during the research. However, its effect on process time was minimized and the way for improvement was proposed.

Originality/value

This paper has covered the existing gap including the lack of generality in DSA representation for privacy-preserving analysis of structured CTI. Therefore, the new model for DSA representation was introduced, as well as its practical implementation.

Keywords

Acknowledgements

This work has been partially funded by EU funded project H2020 NeCS, GA #675320 and H2020 C3ISP, GA #700294 and EIT digital trusted cloud and internet of things.

Citation

Osliak, O., Saracino, A. and Martinelli, F. (2019), "A scheme for the sticky policy representation supporting secure cyber-threat intelligence analysis and sharing", Information and Computer Security, Vol. 27 No. 5, pp. 687-710. https://doi.org/10.1108/ICS-01-2019-0011

Publisher

:

Emerald Publishing Limited

Copyright © 2019, Emerald Publishing Limited

Related articles