Abstract
Security event sharing is deemed of critical importance to counteract large-scale attacks at Internet service provider (ISP) networks as these attacks have become larger, more sophisticated and frequent. On the one hand, security event sharing is regarded to speed up organization's mitigation and response capabilities. On the other hand, it is currently done on an ad-hoc basis via email, member calls or in personal meetings only under the premise that participating partners are personally known to each other. As a consequence, mitigation and response actions are delayed and thus security events are not processed in time.
One approach to reduce this delay and the time for manual processing is to disseminate security events among trusted partners. However, exchanging security events and semi-automatically deploying mitigation is currently not well established as a result of two shortcomings. First, the personal knowledge of each sharing partner to develop trust does not scale very well. Second, current exchange formats and protocols often are not able to use security mechanisms (e.g., encryption and signature) to ensure both confidentiality and integrity of the security event information and its remediation. The goal of this paper is to present a trust model that determines a trust and a knowledge level of a security event in order to deploy semi-automated remediations and facilitate the dissemination of security event information using the exchange format FLEX in the context of ISPs. We show that this trust model is scalable and helps to build a trust community in order to share information about threats and its remediation suggestions.
| Original language | English |
|---|---|
| Title of host publication | Proceedings of the 10th International Conference on Autonomous Infrastructure, Management and Security (AIMS 2016) |
| Place of Publication | London |
| Publisher | Springer |
| Pages | 111-124 |
| Number of pages | 14 |
| ISBN (Print) | 978-3-319-39813-6 |
| DOIs | |
| Publication status | Published - 21 Jun 2016 |
| Event | 10th IFIP WG 6.6 International Conference on Management and Security in the Age of Hyperconnectivity, AIMS 2016 - Munich, Germany Duration: 20 Jun 2016 → 23 Jun 2016 Conference number: 10 |
Publication series
| Name | Lecture Notes in Computer Science |
|---|---|
| Publisher | Springer Verlag |
| Volume | 9701 |
| ISSN (Print) | 0302-9743 |
| ISSN (Electronic) | 1611-3349 |
Conference
| Conference | 10th IFIP WG 6.6 International Conference on Management and Security in the Age of Hyperconnectivity, AIMS 2016 |
|---|---|
| Abbreviated title | AIMS 2016 |
| Country/Territory | Germany |
| City | Munich |
| Period | 20/06/16 → 23/06/16 |
UN SDGs
This output contributes to the following UN Sustainable Development Goals (SDGs)
-
SDG 9 Industry, Innovation, and Infrastructure
Keywords
- IR-100706
- METIS-317208
- EWI-27040
Fingerprint
Dive into the research topics of 'In Whom Do We Trust - Sharing Security Events'. Together they form a unique fingerprint.-
Distributed DDoS Defense - A collaborative Approach at Internet Scale
Steinberger, J., 19 Sept 2018, University of Twente. 209 p.Research output: Thesis › PhD Thesis - Research UT, graduation UT
Open AccessFile2735 Downloads (Pure) -
SPRING 2016, Darmstadt, Germany: Proceedings of the 11th SPRING graduate workshop of the special interest group Security – Intrusion Detection and Response (SIDAR) of the German informatics Society (GI)
Steinberger, J. (Editor), Jun 2016, Germany: German Informatics Society (GI). 22 p. (SIDAR-Reports; vol. SR-2016-01)Research output: Book/Report › Book editing › Academic
Open AccessFile
Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver