Netinfo Security ›› 2024, Vol. 24 ›› Issue (7): 1129-1137.doi: 10.3969/j.issn.1671-1122.2024.07.014

Previous Articles     Next Articles

Research and Scheme Design of Cyber Threat Intelligence Sharing under Privacy Protection System

WEN Wen, LIU Qinju(), KUANG Lin, REN Xuejing   

  1. Beijing Municipal Public Security Bureau Critical Information Infrastructre Protection Center, Beijing 100029, China
  • Received:2023-12-25 Online:2024-07-10 Published:2024-08-02

Abstract:

Cyber threat intelligence sharing is beneficial for achieving cyber security situational awareness to deal with cyber threats. However, the cyber threat intelligence is highly sensitive, improper handling can easily lead to damage interests of sharers or expose the weakness of security protection. Therefore, the premise of cyber threat intelligence sharing is to ensure data security and user privacy. This paper focused on the analysis and research of cyber threat intelligence sharing under the privacy protection system. First of all, we summarized and analyzed the cyber threat intelligence, cyber threat intelligence sharing and privacy computing technology. Then, starting from the security and privacy issues faced by cyber threat intelligence sharing, we carefully combed and deeply analyzed the technical path and research status of cyber threat intelligence sharing in recent years. Finally, based on the privacy computing, we designed the framework of cyber threat intelligence sharing scheme.

Key words: cyberspace security, cyber threat intelligence sharing, privacy computing

CLC Number: