Collaborative Analysis of Cybersecurity Information Sharing
StatisticsView Usage Statistics
As the complexity and number of cybersecurity incidents are growing, the traditional security measures are not enough to defend against attackers. In this situation, cyber threat intelligence substantially improves the detection and prevention of sophisticated attacks by providing a comprehensive knowledge about a threat which includes indicators, implications, and actionable advice. One of the key factors of threat intelligence is cybersecurity information sharing, allowing organizations to detect and prevent malicious behaviors proactively. Due to the importance of cybersecurity information sharing, governmental laws/initiatives have been legislated to mandate/encourage the governmental and private organizations to share their cybersecurity information. However, stimulating organizations to participate and deterring free-riding in such sharing is a big challenge. To this end, the cybersecurity information sharing framework should be equipped with a sound and fair rewarding and participation-fee allocation mechanisms to encourage sharing behavior. Furthermore, as the cybersecurity information conveys sensitive and private data, the sharing platform should protect the underlying sensitive information. In this research, we propose mechanisms and protocols to improve the cybersecurity information sharing platform. Although many research studies have been done to model the development of cybersecurity information sharing frameworks as a non-cooperative game, this problem has not been studied with the cooperative game theoretic approach. We analyze the cybersecurity information sharing with the cooperative game theoretic approach. Moreover, we apply cyber-insurance to motivate organizations toward cybersecurity collaboration.First, we review prior efforts in the domain of cybersecurity information sharing and cyber-insurance. Then we study the privacy challenges for cybersecurity information sharing platform and we propose a set of protocols to protect the underlying sensitive information. Afterward, we study the design of mechanisms to motivate organizations toward cybersecurity collaboration. We propose a set of new mechanisms to leverage cyber-insurance to strengthen the cybersecurity collaboration to reach the socially optimal point while satisfying mechanism design requirements.