6533b85afe1ef96bd12b9589
RESEARCH PRODUCT
A model of Cyber Threat Information Sharing with the Novel Network Topology
Jari HautamakiTimo Hämäläinensubject
Information privacySituation awarenessComputer scienceInformation sharingInformation systemConfidentialityResilience (network)Security awarenessNetwork topologyComputer securitycomputer.software_genrecomputerdescription
The digitized environments are particularly vulnerable to various attacks. In such a situation of a security attack, detecting and responding to attacks require effective actions. One of the most significant ways to improve resilience to security attacks is to obtain accurate and timely situational aspect of the security awareness. The efficient production and utilization of situation information is achieved by sharing information with other actors in the information sharing network quickly and reliably without compromising the confidential information of one's own organization. At the same time, it should also be possible to avoid a flood of irrelevant information in the sharing network, which wastes resources and slows down the implementation of security measures. In our study, we have investigated how security-related information can be shared online as efficiently as possible by building a security information sharing topology based on the two most widely used network optimization algorithms. In the article, we present a model of an information sharing network, in which three different parameters have been used to optimize the network topology: the activity level of organization, the similarity of information systems between different actors and the requirement for the level of information privacy generally in the organization.
year | journal | country | edition | language |
---|---|---|---|---|
2021-06-29 | The 12th International Conference on Advances in Information Technology |