Optimizing Threat Intelligence Sharing Across Multiple Security Platforms
John Komarthi , Independent Researcher, USAAbstract
Sharing of Cyber Threat Intelligence (CTI) has turned out to be an indispensable pillar of the modern cybersecurity landscape, it is enabling organizations to defend against the evolving threats. In this white paper, we will discuss the strategies to optimize the sharing of threat intelligence across multiple security platforms in the enterprise and community context. We will observe the current standards and practices, like Structured Threat Information eXpression (STIX) and trusted Automated Exchange of Indicator Information (TAXII) protocols, and also examine the role of these standards in integrating the Threat Intelligence Platforms (TIPs) with Security Information and Event Management (SIEM) systems. We will observe the impact of threat intelligence exchange through real-world case studies and how the cybersecurity attacks are mitigated, along with the challenges that are encountered (e.g., technical integration gaps, data overload, trust and privacy issues). We will also discuss the limitations in the current approaches, which include the inconsistent adoption of the standards, there is a prevalence of indicators with low context, and siloed systems that impede the information flow. The landscape of the emerging solutions, the future directions will be explored, machine learning prioritized to reduce the false positives, a decentralized sharing architecture by leveraging blockchain and federated learning for privacy, and also trust frameworks to incentivize collaboration. Through addressing the present challenges and leveraging the advanced technologies, organizations will be able to create a unified and effective threat intelligence sharing ecosystem that will strengthen the collective cyber defense.
Keywords
Cyber Threat Intelligence, Threat Information Sharing, STIX/TAXII (Structured Threat Information eXpression/Trusted Automated eXchange of Intelligence Information), Threat Intelligence Platform (TIP), Security Information and Event Management (SIEM), Machine Learning, Blockchain, Federated Learning, Information Sharing and Analysis Center (ISAC), Cybersecurity Collaboration
References
Sophos, The State of Ransomware 2022. Sophos Group plc, 2022.
U.S. Government Accountability Office (GAO), Federal Response to the SolarWinds Cyberattack, GAO-22-104746, 2022.
SANS Institute, Cyber Threat Intelligence Survey Report 2022. SANS Press, 2022.
OASIS, STIX™ Version 2.1. Structured Threat Information Expression and TAXII™ Version 2.1. Trusted Automated Exchange of Indicator Information. OASIS Standard, 2021.
European Union Agency for Cybersecurity (ENISA), Guidelines on Threat Intelligence Sharing, 2021.
Europol, Internet Organised Crime Threat Assessment (IOCTA) 2022. Europol, 2022.
Symantec, Lessons from Locky and WannaCry Ransomware Campaigns. Symantec Threat Intelligence Report, 2018.
MISP Project, MISP Threat Sharing Platform Statistics 2023. Open Threat Intelligence Repository, 2023.
Financial Services Information Sharing and Analysis Center (FS-ISAC), Annual Global Intelligence Report 2022, 2022.
Cyber Threat Alliance (CTA), Annual Threat Sharing Report 2023, 2023.
Abusix and DigitalOcean, Collaborative Threat Intelligence Sharing to Reduce Cloud Abuse: Case Study, 2023.
MITRE Corporation, Global Adversary Behavior and Technique Reuse Study, 2021.
Cybersecurity and Infrastructure Security Agency (CISA), Cybersecurity Advisory on State-Backed Wiper Malware Activity, U.S. Department of Homeland Security, 2023.
Cyber Defense Assistance Collaborative (CDAC), Threat Intelligence Integration for Ukraine, 2023.
Cybersecurity and Infrastructure Security Agency (CISA), Joint Cyber Defense Collaborative (JCDC) and Log4j Response Report, 2022.
Health Information Sharing and Analysis Center (H-ISAC), Healthcare Threat Intelligence Sharing Report 2023, 2023.
Gartner, Threat Intelligence Overload: Managing Volume and Relevance in SOC Operations, 2023.
MITRE Engenuity, Contextualizing Indicators for Operational Threat Intelligence, 2022.
OASIS CTI Technical Committee, STIX™ and TAXII™ Interoperability Challenges Report, 2022.
European Union Agency for Cybersecurity (ENISA), Interoperability of Threat Intelligence Platforms, 2021.
Forum of Incident Response and Security Teams (FIRST), Traffic Light Protocol (TLP) v2.0 and Information Sharing Ethics, 2022.
European Commission, General Data Protection Regulation (GDPR), Regulation (EU) 2016/679, 2016.
Organisation for Economic Co-operation and Development (OECD), Trust Frameworks for Cross-Border Cyber Threat Information Sharing, OECD Digital Economy Papers, 2022.
Ponemon Institute, Challenges in Establishing Trusted CTI Sharing Networks, 2023.
SANS Institute, Threat Intelligence Operations Survey: Staffing and Capability Gaps, 2022.
European Telecommunications Standards Institute (ETSI), Technical Report TR 103 838: Cyber Threat Intelligence Standardization Landscape, 2023.
IBM Security X-Force, AI and Machine Learning in Threat Intelligence, 2023.
IEEE Access, Privacy-Preserving Collaborative Threat Intelligence Sharing Frameworks, IEEE, 2023.
N. Kshetri, “Blockchain-Based Threat Intelligence Sharing Systems: A Review,” Computers & Security, Elsevier, 2023.
LUUNU Consortium, Federated Learning Meets CTI: Secure Collaborative Detection, 2023.
NATO CCDCOE, Trust Models for Collaborative Threat Intelligence Sharing, 2022.
Z. Zhang et al., “Proof of Reputation in Blockchain-Enabled Threat Intelligence,” IEEE Transactions on Information Forensics and Security, 2023.
Cybersecurity and Infrastructure Security Agency (CISA), Integrated Threat Intelligence Operations: The Future of CTI Sharing, 2024.
U.S. Department of Homeland Security (DHS), Automated Indicator Sharing (AIS) Program Overview, 2023.
Figure 1. “Generalized architecture for threat intelligence sharing,” AWS Prescriptive Guidance, Amazon Web Services. [Online]. Available: https://docs.aws.amazon.com/prescriptive-guidance/latest/cyber-threat-intelligence-sharing/architecture.html
Figure 2. “Cyber threat intelligence sharing architecture,” ScienceDirect, Journal of Information Security and Applications, vol. 83, 2024. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S2214212624000899
Download and View Statistics
Copyright License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors retain the copyright of their manuscripts, and all Open Access articles are disseminated under the terms of the Creative Commons Attribution License 4.0 (CC-BY), which licenses unrestricted use, distribution, and reproduction in any medium, provided that the original work is appropriately cited. The use of general descriptive names, trade names, trademarks, and so forth in this publication, even if not specifically identified, does not imply that these names are not protected by the relevant laws and regulations.


Engineering and Technology
| Open Access |
DOI: