Information and Communications Technology and Policy

Information and Communications Technology and Policy

Information and Communications Technology and Policy ›› 2020, Vol. 46 ›› Issue (2): 19-25.

Previous Articles     Next Articles

Research on threat intelligence sharing and rating technology based on Blockchain

  

  1. 1. School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049;
    2. Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093;
    3. Department of Security Technology, China Mobile Research Institute, Beijing 100053;
    4. Department of Network, China MobileCommunications Group, Beijing 100033;
    5. 360 Group, Beijing,100015
  • Online:2020-02-15 Published:2020-11-12

Abstract: With the rapid development of computer and network technology, cyber security incidents occur frequently and security vulnerabilities are emerging endlessly, so the role and value of threat intelligence are increasing. Based on the characteristics of blockchain such as openness, consensus, autonomy and decentralization, trustlessness, nontampering, and traceability, the paper proposes using blockchain technology to build blocks of threat intelligence information, including IP address information, domain name information, URLs Information, security incident information, vulnerability information, threat intelligence source credibility, threat intelligence source contribution rate,etc. A threat intelligence sharing and rating system based on blockchain is designed in the paper, and the corresponding threat intelligence sharing method and rating method based on blockchain are given. It can acquire and analyze the latest and most valuable threat intelligence information timely and effectively, so as to perform protection and emergency response timely, and promote the continuous and effective development of the closed loop of the entire threat intelligence ecosystem.

Key words: threat intelligence, Blockchain, sharing, rating