Title :
Information sharing requirements and framework needed for community cyber incident detection and response
Author :
Harrison, Kevin ; White, Gannon
Author_Institution :
Dept. of Comput. Sci., Univ. of Texas at San Antonio, San Antonio, TX, USA
Abstract :
Communities, and the critical infrastructure that they rely upon, are becoming ever increasingly integrated into cyberspace. At the same time, communities are experiencing increasing activity and sophistication from a variety of threat agents. The effect of cyber attacks on communities has been observed, and the frequency and devastation of these attacks can only increase in the foreseeable future. Early detection of these attacks is critical for a fast and effective response. We propose detecting community cyber incidents by comparing indicators from community members across space and time. Performing spatiotemporal differentiation on these indicators requires that community members, such as private and governmental organizations, share information about these indicators. However, community members are, for good reasons, reluctant to share sensitive security related information. Additionally, sharing large amounts of information with a trusted, centralized location introduces scalability and reliability problems. In this paper we define the information sharing requirements necessary for fast, effective community cyber incident detection and response, while addressing both privacy and scalability concerns. Furthermore, we introduce a framework to meet these requirements, and analyze a proof of concept implementation.
Keywords :
data privacy; organisational aspects; reliability; security of data; spatiotemporal phenomena; community cyber incident detection; cyber attacks; cyberspace; governmental organizations; information sharing requirements; private organizations; proof of concept implementation; reliability problems; scalability problems; sensitive security related information; spatiotemporal differentiation; threat agents; Communities; Intrusion detection; Peer to peer computing; Routing; Scalability; anonymity; collaborative intrusion detection; community; distributed hash table; information sharing; intrusion detection; network security; privacy; security;
Conference_Titel :
Homeland Security (HST), 2012 IEEE Conference on Technologies for
Conference_Location :
Waltham, MA
Print_ISBN :
978-1-4673-2708-4
DOI :
10.1109/THS.2012.6459893