A model of cyber threat information sharing with the novel network topology
Hautamäki, Jari; Hämäläinen, Timo (2021)
Hautamäki, Jari
Hämäläinen, Timo
Association for computing machinery
2021
All rights reserved. This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.
Julkaisun pysyvä osoite on
https://urn.fi/URN:NBN:fi-fe2022030722216
https://urn.fi/URN:NBN:fi-fe2022030722216
Tiivistelmä
The digitized environments are particularly vulnerable to various attacks. In such a situation of a security attack, detecting and responding to attacks require effective actions. One of the most significant ways to improve resilience to security attacks is to obtain accurate and timely situational aspect of the security awareness. The efficient production and utilization of situation information is achieved by sharing information with other actors in the information sharing network quickly and reliably without compromising the confidential information of one’s own organization. At the same time, it should also be possible to avoid a flood of irrelevant information in the sharing network, which wastes resources and slows down the implementation of security measures. In our study, we have investigated how security-related information can be shared online as efficiently as possible by building a security information sharing topology based on the two most widely used network optimization algorithms. In the article, we present a model of an information sharing network, in which three different parameters have been used to optimize the network topology: the activity level of organization, the similarity of information systems between different actors and the requirement for the level of information privacy generally in the organization.