Blockchain-based threat intelligence exchange sharing system and method

A sharing system and blockchain technology, applied in the field of blockchain-based threat intelligence exchange and sharing systems, can solve the problems of uncollectible, complex threat intelligence confidentiality and privacy issues, reduce network energy consumption, improve System stability and purity, the effect of improving system stability

Inactive Publication Date: 2018-12-07
SHANGHAI JIAO TONG UNIV
View PDF3 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the sharing of threat intelligence also faces many challenges, such as the difficulty of putting the original information in a wider information environment around the attacker, such as the identity, purpose, and time, place, and method of the attacker; the effectiveness of threat intelligence sharing , Threats that no longer exist should not be collected; the timeliness of threat intelligence sharing should not be lower than the speed of action of hackers; threat intelligence sharing information involves the authenticity and reliability of automated execution; finally, the confidentiality and security of threat intelligence sharing Privacy concerns complicate the situation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Blockchain-based threat intelligence exchange sharing system and method
  • Blockchain-based threat intelligence exchange sharing system and method
  • Blockchain-based threat intelligence exchange sharing system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The following describes several preferred embodiments of the present invention with reference to the accompanying drawings, so as to make the technical content clearer and easier to understand. The present invention can be embodied in many different forms of embodiments, and the protection scope of the present invention is not limited to the embodiments mentioned herein.

[0043] A preferred embodiment of the present invention consists of a login filtering module, a blockchain-based security wallet, a shared community, an expert review module based on the Delegated Proof of Stake (DPOS) consensus mechanism, and a threat intelligence reputation database. The system takes the threat intelligence of existing security vendors and individual security experts as the original input, and the subsequent threat intelligence input by individual users is verified by expert representatives selected by the DPOS consensus mechanism, and then stored in the threat intelligence reputation...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of computer network security and discloses a blockchain-based threat intelligence exchange and sharing system comprising a login filtering module, a blockchain-basedsecurity wallet module, a sharing community, an expert representative review module and a threat intelligence reputation database. Threat intelligences form an exiting security manufacturer and security expert individual are original inputs of the threat intelligence exchange and sharing system; and threat intelligences inputted by individual users subsequently are stored into the threat intelligence reputation database after examination and verification of effectiveness by expert representatives. According to the invention, threat intelligences of all sources are collected and the collectedthreat intelligences are stored and updated by the blockchain, so that the timeliness and effectiveness of threat intelligence sharing as well as the threat intelligence sharing security, confidentiality and privacy are improved.

Description

technical field [0001] The present invention relates to the field of computer network security, in particular to a system and method for exchanging and sharing threat information based on blockchain. Background technique [0002] Threat intelligence (Threat intelligence) is to protect cyberspace resources from threats. It uses the experience and skills of security experts and professional teams to generate relevant information about security and threats, including vulnerabilities, threats, characteristics, lists, attributes, and solutions. The knowledge carrier of recommendations and other content; threat intelligence is evidence-based knowledge, including the environment, mechanisms, indicators, significance and feasibility recommendations, existing or emerging, threats or hazards to assets, is the collection, evaluation and application of security threats A collection of data on threat actors, exploits, malware, vulnerabilities, and indicators of vulnerabilities that can b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06Q40/04
CPCG06Q40/04H04L63/0227H04L63/0815H04L63/10H04L63/1433
Inventor 邹福泰谭越吴越
Owner SHANGHAI JIAO TONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products