학술논문

A Smart Contract Approach to Cyber Threat Intelligence Sharing in Kenya
Document Type
Conference
Source
2022 IST-Africa Conference (IST-Africa) IST-Africa Conference (IST-Africa), 2022. :1-10 May, 2022
Subject
Communication, Networking and Broadcast Technologies
Computing and Processing
Engineering Profession
General Topics for Engineers
Power, Energy and Industry Applications
Social networking (online)
Computer hacking
Computational modeling
Smart contracts
Organizations
Blockchains
Cyber Threat Intelligence
Smart Contract
Verifiable Random Function
Language
ISSN
2576-8581
Abstract
The current practice of informal cyber threat intelligence (CTI) sharing among organizations is characterized with the use of emails and social media exchanges among individuals. This model is highly subjective and dependent on a specific individual’s social networks. Financial institutions have CTI at their disposal that could protect each other from computer hacks and fraud. The effective sharing of this intelligence among financial institutions could reduce the high income leakages that is brought about by cyber-attacks. The challenge is how to share this intelligence confidentially and anonymously since the financial institutions are competitors, have a huge reputation to protect and thrive on business secrecy. This research proposes a new way of sharing cyber threat intelligence by using Ethereum smart contract blockchain technology. This will be accomplished by hashing the device identity and replacing the hashed device identity by an on-chain verifiable random function to protect the identity of the participating nodes or the financial institutions in the blockchain network when passing information.