{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T10:12:36Z","timestamp":1776939156720,"version":"3.51.4"},"reference-count":56,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2021,2,26]],"date-time":"2021-02-26T00:00:00Z","timestamp":1614297600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Vlaams Impulsprogramma voor Cybersecurity","award":["VR20192203"],"award-info":[{"award-number":["VR20192203"]}]},{"name":"H2020 CyberSec4Europe","award":["830929"],"award-info":[{"award-number":["830929"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JCP"],"abstract":"<jats:p>Cyber threat intelligence (CTI) sharing is the collaborative effort of sharing information about cyber attacks to help organizations gain a better understanding of threats and proactively defend their systems and networks from cyber attacks. The challenge that we address is the fact that traditional indicators of compromise (IoC) may not always capture the breath or essence of a cyber security threat or attack campaign, possibly leading to false alert fatigue and missed detections with security analysts. To tackle this concern, we designed and evaluated a CTI solution that complements the attribute and tagging based sharing of indicators of compromise with machine learning (ML) models for collaborative threat detection. We implemented our solution on top of MISP, TheHive, and Cortex\u2014three state-of-practice open source CTI sharing and incident response platforms\u2014to incrementally improve the accuracy of these ML models, i.e., reduce the false positives and false negatives with shared counter-evidence, as well as ascertain the robustness of these models against ML attacks. However, the ML models can be attacked as well by adversaries that aim to evade detection. To protect the models and to maintain confidentiality and trust in the shared threat intelligence, we extend our previous research to offer fine-grained access to CP-ABE encrypted machine learning models and related artifacts to authorized parties. Our evaluation demonstrates the practical feasibility of the ML model based threat intelligence sharing, including the ability of accounting for indicators of adversarial ML threats.<\/jats:p>","DOI":"10.3390\/jcp1010008","type":"journal-article","created":{"date-parts":[[2021,2,26]],"date-time":"2021-02-26T06:47:20Z","timestamp":1614322040000},"page":"140-163","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":62,"title":["Sharing Machine Learning Models as Indicators of Compromise for Cyber Threat Intelligence"],"prefix":"10.3390","volume":"1","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6279-4430","authenticated-orcid":false,"given":"Davy","family":"Preuveneers","sequence":"first","affiliation":[{"name":"imec\u2014DistriNet, KU Leuven, Celestijnenlaan 200A, B-3001 Heverlee, Belgium"}]},{"given":"Wouter","family":"Joosen","sequence":"additional","affiliation":[{"name":"imec\u2014DistriNet, KU Leuven, Celestijnenlaan 200A, B-3001 Heverlee, Belgium"}]}],"member":"1968","published-online":{"date-parts":[[2021,2,26]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Gschwandtner, M., Demetz, L., Gander, M., and Maier, R. (2018, January 27\u201330). Integrating Threat Intelligence to Enhance an Organization\u2019s Information Security Management. Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, Hamburg, Germany.","DOI":"10.1145\/3230833.3232797"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Johnson, C., Badger, M., Waltermire, D., Snyder, J., and Skorupka, C. (2016). Guide to Cyber Threat Information Sharing, National Institute of Standards and Technology. Technical Report.","DOI":"10.6028\/NIST.SP.800-150"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"212","DOI":"10.1016\/j.cose.2017.09.001","article-title":"A survey on technical threat intelligence in the age of sophisticated cyber attacks","volume":"72","author":"Tounsi","year":"2018","journal-title":"Comput. Secur."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Wagner, T.D., Palomar, E., Mahbub, K., and Abdallah, A.E. (2018). A Novel Trust Taxonomy for Shared Cyber Threat Intelligence. Secur. Commun. Netw., 2018.","DOI":"10.1155\/2018\/9634507"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Hassan, W.U., Guo, S., Li, D., Chen, Z., Jee, K., Li, Z., and Bates, A. (2019, January 24\u201327). NoDoze: Combatting Threat Alert Fatigue with Automated Provenance Triage. Proceedings of the 26th Annual Network and Distributed System Security Symposium, NDSS 2019, San Diego, CA, USA.","DOI":"10.14722\/ndss.2019.23349"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Aminanto, M.E., Zhu, L., Ban, T., Isawa, R., Takahashi, T., and Inoue, D. (2019, January 26\u201328). Automated Threat-Alert Screening for Battling Alert Fatigue with Temporal Isolation Forest. Proceedings of the 2019 17th International Conference on Privacy, Security and Trust (PST), Fredericton, NB, Canada.","DOI":"10.1109\/PST47121.2019.8949029"},{"key":"ref_7","unstructured":"Li, V.G., Dunn, M., Pearce, P., McCoy, D., Voelker, G.M., Savage, S., and Levchenko, K. (2019, January 14\u201316). Reading the Tea Leaves: A Comparative Analysis of Threat Intelligence. Proceedings of the 28th USENIX Conference on Security Symposium (SEC\u201919), Santa Clara, CA, USA."},{"key":"ref_8","unstructured":"Capkun, S., and Roesner, F. (2020, January 12\u201314). A different cup of TI? The added value of commercial threat intelligence. Proceedings of the 29th USENIX Security Symposium, San Diego, CA, USA."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"52138","DOI":"10.1109\/ACCESS.2018.2870052","article-title":"Peeking Inside the Black-Box: A Survey on Explainable Artificial Intelligence (XAI)","volume":"6","author":"Adadi","year":"2018","journal-title":"IEEE Access"},{"key":"ref_10","unstructured":"Athalye, A., Carlini, N., and Wagner, D. (2018). Obfuscated gradients give a false sense of security: Circumventing defenses to adversarial examples. arXiv."},{"key":"ref_11","unstructured":"Jordan, B., Piazza, R., and Darley, T. (2021, February 24). STIX Version 2.1. OASIS Committee Specification Draft 01\/Public Review Draft 01. Available online: https:\/\/docs.oasis-open.org\/cti\/stix\/v2.1\/stix-v2.1.html."},{"key":"ref_12","unstructured":"Jordan, B., and Varner, D. (2021, February 24). TAXII Version 2.1. OASIS Committee Specification Draft 04\/Public Review Draft 03. Available online: https:\/\/docs.oasis-open.org\/cti\/taxii\/v2.1\/taxii-v2.1.html."},{"key":"ref_13","unstructured":"Darley, T., Kirillov, I., Piazza, R., and Beck, D. (2021, February 24). CybOX Version 2.1.1. Part 01: Overview. OASIS Committee Specification Draft 01\/Public Review Draft 01. Available online: http:\/\/docs.oasis-open.org\/cti\/cybox\/v2.1.1\/cybox-v2.1.1-part01-overview.html."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Ramsdale, A., Shiaeles, S., and Kolokotronis, N. (2020). A Comparative Analysis of Cyber-Threat Intelligence Sources, Formats and Languages. Electronics, 9.","DOI":"10.3390\/electronics9050824"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Wagner, C., Dulaunoy, A., Wagener, G., and Iklody, A. (2016, January 24). MISP: The Design and Implementation of a Collaborative Threat Intelligence Sharing Platform. Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security (WISCS \u201916), Vienna, Austria.","DOI":"10.1145\/2994539.2994542"},{"key":"ref_16","unstructured":"Roesch, M. (1999, January 7\u201312). Snort\u2014Lightweight Intrusion Detection for Networks. Proceedings of the 13th USENIX Conference on System Administration (LISA \u201999), Seattle, WA, USA."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1007\/s11277-016-3209-9","article-title":"Performance Comparison and Detection Analysis in Snort and Suricata Environment","volume":"94","author":"Park","year":"2017","journal-title":"Wirel. Pers. Commun."},{"key":"ref_18","unstructured":"Paxson, V., Campbell, S., and Lee, J. (2006). Bro Intrusion Detection System, Lawrence Berkeley National Laboratory. Technical Report."},{"key":"ref_19","unstructured":"Iklody, A., Wagener, G., Dulaunoy, A., Mokaddem, S., and Wagner, C. (2018). Decaying Indicators of Compromise. arXiv."},{"key":"ref_20","unstructured":"Mokaddem, S., Wagener, G., Dulaunoy, A., and Iklody, A. (2019). Taxonomy driven indicator scoring in MISP threat intelligence platforms. arXiv."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1186\/s40537-020-00318-5","article-title":"Cybersecurity data science: An overview from machine learning perspective","volume":"7","author":"Sarker","year":"2020","journal-title":"J. Big Data"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Kumar, M., Hanumanthappa, M., and Kumar, T.V.S. (2012, January 9\u201311). Intrusion Detection System using decision tree algorithm. Proceedings of the 2012 IEEE 14th International Conference on Communication Technology, Chengdu, China.","DOI":"10.1109\/ICCT.2012.6511281"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"424","DOI":"10.1016\/j.eswa.2011.07.032","article-title":"An efficient intrusion detection system based on support vector machines and gradually feature removal method","volume":"39","author":"Li","year":"2012","journal-title":"Expert Syst. Appl."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/j.knosys.2015.01.009","article-title":"CANN: An intrusion detection system based on combining cluster centers and nearest neighbors","volume":"78","author":"Lin","year":"2015","journal-title":"Knowl.-Based Syst."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"360","DOI":"10.1016\/j.asoc.2015.10.011","article-title":"A novel SVM-kNN-PSO ensemble method for intrusion detection system","volume":"38","author":"Aburomman","year":"2016","journal-title":"Appl. Soft Comput."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"21954","DOI":"10.1109\/ACCESS.2017.2762418","article-title":"A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks","volume":"5","author":"Yin","year":"2017","journal-title":"IEEE Access"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"1153","DOI":"10.1109\/COMST.2015.2494502","article-title":"A survey of data mining and machine learning methods for cyber security intrusion detection","volume":"18","author":"Buczak","year":"2015","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Liu, H., and Lang, B. (2019). Machine learning and deep learning methods for intrusion detection systems: A survey. Appl. Sci., 9.","DOI":"10.3390\/app9204396"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"102767","DOI":"10.1016\/j.jnca.2020.102767","article-title":"Deep learning methods in network intrusion detection: A survey and an objective comparison","volume":"169","author":"Gamage","year":"2020","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"S118","DOI":"10.1016\/j.diin.2018.04.024","article-title":"Deep learning at the shallow end: Malware classification for non-domain experts","volume":"26","author":"Le","year":"2018","journal-title":"Digit. Investig."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"46717","DOI":"10.1109\/ACCESS.2019.2906934","article-title":"Robust intelligent malware detection using deep learning","volume":"7","author":"Vinayakumar","year":"2019","journal-title":"IEEE Access"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"102526","DOI":"10.1016\/j.jnca.2019.102526","article-title":"The rise of machine learning for detection and classification of malware: Research developments, trends and challenges","volume":"153","author":"Gibert","year":"2020","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"101663","DOI":"10.1016\/j.cose.2019.101663","article-title":"DL-Droid: Deep learning based android malware detection using real devices","volume":"89","author":"Alzaylaee","year":"2020","journal-title":"Comput. Secur."},{"key":"ref_34","unstructured":"Preuveneers, D., Manco, G., Guarascio, M., Zarzosa, S.G., Martins, R., Atzeni, A., Bernabe, J.B., Soares, J., Meng, W., and Corin, R.D. (2021, February 24). D3.3: Research Challenges and Requirements to Manage Digital Evidence. H2020 CyberSec4Europe Deliverables. Available online: https:\/\/cybersec4europe.eu\/publications\/deliverables\/."},{"key":"ref_35","unstructured":"Arp, D., Quiring, E., Pendlebury, F., Warnecke, A., Pierazzi, F., Wressnegger, C., Cavallaro, L., and Rieck, K. (2020). Dos and Don\u2019ts of Machine Learning in Computer Security. arXiv."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1007\/s10994-010-5188-5","article-title":"The security of machine learning","volume":"81","author":"Barreno","year":"2010","journal-title":"Mach. Learn."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Rubinstein, B.I., Nelson, B., Huang, L., Joseph, A.D., Lau, S.h., Rao, S., Taft, N., and Tygar, J.D. (2009, January 4\u20136). ANTIDOTE: Understanding and Defending against Poisoning of Anomaly Detectors. Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement (IMC \u201909), Chicago, IL, USA.","DOI":"10.1145\/1644893.1644895"},{"key":"ref_38","unstructured":"Biggio, B., Nelson, B., and Laskov, P. (July, January 26). Poisoning Attacks against Support Vector Machines. Proceedings of the 29th International Coference on International Conference on Machine Learning (ICML\u201912), Edinburgh, UK."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"326","DOI":"10.1016\/j.cose.2017.11.007","article-title":"Automated poisoning attacks and defenses in malware detection systems: An adversarial machine learning approach","volume":"73","author":"Chen","year":"2018","journal-title":"Comput. Secur."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Preuveneers, D., Rimmer, V., Tsingenopoulos, I., Spooren, J., Joosen, W., and Ilie-Zudor, E. (2018). Chained Anomaly Detection Models for Federated Learning: An Intrusion Detection Case Study. Appl. Sci., 8.","DOI":"10.3390\/app8122663"},{"key":"ref_41","unstructured":"Tram\u00e8r, F., Zhang, F., Juels, A., Reiter, M.K., and Ristenpart, T. (2016, January 10\u201312). Stealing Machine Learning Models via Prediction APIs. Proceedings of the 25th USENIX Conference on Security Symposium (SEC\u201916), Austin, TX, USA."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Juuti, M., Szyller, S., Marchal, S., and Asokan, N. (2019, January 17\u201319). PRADA: Protecting Against DNN Model Stealing Attacks. Proceedings of the 2019 IEEE European Symposium on Security and Privacy (EuroS P), Stockholm, Sweden.","DOI":"10.1109\/EuroSP.2019.00044"},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Kesarwani, M., Mukhoty, B., Arya, V., and Mehta, S. (2018, January 3\u20137). Model Extraction Warning in MLaaS Paradigm. Proceedings of the 34th Annual Computer Security Applications Conference (ACSAC \u201918), San Juan, PR, USA.","DOI":"10.1145\/3274694.3274740"},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Shokri, R., Stronati, M., Song, C., and Shmatikov, V. (2017, January 22\u201326). Membership Inference Attacks Against Machine Learning Models. Proceedings of the 2017 IEEE Symposium on Security and Privacy (SP), San Jose, CA, USA.","DOI":"10.1109\/SP.2017.41"},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Nasr, M., Shokri, R., and Houmansadr, A. (2018, January 15\u201319). Machine Learning with Membership Privacy Using Adversarial Regularization. Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS \u201918), Toronto, ON, Canada.","DOI":"10.1145\/3243734.3243855"},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Fredrikson, M., Jha, S., and Ristenpart, T. (2015, January 12\u201316). Model Inversion Attacks That Exploit Confidence Information and Basic Countermeasures. Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS \u201915), Denver, CO, USA.","DOI":"10.1145\/2810103.2813677"},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Zhou, C., and Paffenroth, R.C. (2017, January 13\u201317). Anomaly detection with robust deep autoencoders. Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Halifax, NS, Canada.","DOI":"10.1145\/3097983.3098052"},{"key":"ref_48","unstructured":"Kurakin, A., Goodfellow, I., and Bengio, S. (2016). Adversarial machine learning at scale. arXiv."},{"key":"ref_49","unstructured":"Tram\u00e8r, F., Kurakin, A., Papernot, N., Goodfellow, I., Boneh, D., and McDaniel, P. (2017). Ensemble adversarial training: Attacks and defenses. arXiv."},{"key":"ref_50","unstructured":"Wong, E., Rice, L., and Kolter, J.Z. (2020). Fast is better than free: Revisiting adversarial training. arXiv."},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Sharafaldin, I., Lashkari, A.H., and Ghorbani, A.A. (2018, January 22\u201324). Toward generating a new intrusion detection dataset and intrusion traffic characterization. Proceedings of the 4th International Conference on Information Systems Security and Privacy (ICISSP), Funchal, Madeira, Portugal.","DOI":"10.5220\/0006639801080116"},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Yuan, X., Li, C., and Li, X. (2017, January 29\u201331). DeepDefense: Identifying DDoS attack via deep learning. Proceedings of the 2017 IEEE International Conference on Smart Computing (SMARTCOMP), Hong Kong, China.","DOI":"10.1109\/SMARTCOMP.2017.7946998"},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"876","DOI":"10.1109\/TNSM.2020.2971776","article-title":"Lucid: A Practical, Lightweight Deep Learning Solution for DDoS Attack Detection","volume":"17","author":"Millar","year":"2020","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"ref_54","unstructured":"Preuveneers, D., and Joosen, W. (2019, January 5\u20137). TATIS: Trustworthy APIs for Threat Intelligence Sharing with UMA and CP-ABE. Proceedings of the 12th International Symposium, FPS 2019, Toulouse, France."},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., and Waters, B. (2007, January 20\u201323). Ciphertext-policy attribute-based encryption. Proceedings of the 2007 IEEE Symposium on Security and Privacy (SP\u201907), Berkeley, CA, USA.","DOI":"10.1109\/SP.2007.11"},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"8833765","DOI":"10.1155\/2020\/8833765","article-title":"Distributed Security Framework for Reliable Threat Intelligence Sharing","volume":"2020","author":"Preuveneers","year":"2020","journal-title":"Secur. Commun. Netw."}],"container-title":["Journal of Cybersecurity and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2624-800X\/1\/1\/8\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T05:29:21Z","timestamp":1760160561000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2624-800X\/1\/1\/8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,26]]},"references-count":56,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2021,3]]}},"alternative-id":["jcp1010008"],"URL":"https:\/\/doi.org\/10.3390\/jcp1010008","relation":{},"ISSN":["2624-800X"],"issn-type":[{"value":"2624-800X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,2,26]]}}}