{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T02:52:36Z","timestamp":1720579956630},"reference-count":10,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,10]]},"abstract":"<jats:p>In recent years, the sharing of cybersecurity threat intelligence (hereinafter referred to as threat intelligence) has received increasing attention from national network security management organizations and network security enterprises. Academia and industry have conducted research on threat intelligence analysis and sharing. This paper first introduces the value and significance of threat intelligence. Then it introduces the commonly used threat intelligence analysis model. Then it organizes and classifies the threat intelligence sharing norms and threat intelligence vendors. Then it starts from the main problems faced by threat intelligence sharing. A solution to build regional network security capabilities is presented; finally, the future research direction of threat intelligence sharing is explored.<\/jats:p>","DOI":"10.4018\/ijdcf.2020100105","type":"journal-article","created":{"date-parts":[[2020,9,10]],"date-time":"2020-09-10T13:15:52Z","timestamp":1599743752000},"page":"54-67","source":"Crossref","is-referenced-by-count":7,"title":["A Summary of the Development of Cyber Security Threat Intelligence Sharing"],"prefix":"10.4018","volume":"12","author":[{"given":"Lili","family":"Du","sequence":"first","affiliation":[{"name":"JiLin University, China"}]},{"given":"Yaqin","family":"Fan","sequence":"additional","affiliation":[{"name":"JiLin University, China"}]},{"given":"Lvyang","family":"Zhang","sequence":"additional","affiliation":[{"name":"Yiwu Industrial and Commercial College, China"}]},{"given":"Lianying","family":"Wang","sequence":"additional","affiliation":[{"name":"Tencent Security Xuanwu Lab, China"}]},{"given":"Tianhang","family":"Sun","sequence":"additional","affiliation":[{"name":"Electrical Engineering and Telecommunications, University of New South Wales, Australia"}]}],"member":"2432","reference":[{"key":"IJDCF.2020100105-0","unstructured":"Caltagirone, S., Pendergast, A., & Betz, C. (2013). Diamond Model of Intrusion Analysis. Center for Cyber Threat Intelligence and Threat Research, Technical Report ADA586960."},{"key":"IJDCF.2020100105-1","author":"J.Gartner","year":"2017","journal-title":"Competitive Landscape: Threat Intelligence Services"},{"key":"IJDCF.2020100105-2","unstructured":"Koujalagi, A. (2015). Intelligence-Driven Computer Network Defence Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains. Academic Press."},{"issue":"02","key":"IJDCF.2020100105-3","first-page":"16","article-title":"A Survey of Network Space Threat Intelligence Perception, Sharing and Analysis Technology","volume":"2","author":"J.Li","year":"2016","journal-title":"Journal of Network and Information Security"},{"key":"IJDCF.2020100105-4","unstructured":"Ma, Ting, & Yue. (2016). The US Network Security Information Sharing Mechanism and Its Enlightenment to China. Journal of Information, 35(3), 17-23."},{"key":"IJDCF.2020100105-5","unstructured":"OASIS. (n.d.). TAXII 2.0 Specification Document. https:\/\/oasis-open.github.io\/cti-documentation\/resources.html"},{"key":"IJDCF.2020100105-6","unstructured":"RFSID. (2017). Threat Intelligence, Information, and Data: What Is the Difference? In The ART of Making Threat Intelligence Actionable. SecurityWeek."},{"key":"IJDCF.2020100105-7","unstructured":"Yang, Wu, Su, & Liu. (2018). A Survey of Cyberspace Threat Intelligence Sharing Technology. Computer Science, 45(6), 9-18."},{"key":"IJDCF.2020100105-8","unstructured":"Yang. (2018). Network security and intelligence analysis based on big data. Modern Information Technology, 2(7), 157-158."},{"issue":"01","key":"IJDCF.2020100105-9","first-page":"31","article-title":"Research on Threat Intelligence Sharing and Utilization for Attack Source Tracing.","volume":"1","author":"Z.Yang","year":"2015","journal-title":"Information Security Research"}],"container-title":["International Journal of Digital Crime and Forensics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=262156","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,5]],"date-time":"2022-05-05T21:56:34Z","timestamp":1651787794000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJDCF.2020100105"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2020,10]]},"references-count":10,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.4018\/ijdcf.2020100105","relation":{},"ISSN":["1941-6210","1941-6229"],"issn-type":[{"value":"1941-6210","type":"print"},{"value":"1941-6229","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,10]]}}}