Collaborative Cyber Threat Intelligence
Collaborative Cyber Threat Intelligence
Collaborative Cyber Threat Intelligence
Threat Intelligence
Collaborative Cyber
Threat Intelligence
Detecting and Responding to Advanced
Cyber Attacks at the National Level
Edited by
Florian Skopik
CRC Press
Taylor & Francis Group
6000 Broken Sound Parkway NW, Suite 300
Boca Raton, FL 33487-2742
This book contains information obtained from authentic and highly regarded sources. Reasonable
efforts have been made to publish reliable data and information, but the author and publisher cannot
assume responsibility for the validity of all materials or the consequences of their use. The authors
and publishers have attempted to trace the copyright holders of all material reproduced in this
publication and apologize to copyright holders if permission to publish in this form has not been
obtained. If any copyright material has not been acknowledged, please write and let us know so that
we may rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced,
transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or
hereafter invented, including photocopying, microfilming, and recording, or in any information
storage or retrieval system, without written permission from the publishers.
For permission to photocopy or use material electronically from this work, please access www.copy-
right.com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC),
222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that
provides licenses and registration for a variety of users. For organizations that have been granted a
photocopy license by the CCC, a separate system of payment has been arranged.
Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and
are used only for identification and explanation without intent to infringe.
Foreword.............................................................................................................vii
Preface.................................................................................................................ix
Acknowledgment................................................................................................xi
About the Editor...............................................................................................xiii
Contributors....................................................................................................... xv
1 Introduction............................................................................................1
FLORIAN SKOPIK
v
vi ◾ Contents
Index............................................................................................................421
Foreword
This book provides a valuable foundation for the future development of cyberse-
curity information sharing both within and between nation-states. This work is
essential—unless we can identify common threats and share common mitigation
then there is a danger that we will become future victims of previous attack vectors.
Without shared situation awareness, it is likely that different organizations facing
the same threat will respond in inconsistent ways—and the lessons learned in com-
batting earlier incidents will be repeated and repeated until we develop more coor-
dinated responses. There are further motivations for reading this work. Existing
standards across many industries and continents agree on the need for risk-based
approaches to cybersecurity. Too often these are based on subject introspection;
they can be little more than the best guesses of chief information security offi-
cers. If we can encourage information sharing, then our assessments of probability,
consequence, and our identification of potential vulnerabilities can be based on
previous experience.
All of these benefits will only be realized if we can address a number of barri-
ers to information sharing. First, it is clear that there may be limited benefits from
sharing information about every potential attack. The sheer scale of automated
phishing and DDoS (Distributed Denial-of-Service Attacks) means that without
considerable support we may lose cyber situation awareness as we are overwhelmed
by a mass of well-understood incidents. Second, the focus must never be on record-
ing the incidents—the utility of these systems is derived from the decisions that
they inform. We must allocate resources to identifying mitigations and preventing
future incidents. Third, a host of questions must be addressed about the disclosure
of compromising information and the violation of intellectual property through
incident reporting. Simply revealing that an organization has been the target of an
attack may encourage others to focus on them. Fourth, there are questions about
what should be shared. The information needs are different both horizontally—
between companies in different industries—and vertically between companies
addressing different needs within the same supply chain. Finally, we must be sen-
sitive to the limitations of incident reporting—it can be retrospective, focusing
on gathering information about the previous generation of attacks rather than the
next—which may be very different especially when state actors are involved.
vii
viii ◾ Foreword
The chapters of this book provide, arguably for the first time, a coherent and
sustained view of these many different opportunities and potential pitfalls. It inves-
tigates the potential benefits of peer-to-peer systems as well as the legal obstacles
that must be overcome. It looks at the key determinants of situation awareness at a
national level and beyond. It does all of this in an accessible manner—focusing on
generic issues rather than particular technologies.
I recommend it to you.
Chris Johnson
Head of Computing Science at Glasgow University
Glasgow, UK
Preface
The Internet threat landscape is fundamentally changing. A major shift away from
hobby hacking toward well-organized cybercrime, even cyberwar, can be observed.
These attacks are typically carried out for commercial or political reasons in a
sophisticated and targeted manner and specifically in a way to circumvent common
security measures. Additionally, networks have grown to a scale and complexity
and have reached a degree of interconnectedness, that their protection can often
only be guaranteed and financed as a shared effort. Consequently, new paradigms
are required for detecting contemporary attacks and mitigating their effects.
Information sharing is a crucial step to acquiring a thorough understanding of
large-scale cyber attack situations and is therefore seen as one of the key concepts
to protect future networks. To this end, nation-states together with standardiza-
tion bodies, large industry stakeholders, academics, and regulatory entities have
created a plethora of literature on how cybersecurity information sharing across
organizations and with national stakeholders can be achieved. Shared information,
commonly referred to as threat intelligence, should comprise timely early warn-
ings, details on threat actors, recently exploited vulnerabilities, new forms of attack
techniques, and courses of action on how to deal with certain situations—just to
name a few. Sharing this information, however, is highly nontrivial. A wide variety
of implications, regarding data privacy, economics, regulatory frameworks, organi-
zational aspects, and trust issues need to be accounted for.
This book is an attempt to survey and present existing works and proposes
and discusses new approaches and methodologies at the forefront of research and
development. It provides a unique angle on the topics of cross-organizational cyber
threat intelligence and security information sharing. It focuses neither on vendor-
specific solutions nor on technical tools only. Instead, it provides a clear view on the
current state of the art in all relevant dimensions of information sharing, in order
to appropriately address current—and future—security threats at a national level.
Regarding the intended readership, I foresee the book being useful to forward-
looking practitioners, such as CISOs, as well as industry experts, including those
with deep knowledge of network management, cybersecurity, policy, and compli-
ance issues and are interested in learning about the vast state of the art, both in prac-
tice and applied research. Similarly, I suggest the book has value for academics and
ix
x ◾ Preface
post-graduate students beginning their studies in this important area and seeking
to get an overview of the research field. As an editor, I have encouraged the chapter
authors to follow a “bath-tub” approach to the depth of knowledge required to read
each chapter (i.e., the start and end of each chapter should be approachable and give
high-level insights into the topic covered, whereas the core content of the chapter
may require more attention from the reader, as it focuses on details).
Finally, a word on the authors of the single chapters: These are a mixed group
of renowned experts and young talents from research institutions and universities
across Europe, including the Austrian Institute of Technology, the Netherlands
Organization for Applied Scientific Research (TNO), Queen’s University Belfast,
University of Vienna, and Catholic University of Leuven. Their contributions
reflect existing efforts and argue the case for areas where they see future research
and standardization is of paramount importance. Additionally, the authors com-
ment on a number of open contentious issues, including building on the exist-
ing effort on network security, what is the next highest priority that should be
addressed and why, and whether, despite the efforts of the community, the full
realization of nationwide cybersecurity information sharing systems is possible in a
privacy-preserving, legally sound, efficient, and, most importantly, secure manner.
Without the authors’ willingness and enthusiasm for this project, and their subject
knowledge, this book would not have been possible. As an editor, I am grateful for
their significant contributions.
I am happy to receive feedback, comments on the book, questions, and opin-
ions of any kind. Please feel free to contact me—refer to www.flosko.at for details.
Florian Skopik
Vienna, Austria
Acknowledgment
Work presented in this book was partly funded by the Austrian FFG research
program KIRAS in course of the project “Cyber Incident Situational Awareness”
(CISA; grant no. 850199) and by the European Union FP7 project “European
Control System Security Incident Analysis Network” (ECOSSIAN; grant no.
607577).
xi
About the Editor
xiii
Contributors
xv
xvi ◾ Contributors
Giuseppe Settanni
Center for Digital Safety & Security
Vienna, Austria
Chapter 1
Introduction
Florian Skopik
Austrian Institute of Technology
Contents
1.1 Motivation for This Book..............................................................................2
1.2 On the Ever-Changing Cyber Threat Landscape...........................................3
1.3 A n Introduction to Threat Intelligence and Cross-Organizational
Information Sharing......................................................................................5
1.3.1 Benefit of Threat Information Sharing...............................................5
1.3.2 Challenges of Threat Information Sharing.........................................6
1.3.3 Creating Cyber Threat Information...................................................7
1.3.4 Types of Cyber Threat Information...................................................8
1.3.5 C ornerstones of Threat Information Sharing Activities....................11
1.3.5.1 E stablish Cyber Threat Intelligence Sharing
Capabilities������������������������������������������������������������������11
1.3.5.2 P articipating in Threat Information Sharing
Relationships��������������������������������������������������������������������12
1.3.6 Th
e Role of Nation-States as Enablers of Information Sharing.........14
1.4 About the Structure of the Book.................................................................14
List of Abbreviations............................................................................................16
References............................................................................................................17
1
2 ◾ Collaborative Cyber Threat Intelligence
importance for all stakeholders, being infrastructure providers, heavy users, or state
actors, to understand the major implications with respect to the technical, legal,
economic, regulatory, and organizational dimensions when it comes to establishing
effective national cyber threat intelligence sharing with the private sector.
This book is an attempt to survey and present existing works and proposes
and discusses new approaches and methodologies at the forefront of research and
development.
organizations can enhance their individual security levels by leveraging the knowl-
edge, experience, and capabilities of their partners in a cost-efficient manner. In
particular, each organization is able to augment its internal view with external data
and can thus extend, validate, and correct its cybersecurity situational awareness
through collaborating with others in similar situations.
For instance, if a new vulnerability of a widely used software product is
exploited and applied in multiple attacks on a broad scale, without sharing, every
affected organization would need to investigate the root cause separately. Instead,
with threat intelligence sharing, only one organization is required to do the detailed
analysis and can then provide findings to partners who consume this intelligence
and use it within their own organizational contexts. Eventually, this means that
a piece of information might be relevant for many but trigger different actions,
depending on the degree to which an organization is affected by said exploit.
Besides a more timely and cost-efficient mitigation of threats and response to
actual incidents, this kind of collective defense also leads to significant knowl-
edge enrichment in those organizations that actively share threat intelligence. In
centralized hubs, often represented by national CERTs or ISACs, shared informa-
tion is sanitized, verified, enriched and aggregated and eventually contributes to an
enhanced situational awareness within a specific sector or a whole nation-state (or
even beyond that). Knowing which organizations are currently facing what types of
issues is a key prerequisite for defending against large-scale attacks, especially those
targeting critical infrastructures. Advanced cyber situational awareness is a further
key element to facilitating informed decision making—from an operational as well
as a strategic perspective.
be released, how it needs to be anonymized, and who is responsible for that. But
also, if some intelligence from partner organizations is received, it must be clear
how new insights are being rated and used and which internal processes are trig-
gered. Specific guidelines and well-documented procedures are key prerequisites
for success. Furthermore, the creation of threat intelligence inside the organization
requires extensive monitoring, logging, and analytics—setting these capabilities up
and keeping them efficiently running are not just technical, but also organizational
challenges.
Regarding the technical dimension, one of the biggest challenges is establishing
interoperability between internal and external systems. In other words, incoming
threat intelligence needs to be interpreted, rated, and seamlessly integrated into
internal systems in order to be effective. Every additional manual step, required to
translate and apply external information (e.g., to manually formulate a firewall rule
based on incoming insights) requires extra effort and additional time. Therefore,
automation is a key feature—however, one must keep in mind that a fully auto-
mated threat information import and export is for the most part not feasible. There
should be human supervision to avoid any undesired side effects, such as uninten-
tional system adaption or information leakage due to incorrectly applied automa-
tion. Eventually, smart tools that are able to deal with threat information and make
suggestions for specific organizational contexts are required. This is a key feature of
automated tools, because suspicious behavior can be malicious in one setting and
completely normal in another setting—depending on the normal system behavior,
risk, and utilization.
Finally, legal and regulatory requirements comprise one of the biggest hurdles.
Every time two parties exchange information, they must be very careful to not
harm any legal constraints. Data protection, competition regulations, and nowa-
days even notification obligations need to be precisely followed in order to avoid
any serious consequences. Since this is such an important topic, we cover it in two
separate chapters. Chapter 7 outlines different types of laws that need to be fol-
lowed (with a major focus on the complex situation in Europe with its different
Member States’ legislations), and Chapter 8 highlights some concrete scenarios of
threat intelligence sharing and analysis and argue which of the outlined laws are
applicable under these circumstances.
(e.g., Request Tracker1)], and personnel who report suspicious behavior, social
engineering attempts, and the like.
Typical external sources (meaning “external to an organization”), may include
sharing communities (open public or closed ones; see Chapter 5), governmental
sources (such as national CERTs or national cybersecurity centers), sector peers
and business partners (for instance, via sector-specific ISACs), vendor alerts, and
advisories and commercial threat intelligence services.
Stemming from these sources, it is already obvious that cyber threat intelligence
can be (preferably automatically) extracted from numerous technical artifacts that
are produced during regular IT operations in organizations:
1. Operating system, service, and application logs provide insights into devia-
tions from normal operations within the organizational boundaries
2. Router, WiFi, and remote services logs provide insights into failed login
attempts and potentially malicious scanning actions
3. System and application configuration settings and states, often at least partly
reflected by configuration management databases help to identify weak spots
due to unrequired but running services, weak account credentials, or wrong
patch levels
4. Firewall, IDS, and antivirus logs and alerts point to probable causes but often
with high false positive rates that need to be verified
5. Web browser histories, cookies, and caches are viable means for forensic
actions after something happens, to discover the root cause of a problem
(e.g., the initial drive-by download and the like)
6. SIEM systems already provide correlated insights across machines and systems
7. E-mail histories are a vital means to learn about and eventually counter
(spear) phishing attempts and follow links to malicious sites
8. Help desk ticketing systems, incident management/tracking systems, and
people provide insights into any suspicious events and actions reported by
humans rather than software sensors
9. Forensic toolkits and sandboxing are vital means to safely analyze the behav-
ior of untrusted programs without exposing a real corporate environment to
any threats
Most of the more important sources of this list are studied in more detail in Chapter 3.
◾◾ Indicators
◾◾ Tactics, techniques, and procedures (TTPs)
◾◾ Threat actors
◾◾ Vulnerabilities
◾◾ Cybersecurity best practices
◾◾ Courses of action (CoA)
◾◾ Tools and analysis techniques
Independent from the type of threat information, there are common desired char-
acteristics of applicable cyber threat intelligence, which are as follows:
2 https://cve.mitre.org/.
3 https://nvd.nist.gov/.
Introduction ◾ 11
1.3.5 C
ornerstones of Threat Information
Sharing Activities
Having identified which information is useful to share and why, this section roughly
outlines the required steps to establish sharing capabilities and keep sharing activi-
ties running. These steps are based on the NIST SP 800-150 guide (NIST, 2016).
Establish information sharing rules: Rules are usually modeled as sharing agree-
ments (expressed in a memorandum of understanding, service level agreement, non-
disclosure agreement, and so forth) and might consist of the following elements:
the types of information that can be shared and the conditions and circumstances
that allow sharing to be permitted, distribution to approved recipients, identifica-
tion and treatment of personally identifiable information, decision whether infor-
mation exchange should be attributed or anonymized, etc.
Join a sharing community: Potential partners and resources depend on the
goals set initially. Potential sharing partners comprise governmental stakeholders,
industry-sector peers, threat intelligence vendors, supply chain partners, vendor
consortia, and so on. Several constraints might hinder an organization from join-
ing a sharing community, such as eligibility criteria and membership fees; types
of information being exchanged; delivery mechanisms, formats and protocols,
and compatibility with its own technologies; frequency, volume, and timeliness of
shared information; security and privacy controls and terms of use.
Plan to provide ongoing support for information sharing activities: Once the
decision to join a community has been made and the required adaptations of
organizational processes and technologies have been applied, it is important to
create and periodically review a support plan that addresses involved personnel,
funding, infrastructure, training, and processes for keeping the sharing activi-
ties alive.
In order to build up trust, regular meetings, virtual or physical, and the support of
frequent communications is absolutely necessary. Effective sharing is not just about
the formal exchange of indicators, but also about the informal discussion of current
threats, the joint development of response and mitigation strategies, the mentoring
of new community members to advance them to a similar maturity level as the rest
of the community, the development of key practices, and the sharing of technical
insights. Many of these activities are supported by national CERTs through mail-
ing lists of different confidentiality levels and even sector-specific physical meet-
ings (refer to Chapter 4 for more details). Informal communication and formal
exchange of alerts, vulnerabilities, and indicators complement each other.
In addition to this informal communication, the formal exchange of informa-
tion can be roughly categorized as incoming or outgoing. If security alerts or bul-
letins are consumed by an organization, there need to be procedures in place for
On the other hand, if new cyber threat intelligence is reported to a trusted com-
munity, or existing information is verified or improved upon, the following basic
steps (often modeled as sharing rules) need to be followed:
is obvious that new approaches are required to keep pace with the developments
and maintain a high level of security in the future. Therefore, this book sheds light
on the required building blocks for a cross-organizational collaborative cybersecurity
approach supported by the state and especially emphasizes their connection, impor-
tant interfaces, and multidimensional implications regarding legal, organizational,
technical, economic, and societal issues. The book has the following structure:
Chapter 1: This book has already started with an extended introduction into
the topic by describing the foundational basis of cyber threat intelligence and the
potential role of nation-states. It further outlines the main challenges, points to a
wide variety of open issues, and establishes the storyline for the rest of the book.
Chapter 2: This chapter outlines and compares five recent large-scale high-
profile attacks and formulates common threat scenarios, including the large-scale
distributed denial-of-service attacks, stealthy espionage, and industrial control
systems manipulation. These scenarios motivate the need for coordinated cyber
defense through threat information sharing and outline some actual challenges of
collaborative cyber defense and establishing situational awareness at the national
level.
Chapter 3: Next, we elaborate on methods that aid the isolation and extraction
of cyber threat intelligence data from log data and network flows. For that purpose,
we shortly introduce the numerous technical means of network monitoring, log
data management, intrusion detection, anomaly detection, and SIEM solutions.
Special emphasis will be put on novel methods that go beyond the state of the art
(since the current state of the art does not seem to be sufficient in the long run).
Chapter 4: Once attacks and cyber threat indicators have been captured, we
proceed to survey the wide variety of information sharing models and identify
connected challenges and constraints. The state of the art will be rated (e.g., CERT
associations, ISACs) especially with respect to compatibility with the mentioned
CISA and NIS directive.
Chapter 5: We elaborate on (peer-to-peer and trust-circle based) cyber threat
intelligence sharing communities that exist today, including their structures,
modes of operation and used tools, such as the malware information sharing plat-
form (MISP) and the tools used by national CERTs and CSIRTs as well as ISACs.
Chapter 6: Once information has been collected from various sources and/or
shared among organizations and the state, it needs to be processed, i.e., normalized,
filtered, and interpreted within a context, in order to establish situational aware-
ness. Various models have been proposed to create common operating pictures at
the state level to facilitate effective decision making. This chapter outlines them and
gives recommendations for their application.
Chapter 7: We devote a chapter to legal implications of cyber incidents and
information sharing across organizations and with a nation-state in light of the
European NIS directive and the US CISA—as two exemplary frameworks. Please
notice that we focus on the European case in greater detail, because the situation is
much more complex than in the USA due to the legal status of the Member States.
16 ◾ Collaborative Cyber Threat Intelligence
List of Abbreviations
CERT Computer emergency readiness/response team
CISA Cybersecurity information sharing act
CoA Course of action
CVE Common vulnerability and exposure
CVSS Common vulnerability scoring schema
European Control System Security Incident Analysis Network
ECOSSIAN
ENISA European Network and Information Security Agency
ICT Information and communication technology
IDS Intrusion detection system
ISAC Information sharing and analysis center
MISP Malware information sharing platform
NIS Network and Information Security Directive
NIST (US) National Institute of Standards and Technology
NVD National vulnerability database
RAT Remote administration tool
SIEM Security information and event management
TTP Tactics, techniques, and procedures
4 http://ecossian.eu/.
Introduction ◾ 17
References
Arbor Networks. 12th Annual Worldwide Infrastructure Security Report, https://www.
arbornetworks.com/arbor-networks-12th-annual-worldwide-infrastructure-security-
report-finds-attacker-innovation-and-iot-exploitation-fuel-ddos-attack-landscape;
2016; accessed April 2017.
European Commission. Directive (EU) 2016/1148 of the European Parliament and
of the Council of 6 July 2016 concerning measures for a high common level of
security of network and information systems across the Union. http://eur-lex.
europa.eu/legal-content/EN/TXT/?uri=uriserv:OJ.L_.2016.194.01.0001.01.
ENG&toc=OJ:L:2016:194:TOC; 2016; accessed March 2017.
ENISA. Detect, share, protect—Solutions for improving threat data exchange among
CERTs. https://www.enisa.europa.eu/ activities/cert/support/data-sharing/detect-
share-protect-solutions-for-improving-threat-data-exchange-among-certs/at_down-
load/fullReport; 2013; accessed March 2017.
ENISA. An evaluation framework for national cyber security strategies. https://www.enisa.
europa.eu/publications/an-evaluation-framework-for-cyber-security-strategies/at_
download/fullReport; 2014; accessed March 2017.
ENISA. ENISA threat landscape 2016. https://www.enisa.europa.eu/publications/enisa-
threat-landscape-report-2016; 2017; accessed April 2017.
Franke, Ulrik, and Joel Brynielsson. Cyber situational awareness: A systematic review of the
literature. Computers & Security 46, 2014: 18–31.
Hewlett-Packard. Countering nation-state cyber attacks. http://h20195.www2.hpe.com/v2/
getpdf.aspx/4AA6-6901ENW.pdf?ver=1.0; 2016; accessed March 2017.
Lewis, Ted G. Critical Infrastructure Protection in Homeland Security: Defending a Networked
Nation. John Wiley & Sons, Hoboken, NJ, 2014.
McAfee Labs. Threats Report., https://www.mcafee.com/au/resources/reports/rp-quarterly-
threats-mar-2016.pdf; 2016; accessed March 2017.
Narang, Satnam. Uncovering a persistent diet spam operation on Twitter, Symantec
Whitepaper, Version 1.0.http://www.symantec.com/content/en/us/enterprise/media/
security_response/whitepapers/uncovering-a-persistent-diet-spam-operation-on-
twitter.pdf; 2015; accessed June 2017.
NIST. Guide to cyber threat information sharing. NIST special publication 800-150. http://
nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-150.pdf; 2016; accessed
June 2017.
OASIS. Structured threat information expression v2.0. https://oasis-open.github.io/cti-
documentation/; 2017; accessed June 2017.
Scarfone, Karen, and Peter Mell. An analysis of CVSS version 2 vulnerability scoring.
Proceedings of the 2009 3rd International Symposium on Empirical Software Engineering
and Measurement. IEEE Computer Society, Lake Buena Vista, FL, October 15–16, 2009.
Shackleford, Dave. Who’s using cyberthreat intelligence and how? SANS Institute.
https://www.sans.org/reading-room/whitepapers/analyst/cyberthreat-intelligence-
how-35767; 2015; accessed June 2017.
Strategy Analytics Wireless Smartphone Strategies Service. Global smartphone OS mar-
ket share by region: Q3. https://www.strategyanalytics.com/access-services/devices/
mobile-phones/smartphone/smartphones/market-data/report-detail/global-
smartphone-os-market-share-by-region-q3-2016#.WBi0jS2LSUk; 2016; accessed
March 2017.
18 ◾ Collaborative Cyber Threat Intelligence
A Systematic Study
and Comparison of
Attack Scenarios and
Involved Threat Actors
Timea Pahi and Florian Skopik
Austrian Institute of Technology
Contents
2.1
Introduction................................................................................................20
2.2
The Definitions of Cybersecurity in a Nutshell...........................................21
2.3
On Cyber Attacks, Cybercrime, and Cyberwar: Emerging
Trends and Threats......................................................................................22
2.3.1 Emerging Technologies and Threat Trends in Cyberspace...............25
2.3.2 A PT Characteristics.........................................................................28
2.3.3 Cyber Kill Chain.............................................................................30
2.3.3.1 Step 1: Reconnaissance......................................................30
2.3.3.2 Step 2: Weaponization.......................................................31
2.3.3.3 Step 3: Delivery.................................................................32
2.3.3.4 Step 4: Exploitation and Initial Intrusion..........................33
2.3.3.5 Step 5: C2 and Lateral Movements................................... 34
2.3.3.6 Step 6: Actions of Intent....................................................35
2.3.3.7 Summary...........................................................................35
19
20 ◾ Collaborative Cyber Threat Intelligence
2.1 Introduction
Organizations and companies face a new worldwide level of sophistication in cyber
attacks due to the continuous evolution of technology. Technological changes, such
as the rise of cloud technology, widely available low-priced bandwidth, and cryp-
tocurrency, bring new security threats. The resulting threat landscape calls for a
paradigm shift and for fundamentally new approaches in cyber defense. Security
breaches and cyber attacks of all kinds are becoming more professional, stealthy,
automated, and complex. These advanced forms of cyber attacks and threat actors
beat traditional defense methods and techniques.
This chapter gives a broad overview of the current threat landscape in the
cyber domain. After discussing the commonly used terms related to cyberse-
curity in Section 2.2, a short description of the latest trends follows within the
cyber landscape. Section 2.3 describes the characteristics of advanced persistent
threats and the common steps of cyber attacks in the form of the cyber kill
chain. Section 2.4 analyzes the five past cyber attacks and illustrates the scenar-
ios in detail in order to give an overview of the relevant attack vectors and com-
mon tactics, tools, and procedures. Section 2.5 discusses the main categories of
threat actors. Finally, Section 2.6 concludes the attack scenarios and common
threat actors and their various characteristics and illustrates the most relevant
cyber threats today.
A Systematic Study and Comparison of Attack Scenarios ◾ 21
and they attack a wide palette of targets driven by different, sometimes hidden
motivations. Only hacktivist groups (Quaglia, 2016), such as Anonymous, Lizard
Squad, Syrian Electronic Army, Inj3ct0r Team, and RedHack, periodically issue
statements on their current hacking campaigns, often related to human rights or
other political agendas. One preferable option is the categorization of cyber attacks
by their targets, for example, government facilities, corporate facilities, or military
facilities. However, the borderlines between these target categories are also blurred.
From a legal and law enforcement aspect, cyber attacks can be divided into
two large categories: cybercrime and cyberwar. In this categorization, cyber espio-
nage and cyberterrorism belong to cybercrime. The main difference is the attacker’s
motivation. In case of cyberterrorism, the threat actors have political, religious,
or ideological motivation, whereas the motivation behind cyberwar is related to
the protection of homeland and national assets (Interpol, 2016). State and non-
state actors conduct cyber operations to achieve a variety of political, economic, or
military objectives. The world has witnessed the development of cyber capabilities
by nation-states quite extensively in recent years. The countries believed to have
the most developed cyberwarfare capabilities are the United States, China, Russia,
Israel, and the United Kingdom. Two other notable players are Iran and North
Korea (Farwell and Rohozinski, 2011).
In the United States, the Department of Defense (DoD), together with other
agencies, is responsible for defending the U.S. homeland and its interests from
attacks, including those from cyberspace (U.S. DoD, 2015).
The DoD has developed capabilities for cyber operations and is still integrating
capabilities into their portfolio of tools and thus the U.S. government. Additionally,
the U.S. Cyber Command was created at the National Security Agency (NSA) for
cyber operations in 2009. Installation owners and operators must partner with the
Military Departments’ Computer Emergency Response Teams (CERTs).
Among DoD’s cyber personnel and forces, the Cyber Mission Force (CMF)
has a unique role within the Department. In 2012, DoD began to build a CMF
to carry out DoD’s cyber missions (U.S. DoD, 2015). In 2016, all CMF teams
achieved initial operating capability. The CMF currently comprises about 5000
individuals across the 133 CMF teams. By the end of the fiscal year 2018, the goal
is for the force to grow to nearly 6200 and for all 133 teams to be fully operational
(U.S. DoD, 2016).
After the cyber attack on the nuclear facility in Natanz, Iran made cyberwarfare
a part of its military strategy and began to establish its capabilities. The cyber attack
triggered the emergence of national hacker groups, such as the Iranian Cyber Army
and the Islamic Revolutionary Guard Corps (Kraus, 2014). In 2011 and 2012, Iran
launched a series of denial-of-service attacks on U.S. banks. Though Izz ad-Din
al-Qassam Cyber Fighters took responsibility, U.S. officials claimed that Iran was
retaliating for Stuxnet and UN sanctions (Zetter, 2015). Iran is rapidly developing
its cyber capabilities; it is suspected to be the organizer of several major attacks in
the region. For instance, in 2012, Iranian hackers struck Saudi Arabia’s national
24 ◾ Collaborative Cyber Threat Intelligence
oil company, Saudi Aramco, nearly obliterating its corporate IT infrastructure and
bringing the company close to collapse (Bronk and Tikk-Ringas, 2013).
Currently, the term cyberwar has no official or generally accepted definition.
After analyzing a great number of definitions of cyberwar, the following definition
presents a trade-off among the diverse approaches (Uma and Padmavathi, 2013):
cyberwar is an escalated state of conflict between or among nation-states in which
cyber attacks are carried out against ICT systems of critical infrastructures as part
of a military campaign (NATO CCDCOE, 2016).
As the past incidents and attacks show, it is not unusual for political conflicts
to escalate in cyberspace.
a wide palette of cybercrimes putting every citizen at risk, from phishing e-mails
through online blackmailing to data exfiltration.
Cybercrime is so fast growing that international law enforcement agencies
opened an additional category for the most wanted cyber criminals. The nature of
cybercrime has evolved remarkably in its quite short history. In the past, cybercrime
was committed mainly by individuals (Interpol, 2016). Today, it is committed by
highly organized and professional groups from all over the world. The crimes are
not necessarily new, but the TTPs are continuously evolving with the opportuni-
ties presented by the evolving ICT. Cybercrime as a concept is much broader than
just crime alone as it also covers the wider issues of unacceptable or undesirable
behavior (Yar, 2013). Cybercrime often falls still into a regulatory gray area, and the
ability to categorize the true scale and criminal nature of cybercrime remains dif-
ficult (Hunton, 2009). Past incidents revealed that even governments might recruit
and sponsor hacker groups to support espionage (Geers et al., 2016). Some of these
campaigns became public, such as GhostNet, Moonlight Maze, and Titan Rain,
just to mention a few (Geers, 2015).
low-maintenance and operation costs and the short path to anonymous monetiza-
tion thanks to Bitcoin.
The anonymity provided by cryptocurrency, especially by Bitcoin, led to a
rising number of ransomware attacks on soft target organizations. Modern ran-
somware attacks increasingly target small businesses, local government, and medi-
cal institutions due to their historically often poor information security maturity
levels. Because of the lack of regular backups and suitable protective measures in
these organizations, different ransomware tactics have evolved. The Hollywood
Presbyterian Medical Center for example decided to pay the ransom in order to
restore access to its files according to their official release (Hollywood Presbyterian
Medical Center, 2016). There is a wide range of ransomwares in use, such as Locky,
CryptoWall, TeslaCrypt, CoinVault, and CTB-Locker. The increasing cases of ran-
somware infections can be partly explained by the Ransomware-as-a-service (RaaS)
business model for instance with Raas Shark, Stampado, or Encryptor. This par-
ticular strategy has been proven to be highly lucrative for cyber criminals, allowing
malware creators to earn from their ransomware by enlisting a network of distribu-
tors. The scheme works because one type of ransomware can be sold and spread by
multiple distributors, with the creator getting a cut from their profit (Trend Micro,
2016).
Distributed denial-of-service (DDoS) attacks represent a valid concern. DDoS
attacks continue to increase in frequency, complexity, and size and focus mainly
on cloud services, financial services, and the public sector (Verisign, 2016). DDoS-
as-a-Service (DDoSaaS) is a flourishing business today thanks to the anonymity
provided by cryptocurrency and the Deep Web (the part of the Internet that can-
not be discovered by using traditional search engines. It contains web pages, data-
bases, networks, and online communities that are hidden from average users). The
terms Deep and Dark Web need further explanation: Dark Web is a part of the
28 ◾ Collaborative Cyber Threat Intelligence
Deep Web. The Dark Web is based on secured networks where connections are
made between trusted peers (Ciancaglini et al., 2016), using TOR1, Freenet2, or
I2P3. Nowadays information located on the Deep Web is estimated to be 400–550
times larger than the information on the Surface Web. Hence, the Deep Web is the
largest growing part of the Internet (Bergman, 2001) and massively increases the
number of threats. A series of new off-the-shelf tools are commoditizing the art
of hacking. This makes it possible for everybody, even with little know-how, to
launch attacks by renting services from the Dark Web. Available services allow, for
instance, the renting of botnets for a small fee from botnet owners for the purpose
of launching DDoS attacks. These Booters (botnet owners) are popular on the
black market because they make tracking harder.
Another legitimate concern is the growing number of large-scale attacks against
critical infrastructures and industrial control systems (ICS). There is an increasing
interest in industrial products as targets. A significant incident was the successful
attack on the Ukrainian power grid, which resulted in a large-scale power outage
(U.S. DHS ICS-CERT, 2016). Countless organizations have fallen prey to cyber
attacks, even large companies with advanced defense methods. In recent years, a
new category of cyber threats hit the mainstream, namely, the advance persistent
threats (APTs). APTs are carried out by sophisticated and well-resourced adversaries
targeting specific information in high-profile companies and governments, usually
in a long-term campaign involving different methods and tools, such as the latest
zero-day vulnerabilities, sophisticated toolkits, and social engineering techniques.
2.3.2 APT Characteristics
The history of APTs (focusing on cyber-nuclear espionage) goes back to the mid-
1980s when computers and networks expanded throughout the defense and mili-
tary establishment (RUSI, 2016). After the first “cyber espionage” case in 1968, the
volume and scope of APTs have grown exponentially.
The U.S. National Institute of Technology (NIST) provides an appropriate def-
inition of an APT, which also distinguishes between cyber attacks and the resulting
APTs. According to the official definition, an APT is carried out by “an adversary
that possesses sophisticated levels of expertise and significant resources which allow
it to create opportunities to achieve its objectives by using multiple attack vectors
(e.g., cyber, physical, and deception). These objectives typically include establish-
ing and extending footholds within the information technology infrastructure of
the targeted organizations for purposes of exfiltrating information, undermining
or impeding critical aspects of a mission, program, or organization; or positioning
itself to carry out these objectives in the future. The advanced persistent threat:
(i) pursues its objectives repeatedly over an extended period of time; (ii) adapts to
defenders’ efforts to resist it; and (iii) is determined to maintain the level of inter-
action needed to execute its objectives” (NIST, 2011). Traditional cyber attacks
focus on harvesting personal information of unaware users for financial gain.
Unlike common cyber threats, which usually simply exploit a present vulnerability,
independently from the user or owner, APTs focus on specific high-value targets
and their intellectual property or classified information in order to gain strategic
benefits. Another fundamental difference is the attack approach. While common
cyber attacks try to gain personal information from a number of victims in a single
attack with a few steps, in APTs an attacker carries out multiple steps over a lon-
ger time span. Usually attackers try to directly lure victims to fake websites with
the help of phishing e-mails, trying to make them enter their credentials or even
their credit card information. APTs are much more sophisticated. Unlike the short-
term attacks, they launch attacks in numerous stages while staying stealthy on the
victim’s systems. APTs start repeated attempts to access the target system within
long-term campaigns. As APTs target advanced victims, mainly governmental
organizations, finance, high-tech, and consulting companies (FireEye, 2016), they
may need more time and advanced tools to penetrate the company’s defense line
while remaining undetected. Therefore, the threat actors of APTs are usually well-
resourced and organized groups with deep technical know-how.
Generally, common cyber attacks can be considered battles, and an APT can
be regarded as a military campaign combining methods of common cyber attacks.
Like great military campaigns, APTs need precise planning, including multiple
phases and steps. The experience of recent years shows that every large-scale cyber
campaign applies its unique techniques. But the tactics of APT attacks are often
similar; therefore, the phases are predictable. They differ mainly in the techniques
used in the different phases (Chen et al., 2014). Table 2.2 provides an overview of
the characteristics of common cyber threats and APTs.
2.3.3.1 Step 1: Reconnaissance
The first phase after choosing the potential target is reconnaissance. The recon-
naissance process covers a wide range of information-gathering activities. In this
phase, the threat actor tries to collect all relevant information about the target
organization in order to discover the target’s technical environment, organizational
processes, and key personnel that could be exploited to achieve the threat actors’
objective. The activities of the first phase are similar to black box penetration test-
ing activities. As in black box testing, hackers do not have adequate knowledge
about the victim organization and its target system in the early phase. The aim
of the reconnaissance is to discover the attack surface of the target system and
1. Reconnaissance
2. Weaponization
3. Delivery
4. Exploitation and
initial intrusion
5. C2 and
lateral movements
5. Actions of intent
to find the most efficient ways to penetrate it. A major difference to penetration
testers, however, is that threat actors do not need to discover all vulnerabilities—a
single exploitable weakness is enough to allow an initial compromise. The threat
actors can gain valuable information from open source intelligence (OSINT) or
gain internal information through social engineering.
The following OSINT sources might be relevant for information gathering
or for further social engineering fraud: corporate websites, social networks, press
releases, public documents, white papers, job offers, and search engines. There are
two different methods of information gathering: passive and active reconnaissance
(Pernet, 2014a,b). The main difference is the interaction between the attacker and
the target. In passive reconnaissance, there is no direct interaction, and it usually
leaves no traces. The threat actors use open information sources. Active reconnais-
sance could be the next step after passive reconnaissance. This step needs more
preparation and leaves traces, e.g., as a result from active scanning activities.
2.3.3.2
Step 2: Weaponization
Weaponization covers the preparation of malicious payloads for further attacks. In
this phase, the threat actor has solid knowledge of the target’s attack surface, and
it has identified potential victim employees. Based on this information the threat
actors prepare the next steps for the initial compromise. Weaponization refers
to compiling tailored malware for the discovered vulnerabilities in order to gain
remote access to the target system. The tailored malware with the suitable exploit
is built into a deliverable payload, such as in Microsoft Office documents or Adobe
PDF, in order to compromise at least one device in the target organization. The
most effective method is to create a malicious payload, which uses certain zero day
vulnerabilities, i.e., vulnerabilities not yet publically known).
2.3.3.3 Step 3: Delivery
Delivery covers the transmission of the malicious payload to a target using different
methods, for instance via e-mail attachments, websites, or USB sticks. The delivery
of the exploits could be performed in a direct or indirect way (Chen et al., 2014). The
direct delivery mechanisms utilize various social engineering techniques, such as spear
phishing. As mentioned above, APT attackers combine traditional cyber attacks or
enhance them in order to gain the required access to the system. Phishing attacks
are usually one of two types: the common broad spreading of e-mail messages and
advanced targeted spear phishing using customized e-mail bodies. Phishing e-mails
usually contain a clickable link which forwards the user to a fake website. For instance,
a copy of a legitimate website can lure to victims to enter their credentials or other per-
sonal information and then forwards this harvested information to the hacker in the
background. There are numerous different variations of phishing e-mails using differ-
ent social engineering schemes. Some are very sophisticated and succeed in luring the
victim to even open malicious attachments, which are often executable files embed-
ded in PDF or in Microsoft Office documents. These attachments contain a mal-
ware binary which exploits a software vulnerability and installs stealthy for example a
Trojan horse that will steal information from the infected computer (Pernet, 2014a,b).
Another way for delivering the payload is provided by social networks.
Professional business networks or social networks—such as LinkedIn, Data.com
Connect, Xing, Beyond, and Facebook—provide a huge amount of useful infor-
mation for the APT attackers. APT hackers just need to create a fake profile and
send connection request to the members of the target company. Since high-profile
companies have often hundreds of employees, a small number of the targets will
likely accept the request. As a next step, the attacker sends a link, for instance, in
the traditional phishing e-mail or a malicious attachment. The attacker hopes that
people will fall in a trap while using the internal network of the target company.
In that case, the attacker can compromise the victim’s device within the company
and move on to infect more hosts or even install a backdoor on the target system.
An example for direct delivery is to attack the companies’ Internet servers,
such as e-mail or DNS. After finding vulnerabilities (such as configuration weak-
nesses) on a publicly reachable server, the attacker can compromise further hosts
and install a backdoor. Direct delivery can be reached also by physical access to the
target company or by leaving USB sticks on crowded open places in the company
in order to lure employees to plug the sticks into their office devices.
Indirect delivery happens through a trusted third party of the target company,
causing APT attackers to be hard to trace. A trusted third party can be a supplier
or a legitimate website that is frequently visited or contacted by the target company
(Chen et al., 2014). In indirect delivery a watering hole (Kim and Vouk, 2015)
attack can be used. The goal of these attacks is to compromise a host in the target
company by infecting websites the employees frequently visit. The term watering
hole attack originates from the tactic of predators in a natural world lurking near
A Systematic Study and Comparison of Attack Scenarios ◾ 33
watering holes for their victims. According to this concept, the attacker is waiting
for the target to visit the infected website. The consequence of a watering hole infec-
tion is not only that the member of the target organization but potentially every
user visiting the infected website will be infected. APT attackers could sort the
victims by IP addresses, since they mostly know the IP range of the target system
from the first phase (reconnaissance) of the APT attack.
2.3.3.5
Step 5: C2 and Lateral Movements
The aim is to establish remote access to the target system for further attacks and
investigation. This stage usually takes longer, hence the activities run slowly in
order to evade detection. Backdoors allow attackers to establish connections to
their command and control (C&C or C2) channel. The C2 mechanism takes con-
trol of the compromised hosts. The backdoor installation applies a number of strat-
egies to enable successful intrusion, such as port binding, connect-back, connect
availability use, or legitimate platform abuse (Chiu et al., 2014). In order to remain
undetected, attackers increasingly use more advanced services and tools. Some
APT attackers host their C2 servers in Tor to remain anonymous and avoid being
blocked and blacklisted. APTs take advantage also of legitimate remote access tools
(RATs, which are usually used by system administrators to remotely access and
control computers). When they are used by a malicious user to control the system
without the knowledge of the victim, they are known as Remote Access Trojans
(Kienzle and Elder, 2013). In APT attacks, the commonly used RATs (Adachi and
Omote, 2016) are Poison Ivy RAT, DakComet, Black Shades, njRAT, ZxShell, and
Gh0st RAT (Fagerland, 2012).
The next step after infecting one endpoint or system within the target organiza-
tion is spreading the malicious activity in order to establish a foothold. This can be
carried out in various ways. On the one hand, the APT attacker might have man-
aged to gain the credentials of a privileged user or managed to cause privilege esca-
lation. The Active Directory service (AD) is a preferred target related to privilege
escalation. Once successfully attacked, AD could enable control of the whole net-
work to the threat actors. This step contains, for example, the hidden installation of
many forms of malware, for instance viruses, worms, Trojan horses, and spyware.
These software types have the ability to scan local files and browsing histories,
install other programs, monitor keystrokes and screen, or sniff the network traffic,
cookies, and other applications. These tools help to execute the further activities,
called lateral movement, such as internal reconnaissance, compromising additional
systems, privilege escalation, and identifying valuable assets and information loca-
tion, such as password hashes in the Security Account Manager (Chen et al., 2014).
Lateral movement is an essential part of the whole cyber kill chain. In this book,
the kill chain does not foresee a step for lateral movement, because it is rather a
continuous activity. Others, however, treat it as a single step, and some treat it as
part of the internal reconnaissance or exploitation step. Regardless of where lateral
movement is conceptually located in the kill chain, it covers all secondary activities
in moving deeper into the victim organization.
Input: APT attackers have established foothold and prepared the last attack
Activity: Actions on target, such as data exfiltration, DDoS, paralyzing
essential control systems, etc.
Output: Primary goal achieved
Tools and techniques: FTP, HTTP—both for illegitimate transfers.
2.3.3.7 Summary
Some of these steps overlap and are repeated by the threat actors if necessary. They
represent the common course of actions of APT threat actors. There are different
views on what makes a threat an APT. Some argue that APT is just a marketing
term and that there is virtually no difference between an APT and a traditional
threat; yet others say that an APT is a nation-state sponsored activity that is geared
toward political espionage. APTs are often seen in nation-state sponsored attacks
(which are hard to prove), and they do often use the same attack vectors that tra-
ditional threats leverage, but they also leverage different attack methodologies and
have different characteristics than traditional threats (ISACA, 2014).
The following domains were targeted by APTs: governmental facilities, services
and consulting; technology; financial services; telecommunication services; educa-
tion; aerospace; and the defense and energy sector. In general, zero-day attacks are
an important weapon in every APT arsenal, but in some cases attackers do not even
need them to exploit the target system but rather use known vulnerabilities or social
engineering (FireEye, 2013). APT attacks require complex resources and a high
36 ◾ Collaborative Cyber Threat Intelligence
systems, which was not usual at that time. Additionally, for the first time in history,
a 500-kilobyte code caused major damage in the physical world. Today Stuxnet is
considered to be an American-Israeli cyber weapon for attacking the development
of Iran’s nuclear research program (Broad et al., 2011). Stuxnet targeted a spe-
cific industrial control system in Natanz with the ultimate goal of sabotaging that
facility by reprogramming programmable logic controllers (PLCs from Siemens) in
order to operate outside their specified boundaries (Falliere et al., 2011).
2.4.1.2 Attack Scenario
Stuxnet was detected in July 2010 but was confirmed to have existed at least 1 year
before. Multiple targets may exist, but one of the ultimate goals of the Stuxnet
was presumably to stop the uranium-enrichment activities in the Natanz Nuclear
Facility by targeting its industrial control systems. Industrial control systems (ICSs)
are operated by a specialized assembly-like code on programmable logic controllers
(PLCs). The PLCs are often programmed from Windows computers not connected
to the Internet or even the internal network. In addition, the ICSs themselves are
also unlikely to be connected to the Internet (Falliere et al., 2011). As each PLC has
a unique configuration, the threat actors began with a deep reconnaissance of the
victim system. Reconnaissance presents the most important activities of the cyber
attack, including the mentioned reconnaissance as a common preparation activity.
The Natanz fuel enrichment plant is Iran’s largest gas centrifuge uranium enrich-
ment facility. It began operating in February 2007, in contravention of UN Security
Council resolutions (UN SC, 2006) demanding Iran to stop uranium enrichment.
After gaining the necessary information, the worm was designed to target the
supervisory control and data acquisition (SCADA) systems running on Microsoft
Windows that serves specific Siemens ICSs—namely, WinCC, PCS7, and Step
7 platforms—and connected to specific types of PLCs (see Step 2 in Figure 2.2).
The complete Stuxnet code was presumably tested numerously in imitated target
environments. In order to avoid suspicion, the contained driver files for the attack
should have been signed with official digital signatures (Step 3). While the tar-
get was unlikely to have outbound Internet access, all functions were embedded
directly in the Stuxnet executable (i.e., no payload was fetched in later stages from
an external source) in order to sabotage the uranium enrichment activities. The
preparation of a complex attack, such as performed by Stuxnet may have taken
6 months or more with 5–10 core developers (Kriaa et al., 2012). Due to the strin-
gent security measures of the facility, the SCADA system was not directly con-
nected to the Internet. The delivery of the malicious code happened by infecting
an external device of the corporate network with the help of a USB drive (Step 4).
In order to reach the industrial network, Stuxnet used various propagation
methods. Since the Windows computers used to program the PLCs were nonnet-
worked, Stuxnet tried to spread (see methods in Step 5.A and 5.B in Figure 2.2) to
other computers on the LAN using numerous zero-day vulnerabilities. The number
38 ◾ Collaborative Cyber Threat Intelligence
Internal network Industrial network
Centrifuges
3. Gaining official
signatures for 4. Infection with
avoiding suspicion removable drive
7. Update
through P2P
PLC
P2P communication
RCP server RCP client 5. A
Threat actors Propagation
through 11. Compromised
network PLC
1. In-depth Get version nr.
shares, damaging
reconnaissance, Send version nr.
vulnerabilites the centrifuges
focus on specific
ICSs Request last version and exploits
Send last version
2.Weaponization,
testing and tailoring
TTPs
Internet
5. B Propagation via PLC
removable drives e.g., with STL code on it
of used zero-day exploits is unusual, as they are highly valued, and malware creators
do not typically make use of four zero-day exploits in the same worm (Fildes, 2010).
The Stuxnet worm used the following methods to spread: peer-to-peer (P2P) com-
munication, infection of WinCC machines using hardcoded database server pass-
words (zero-day exploit), propagating through network shares (or using Windows
Management Instrumentation operations), and propagation through MS10-061
Print Spooler Zero-Day (Microsoft, 2010) vulnerability and MS08–067 Windows
Server Service vulnerability (Microsoft, 2008).
To update the latest version of the malware (Steps 6 and 7), Stuxnet could either
establish a P2P communication by installing a remote procedure call (RPC) server on
the infected machine and wait for connections from RPC clients or it could directly
download the latest updates from a preconfigured C2 server if the host had a connec-
tion to the Internet. In P2P communication, the client and the server shared their ver-
sion number. If the remote version were newer, then the local computer would request
the new version and update itself (see Step 7). Through these methods, the worm
propagated itself autonomously in order to reach the industrial network (Step 8) and
continued the self-replication while searching for the ultimate target systems (Step 9).
When Stuxnet finally hit a suitable computer—on which the target ICS plat-
form ran—it reprogrammed PLCs in a way that modified the system operation
leading to damage to the physical equipment under control. Stuxnet targeted PLCs
on sites using Siemens SIMATIC WinCC or Step 7 SCADA systems (Matrosov
et al., 2011). When Stuxnet detected a system running the WinCC database soft-
ware, it connected to the database using a further vulnerability with hardcoded
passwords (CVE, 2010). It allowed a local user to access a back-end database and to
gain privileged access to the system (Falliere et al., 2011). This means not only that
the threat actors acquired the password through reverse engineering, but that the
system would not continue to work if the password was changed (Matrosov et al.,
2011). Once the connection was successful, Stuxnet performed two actions. First,
it sent a malicious SQL code to the database that allowed a version of Stuxnet to be
transferred to the computer and thus started to propagate itself. Second, it modified
an existing view, such as the safety value related to pumps, and the worm deleted
the traces of the modifications made. Because of the manipulated data displayed,
the operators of the power plant were not aware of the corruption of their system.
Stuxnet took advantage of the MS10-061 Print Spooler vulnerability, which
exists only where a printer is shared. The vulnerability allows remote code execu-
tion if an attacker sends a specially crafted print request to a vulnerable system that
has a print spooler interface exposed over RPC. A further vulnerability, MS08-067,
was used with similar effects. MS08-067 Windows Server Service vulnerability
allows remote code execution if an affected system receives a specially crafted RPC
request. Stuxnet used these vulnerabilities to propagate itself to unpatched remote
computers besides the delivery via removable drives.
The ultimate attack was designed to modify PLCs through accessing the WinCC
or Step 7 software (Step 10). PLCs run codes written in different languages, for
40 ◾ Collaborative Cyber Threat Intelligence
instance STL or SCL. A specific dynamic link library (DLL) is responsible for han-
dling PLC block exchange between the programming device and the PLC. Stuxnet
was able to monitor PLC blocks, infect a PLC by inserting blocks, and mask the
fact that a PLC is infected by replacing the required DLL file (Falliere, 2010).
Eventually, the compromised PLCs caused heavy damage to the centrifuges used
for uranium enrichment (Step 11) (Kriaa et al., 2011), and thus, Stuxnet resulted in
slowing down Iran’s whole nuclear research program (Matrosov et al., 2011).
2.4.2.2
Attack Scenario
There is no conclusive evidence about the detailed reconnaissance steps executed
by the threat actor. But due to the highly synchronized and multistage attack, deep
reconnaissance of the targeted electricity distribution systems operators (DSOs)
was required to find the potential victim e-mail addresses for the following phish-
ing attempts (see Step 1 in Figure 2.3).
Referring to the model of the cyber kill chain, in the weaponization phase
(Step 2) the threat actors tailored the applied malware and spear-phishing e-mails
based on the information harvested in the reconnaissance step. This phase also
5. Black Energy builds
a connection to
Business network
4. Enabling macro6. Harvesting 7. Gaining 12. Launching DDoS
C2 server functionality to internal informationpermanent access by on the vendor’s call
trigger malicious inc. credentials using SSH backdoorscenter
activity
Call center
3. Delivery via
Threat actors phishing mails with Administrative network
weaponized Microsoft
1. Passive and active Office documents 8. Access to ICS VPN Tunnel
Industrial network
reconnaissance with network through
social engineering VPN tunnel
2. Tailoring spear- SCADA environment
phishing e-mails and
adapting malware
covers the manipulation of Microsoft Excel and Word documents to embed the
malware BlackEnergy 3.
The BlackEnergy 3 malware was delivered via phishing e-mails with weapon-
ized Microsoft Office documents to specific individuals within the target company.
For the receiver, the crafted e-mails appeared to originate from a trusted source in
the administrative and IT Network (Step 3).
The exploits were activated by enabling the macro functionality of Microsoft Office
documents. Enabling the embedded macro triggered the installation of BlackEnergy
3 without using customized exploit codes (Step 4). The malware was only used to
establish a foothold within the victim system. After installing BlackEnergy 3 on some
victim systems, the malware connected to C2 IP addresses to activate the communica-
tion between the remote threat actors and the compromised systems (Step 5).
The next steps belong to the lateral movement step of the cyber kill chain.
The threat actors began to deeply map (i.e., discover) the victim system, as a so-
called internal reconnaissance. This activity prepared the later steps; therefore, it
took presumably the largest amount of time in the whole attack. Lateral move-
ment covers enumerating key information about the target environment, elevating
privileges and stealing sensitive information (Step 6). Target information includes
environment information, such as about domain controllers, network diagrams,
user directories, and proxy settings; system information, for instance about running
applications and services, active system configurations or antivirus vendors; and user
information, such as logged-in users, admin account lists, and password hashes. The
threat actors appear to have gained access to internal systems more than 6 months
before the power outage. Within this period, they established a foothold and gained
permanent access to the victim system by using SSH backdoors (Step7). By har-
vesting legitimate credentials with the help of keystroke loggers, the threat actors
were able to identify VPN connections without two-factor authentication from the
business network into the ICS network. This made it possible for the attackers to
enumerate the ICS network, as they did it within the enterprise network. The threat
actors gained access with stolen credentials into network segments where SCADA
A Systematic Study and Comparison of Attack Scenarios ◾ 43
dispatch workstations and servers existed (Step 8) (U.S. DHS ICS-CERT, 2016).
They discovered and learned how to manipulate the distribution management sys-
tems and the uninterrupted power supplies of the three DSOs in order to execute
later the coordinated attack. Additionally, the threat actors developed and tested a
malicious firmware for some of the DSOs’ devices in advance (Step 9). The delivery
happened with the help of remote access Trojans, such as the updated version of
BlackEnergy 3, and via VPN access into the IT environment.
Before executing the final attack, the threat actors added malware, called
KillDisk, which destroyed essential parts of hard disks and made a last modifica-
tion to take control of the operator workstations and lock the operators out of their
systems (Step 10). In the final attack, they executed simultaneously three actions:
take numerous substations offline using the HMI of the SCADA environment,
load the malicious firmware onto the devices and execute denial-of-service attacks
on the DSO’s call centers (Steps 11 and 12). The combination of these measures
was extremely effective for disturbing the incident response measures of the DSOs.
The threat actors succeed in disconnecting several substations for 4 hours and
cut off 225,000 customers from electricity supply (U.S. DHS ICS-CERT, 2016).
Researchers from the Ukraine confirmed a second power outage on December
16, 2016, resulting from a cyber attack (Higgins, 2017). Ukrainian officials claimed
to have identified Russian hackers as the perpetrators, and Ukraine President Petro
Poroshenko revealed that his nation had suffered 6500 cyber attacks originating
from Russia in a period of 2 months. The latest cyber attack targeted the Pivnichna
remote terminal units (RTU). RTUs are microprocessor-controlled electronic
devices used as interfaces between objects in the physical world and a SCADA
system (Gordon et al., 2004). The attack hit the RTUs controlling circuit breakers
and caused a power outage for about an hour.
2.4.3.2 Attack Scenario
As all other complex cyber attack, this one began with a reconnaissance phase (Step
1 in Figure 2.4). It most likely started with a scan of the victim’s network including
44 ◾ Collaborative Cyber Threat Intelligence
active, random, or stealth scanning methods. In this phase the threat actors found
out that like in many organizations, the relevant IT infrastructure of Sony is run
on Microsoft Windows Server platforms. Their first aim was to become an authen-
ticated user. By applying social engineering, the threat actors got an official account
(e.g., as a temporary contractor) (Step 2). In this scenario, weaponization and there-
fore delivery and exploit steps were executed only after a first privilege escalation.
The initial intrusion was carried out after gaining legitimate user credentials.
As an authenticated user, the threat actors got read access to internal informa-
tion, such as to the list of all administrative accounts, which permit access to the
Active Directory (Step 3) (Novetta, 2016). The next step was to escalate privileges
of the utilized account to administrator level and then apply Active Directory (AD)
Privilege Escalation (Step 4). Lateral movements enabled the attackers to gain the
required knowledge about the machines on which the escalations could be per-
formed. In Windows AD, there are two common methods to escalate privileges.
The most used way is the Pass-the-Hash (PtH) attack. A typical hash-based login
system, such as previously used by Sony, contains the following four basic steps:
first, the user registers and assigns a password; second, the password is hashed and
stored in the database; third, when later logging into the system, the hash of the
entered password is checked against the hash saved in the database, and finally, if
the hashes match, the user will be granted access. This procedure has weaknesses,
such as exploitable password policies or weak hashes. PtH attacks exploit the design
flaws in hash-based login systems by capturing and replaying hashes without the
need for recovering the plain-text password. Another way of AD privilege escala-
tion is performing password resets and applying tools to gain administrative access
without logging into any specific machine (Shancang et al., 2016).
As part of the lateral movement, the attackers (GOP) installed the so-called
wiper malware (named BKDR_WIPALL.A) used to establish a foothold within the
victim system in Step 5. According to the experts at Trend Micro, once the BKDR_
WIPALL.A successfully infects a machine, it drops the BKDR_WIPALL.B agent
on the target, which is disguised as a file named “igfxtrayex.exe” and is the malware
component ultimately responsible for causing the damage (Trend Micro, 2016).
Once it has been installed, BKDR_WIPALL.B sleeps for 10 minutes, after which
it starts deleting files and stops the Microsoft Exchange Information Store service.
The malware then sleeps for 2 hours and forces a system reboot. The researchers
explained that BKDR_WIPALL.B (Trend Micro, 2014a,b) is also able to execute
copies of itself with various parameters, a feature that allows the malware to carry
out several tasks, including deleting files and dropping additional payloads. The
additional component “usbdrv32.sys” for example gives attackers read and write
access to local files. Trend Micro discovered a different variation of the malware,
named BKDR_WIPALL.D, which drops BKDR_WIPALL.C, this agent in turn
drops an image file called “walls.bmp,” which is the exact “Hacked by GOP” pic-
ture that was displayed on infected system at Sony Pictures (Pierluigi, 2016).
Internet
9. Releasing stolen data 3. Internal 4. Escalate 5. Installing wiper
Business network
reconnaissance as privileges to malware for
2. Gaining official
account and valid
Threat Actors credentials with Administrative network
social engineering
1. Passive and active 6. Accessing internal
Internal network
reconnaissance network with
administrative rights
8. Blackmailing Sony Mail Server
10. Paralyzing the
network by deleting Internal data servers
and destroying
essentail data on
servers and hosts
Management server
After successful privilege escalation, the threat actors were able to perform
internal reconnaissance in order to find all interesting documents, e-mails, and
confidential data within the internal servers and began with data exfiltration (see
Steps 6 and 7). The threat actors were able to copy, tamper, and delete all docu-
ments with administrator rights. These kinds of activities (or events) left traces
in the audit logs, but organizations pay little attention to audit entries related to
Domain Admin logons (Cyber Security, 2013). The GOP sent an e-mail addressed
to the Sony Pictures CEO and forced the company not to release the movie and
pay monetary compensation (Step 8) (Franceschi-Bicchierai and Warren, 2014).
After Sony refused to do that, the GOP released the exfiltrated data into the public
domain and caused the studio’s network to be offline for a week due to the fact that
the network needed to be rebuilt (Steps 9 and 10) (Abdollah, 2015).
According to official U.S. documents, North Korea conducted a cyber attack
against Sony Pictures Entertainment, rendering thousands of Sony computers
inoperable and breaching some of Sony’s confidential business information. In
addition to the destructive nature of the attacks, the attackers stole digital copies
of a number of unreleased movies, as well as thousands of documents containing
sensitive data regarding celebrities, Sony employees, and Sony’s business operations
(U.S. DoD, 2015).
In summary, the threat actors compromised one of the highly privileged
accounts and gained access to all accounts and their passwords, all security poli-
cies, mobile devices, all servers, applications and data. Adversaries with sufficient
resources (time, money, skills) and the motivation to invest these might be able to
carry out similar attacks against a wide variety of organizations—some vague esti-
mations state that up to 85% of all organizations worldwide are vulnerable to this
sort of attack (Cyber Security, 2013).
that had been infected with the Mirai malware (Hilton, 2016). With 60 of the
most-used default usernames and passwords, such as “admin” and “1111,” Mirai
was able to break into 500,000 IoT devices (Cluley, 2016). The threat actors are still
unknown due to the lack of convincing evidence. The hacker groups—Anonymous
and NewWorldHackers—claimed responsibility for the attack (Pierluigi, 2014).
With an estimated load of 1.2 terabits per second, the attack is, according to numer-
ous experts, the largest DDoS on record (The Guardian, 2016).
2.4.4.2 Attack Scenario
The DDoS attack targeted the servers of Dyn with the help of infected comput-
ers as a part of the Mirai botnet. Recently, IoT devices were used to create large-
scale botnets—networks of devices infected with self-propagating malware—that
can execute crippling DDoS attacks (U.S. DHS US-CERT, 2016). An IoT bot-
net based on several variations of the Mirai malware created at least two waves of
DDoS attacks. The Mirai malware continuously scans the Internet for vulnerable
IoT devices, which are then infected and used in botnet attacks. Dyn estimated
that the attack involved 100,000 malicious endpoints (Mansfield-Devine, 2016a,b).
There are different methods for distributing a particular bot. A common method
is using web-based infections with malware, potentially through infected e-mail
attachments. On the other hand, bots can automatically scan their environment
for vulnerably hosts, exploit their vulnerabilities, and compromise them (see Figure
2.5). Botnets usually expand by remotely exploiting the vulnerability of new victims.
In our attack scenario, the Mirai bot used a list of common default usernames and
passwords to scan for vulnerable devices. Because many IoT devices are unsecured
or weakly secured, this short dictionary allowed the bots to access hundreds of thou-
sands of devices (Ducklin, 2016). Unlike other botnets, which are typically made
up of computers, the Mirai botnet is largely made up of IoT devices such as routers,
embedded Linux servers, digital video recorders (DVRs), residential gateways, and
other IoT devices (see in Figure 2.5 as vulnerable IoT devices). Mirai—a piece of
Linux malware—is used to transform IoT devices into DDoS botnets. The threat
actors first gained shell access to the target devices by taking advantage of the fact
that most have a default password set for the SSH or telnet account and then loaded
the malware (Zorz, 2016). Another weakness of many IoT devices is that they, due
to limited computing resources and intended low power consumption, store or send
data with weak encryption or even in plaintext. When an infection was achieved,
the victim executed a script and downloaded the actual bot binary. The bot binary
installed itself to the victim IoT devices and started automatically. The new bot
contacted a DNS server to get the IP address of the Internet Relay Chat (IRC) server
(Step 4). This is, besides HTTP and P2P, the most common protocol for communi-
cation between the bots and the Botmaster. After getting the IP address of the IRC
server, the bot established an IRC session with the server and joined the C2 channel.
Then the bot automatically parsed and executed received commands.
Botmaster
Threat actors
9. Mitigation
IoT 7. Scanning measures
for other
vulnerable
IRC servers IoT devices 8. Launching DDoS
IoT against Dyn
servers
1. Bots are
Attack waves:
scanning for
12:10 – 14:20 UTC
vulnerable
16:50 – 18:11 UTC
devices
21:00 – 23:11 UTC
2. Using 4. DNS lookup
exploits
e.g., default Result: increased DN
passwords Squery latency, delayed
zone propagation, service
6. Sending 3. Compromised disruption of numerous
commands to by downloading services and platforms
the bots bot malware
Legend
Mirai Botnet’s
Mirai botnet
current boundary
Compromised hosts execute commands, which have been received from the
Botmaster via IRC channels (Step 5). These commands include to compromise
new hosts, steal sensitive data, send spam and phishing e-mails, or launch a DDoS
attack such as in this case (Step 6) (Li et al., 2009). Additionally, the Mirai mal-
ware sets up several delayed processes and then deletes malicious files that might
alert users of its existence (Zorz, 2016). Once an IoT device has been successfully
compromised and integrated into the Mirai botnet, it immediately begins scanning
for other vulnerable devices to expanding the botnet (Step 7). The original Mirai
botnet had nodes observed in China, Hong Kong, Macau, Vietnam, South Korea,
Thailand, Indonesia, Brazil, and Spain. The Mirai botnet served as the technical
basis for DDoS-as-a-Service. DDoS-as-a-Service (DDoSaaS) allows attackers to
launch their DDoS attacks against the target(s) of their choice in exchange for
monetary compensation, generally in the form of Bitcoin payments. While the
original Mirai botnet is still used today (February 2017), multiple threat actors
have been observed to customize and improve the attack capabilities of the original
botnet code, and additional Mirai-based DDoS botnets have been observed in the
wild (Dobbins and Bjarnason, 2016).
The Botmasters gave the commands to attack the Dyn servers on September
21, 2016, in several waves (Step 8). According to the analysis of the attack made
by the victim organization, the data centers were flooded with a packet volume
40–50 times higher than normal DDoS attacks. The attacks were launched in three
waves against the Managed DNS platform mainly by using TCP and UDP packets
(Hilton, 2016). In response to the attack, the victim organization activated some
response techniques, such as traffic shaping, rebalancing by manipulation of any-
cast policies, application of internal filtering and deployment of scrubbing services
(Step 9). Despite all mitigation measures, the DDoS attack resulted in increased
DNS query latency, delayed zone propagation, and service disruption of several
services and platforms hosted by the Dyn company, such as AirBnB, Box, Github,
Reddit, Spotify, and Twitter.
2.4.5.2 Attack Scenario
Similar to the previous scenarios, this started with an extensive reconnaissance
phase. It covered passive and active information gathering about the victim orga-
nization. The gained information includes for instance target IP ranges, platforms,
and actual user behavior derived from the collected data (see Steps 1 and 2 in
Figure 2.6).
The weaponization phase draws from this information. For instance, the most
visited site can be derived from the observed browsing behavior patterns and can
be used for watering hole attacks (Greene, 2015). In order to ensure the successful
intrusion into the victim’s systems, the data collected in the reconnaissance phase
should be matched to individual users. This approach is called fingerprinting. Every
system has a digital fingerprint created by the personalized system configuration,
such as fonts, screen-resolution, plug-ins, time zone, and system colors (Kurtz et al.,
2016). Cookies were earlier used for browser fingerprinting, but in contrast to the
digital fingerprints, cookies can be deleted from the system. In our scenario, active
fingerprinting was applied by using mainly JavaScript in order to query the unique
characteristics of the victim systems. The active fingerprinting enabled the selection
of potential exploits depending on the target’s configuration. In the case of a lack
of suitable exploits, social engineering techniques were applied for the infection.
The delivery and intrusion were executed by activating watering holes and send-
ing spear phishing e-mails. Based on the reconnaissance information, the threat
actors were aware of the victims’ most visited sites for water holing. The watering
hole contains a redirection to malicious websites. According to the Swiss CERT
report (Swiss GovCERT, 2016), the malicious site checked whether the IP address of
the visitor was on the target list. If it was, a basic fingerprinting script was returned.
The result of the fingerprinting process was delivered to the threat actors. The script
collected fundamental information, such as current date and time of the device,
and the external IP address. Based on the results, the threat actors decided whether
a device was on the target list. In the following step, an advanced fingerprinting
A Systematic Study and Comparison of Attack Scenarios ◾ 51
script was delivered in order to gain more information about the potential victim.
The collected information helped the threat actor to decide whether the device
should be infected by sending an exploit or by social engineering (see Step 3 in
Figure 2.6). The social engineering activities were supported by various tools, for
instance by the Browser Exploitation Framework (BeEF4). Whether compromised
by a tailored spear phishing e-mail or browsing to an infected website (see Step
4), Trojans—either Trojan.Turla or Trojan.Wipbot—were installed onto the victim
system (see Step 5.A and 5.B). The threat actors used Wipbot to download updated
version of Turla after the initial infection (Symantec, 2016).
The delivery was followed by the exploitation phase, implemented in two stages.
The exploitation enabled the internal reconnaissance within the victim system
through various tools. Basic reconnaissance tools were applied in the first stage.
The aim of the first stage was to figure out whether the infected device was actually
interesting to the threat actors. In the second stage, the basic reconnaissance tools
were replaced by advanced tools from the Turla malware family. These sophisti-
cated reconnaissance tools injected themselves into already existing processes as
additional threads in order to become invisible on the running systems. The victim
company unfortunately preserved only the log files after September 2014, which
makes a thorough analysis hard. However, these log files show communication
between the infected machines and their C2 servers. Most of the C2 servers were
actually deployed on legitimate machines, which had been hacked by the threat
actors and misused for their own purposes. The infected devices built a kind of
peer-to-peer network and communicated through windows named pipes (Step 6).
The stage 2 malware tools set up a botnet hierarchy of the infected devices consist-
ing of two groups. The group of the worker drones was responsible for executing the
commands and gathering information, and the supervisory group of communica-
tion drones was responsible for communicating with the C2 servers and later for
exfiltrating stolen data (drones are marked with letter W or C in Figure 2.6).
As usual, lateral movements included gaining credentials and escalating privi-
leges. In the second stage of the infection, identified devices were compromised with
Trojans with administrative privileges. Therefore, privilege escalation was required
for gaining ultimate persistence. The lateral movements—for instance stealing cre-
dentials, privilege escalation, or remote code execution—were executed with the
help of self-written scripts and publicly available tools and exploits (see Step 7). For
instance, the Mimikatz tools were used for getting plaintext passwords, hashes,
and Kerberos tickets out of the victim system; extracting certificates and private
keys; and performing Pass-the-Hash and Pass-the-Ticket attacks (Swiss GovCERT,
2013). At the end of the patient lateral movement phase, the threat actors gained
control of the Active Directory.
W W
2. Active reconnaissance 6. Building botnet
with fingerprinting 4. Delivery Communication
Preparing target IP ranges 4. A sending spear 7. Lateral movements drone
and list of potential target phishing
devices Worker drone
4. B activating
waterholes 4. B Watering hole attack
C
3. Weaponization based on W
I. Analyzing web activity of the victim
observed behavior patterns
and fingerprinting results
II. Victim’s most
Preparing
visited sites are 8. Data exfiltration
tailored attacks
infected
Redirection to Basic
malicious website Fingerprinting
III. Malicious site script
checkes whether IV. Fingerprinting script is executed on the
the IP of the malicious server for collecting information of
visitor is on the the potential victim
Threat actors target list
In the last step, the threat actors began with the data exfiltration, performed
slowly in order not to be discovered. As mentioned earlier, only the communication
drones sent stolen data out of the victim system to the C2 servers (see Step 8). The
available proxy logs of the victim system showed that data was exfiltrated in several
stages. In total ~32 GB of data were sent to the C2 servers usually in a compressed
form in an 8-month period.
According to investigations, the Swiss defense ministry and the government-
owned defense firm (RUAG) were victim of industrial espionage. The threat actors
caused no damage to the defense ministry or federal administration network,
according to the statement of the Swiss defense ministry. Russia is suspected of
being behind the computer attacks. This is not the first computer attack against
government computer networks. The federal authorities have already been the tar-
get of hackers three times since 2011. In October 2009, hackers used malware to
target the Swiss foreign ministry, entering its computer network and accessing vari-
ous sensitive documents.
launching the waves of their DDoS attacks. The threat actors of these two incidents
were likely hacktivists. The Guardians of Peace took the responsibility for the Sony
Hack, and the hacker groups—Anonymous and NewWorldHackers—claimed
responsibility for the Dyn DDoS attack. The common aspect of the advanced cyber
attacks is their aim, mainly sabotage, espionage, and the theft of intellectual prop-
erty—such as corporate or state secrets and strategy documents—for instance, for
gaining economic or political advantage even at national and international levels.
Table 2.4 summarizes the steps of the cyber attacks mapped in the cyber kill
chain. There are common steps required to carry out a successful cyber attack, such
as the reconnaissance and lateral movement for establishing a foothold. Common
TTPs to achieve the initial intrusion are stealing legitimate credentials by social
engineering, use of backdoors, keyloggers, form-grabber or spyware, or brute forc-
ing credentials. Another important issue is that even sophisticated attacks do not
necessarily use technical exploits for initial intrusions, especially not zero-day
exploits, but rather employ social engineering techniques with spear phishing or
watering hole attacks. The common aim after delivery of the malware or after ini-
tial intrusion is a privilege escalation to facilitate movement within the compro-
mised network. The lateral movements are very different since they depend on the
ultimate goal of the cyber attack and the victim’s infrastructure; however, this step
usually prepares the actual attack inside the victim’s system and aims at hiding the
traces left behind.
All in all, the emerging TTPs continuously challenge current security solu-
tions. Cyber attacks are becoming less linear in following the cyber kill chain. So
they have become harder to detect, as steps are skipped, repeated, or only partially
applied, thereby reducing the threat profile (Hanford, 2014).
2.5 Threat Actors
This section aims to define a number of different groups of threat actors. Threat
actors cover a wide range of knowledge, abilities, motivation, applied tactics, tech-
niques, and tools, and their actions have various effects and consequences from
rather harmless local impact to national security impact. Threat actors are difficult
to discover in cyberspace, because they invest quite some effort to not leave clear
traces in order to preserve their anonymity. Threat actors use various hiding tech-
niques, such as proxy servers, virtual private networks, or peer-to-peer software
within cyberspace (Hanford, 2014). Attribution is also difficult and misleading
based on time zone, location of the physical servers used in the attack, nation-
specific tools and techniques, and language indicators (Summers, 2014).
The TTPs applied in cyber attacks are as diverse as the threat actors who are
using them. A cyber threat actor or threat actor (often referred to as an adversary)
is a person or group that targets another person or organization with a motivation.
Threat actors can be external or internal to a target, and some can even be involved
56 ◾ Collaborative Cyber Threat Intelligence
Table 2.4 Steps of the Cyber Attack Scenarios
Cyber
Kill Power Outage in RUAG Cyber
Chain Stuxnet Ukraine Sony Hack IOT DDoS Attack Espionage
þ Passive and active þ Passive and active þ Passive and þ Identify target þ In-depth passive
reconnaissance reconnaissance active scanning þ Superficial and active
about the specific with social þ Social reconnaissance reconnaissance
ICS in Natanz engineering engineering for þ Creating target IP
gaining valid list
credentials þ Fingerprinting
Cyber
assets for resale on the Dark Web, or send sensitive data to third parties without
authorization—such as corporate secrets, business information, personal informa-
tion, sales and market strategies, etc. The tricky aspect with insiders is that they
are extremely hard to detect, since they know the company-internal systems and
processes usually quite well and thus mostly do not need apply an extensive lateral
movement. Therefore, they do not leave traces caused by the application of malware
and exploitation of actual vulnerabilities. Insider threats have led to some of the
best-known and most harmful data breaches in history (Recorded Future, 2016).
Examples: Edward Snowden, who worked for NSA and disclosed classified
information in 2013, or Jun Xie, a Chinese engineer who worked for a subsidiary
of GE Healthcare, who stole about 2.4 million files of trade secrets and other con-
fidential company information and sent it to China
Script kiddies: They are generally young persons with little or sufficient knowl-
edge of routing, switching, Internet protocols, and so on. They often make mistakes
and cause damage, even unintentionally, because of their inexperience (Barber,
2001). Script kiddies use mostly free or affordable tools on the Internet.
Crackers: Crackers are specific persons or groups acting on their own, not being
members of any other threat actor category. Their motivations are manifold, but
are often centered on impressing others with their capabilities or challenging them-
selves without political reason or looking for financial reward. Based on the poor
quality of the applied tools and their limited knowledge, their activities are usually
not stealthy enough to hide their actions.
Examples: Individuals, script kiddies, amateur hackers, etc.
Threat actors with unknown identity: In most cases, attacks cannot easily be
attributed to particular threat actors. There are many methods and tools used by
attackers to disguise their identity and thus maintain anonymity. The threat actors
use for instance The Onion Router (TOR) to avoid traceability, insertion of mis-
leading strings or website addresses into malicious binary files, dynamic DNS, and
complex series of redirect chains (Websense, 2015).
Figure 2.7 summarizes the threat actor groups based on their motivations, tac-
tics and procedures, tools, and common impact of their activities. Threat actors can
certainly move between groups if they expand their skills (script kiddie to cyber
criminal) or change their persuasion (state-sponsored threat actor to hacktivist).
Generally speaking, threat actors with little knowledge, such as script kiddies and
crackers, have no concrete target. They usually target a wide range of systems with
poor security levels. For these activities, they use simple, freely available, and affordable
tools or take advantage of vulnerabilities, such as default passwords or nonhardened
configurations. As they execute rather short opportunistic attacks, they usually have
smaller effect (compared to other forms of attacks) on targets. Attacks by script kid-
dies usually have limited consequences (or can be quickly discovered), such as website
defacement, increased communication latency, or short-term disruption of operations
or functions of the targets. They usually have no political, ideological, or financial
motivation; for this group the primary motivation is curiosity or their proud.
60 ◾ Collaborative Cyber Threat Intelligence
Threat Actor Main Motivation Tactics and Procedures Tools Possible Impact
Narrow target, long-term
National security impact,
State-sponsored cyber campaign with strategic
In-house developed or Disruption to CI, Loss of
threat actors / Political, financial focus, targets with advanced
tailored TTPs intellectual property,
Nation states security level, stealthy,
Monetary loss
professionals
Hacktivist /
Disruption of business
Cyber terrorists / Ideological, political
Wide range of targets with activities, Theft of
Insiders
advanced to poor security COTS Products, special tools intellectual property,
level, middle-term cyber (expensive) and available Monetary loss,
attacks, more stealthy, tools Trade secret disclosure,
professionals to skilled Operational disruption,
Cyber criminals Financial persons Brand and reputation loss
The second group covers threat actors with advanced knowledge about secu-
rity. According to their motivation they can be divided into two groups; threat
actors with financial motivation belong to cyber criminals, and threat actors driven
mainly by their ideology or political orientation belong to hacktivist, cyberterror-
ists, or individuals. As they have different but more concrete motivation than the
first group, they have a narrower range of targets even with advanced security levels.
Based on their solid knowledge, they have a better understanding of applicable
malicious tools and have more resources for applying appropriate tools for achiev-
ing their aim while remaining undetected. They usually use advanced tools, even
Commercial Off-the-Shelf (COTS) hacker tools or services, such as malware and
malware toolkits, zero days, rented DDoS attacks, and so on. In contrast to the
hit-and-run approach of the amateur hackers, they plan their steps in advance and
work significantly more stealthily. Their activities can have a wide range of conse-
quences, from short-term operational disruptions, through trade secret disclosure,
to monetary loss or even disruption of business activities (see Figure 2.7).
At the top end are the highly capable and professional threat actors presumably
with enhanced support. They can be motivated by their political orientation and
through special monetary rewards. As these professionals work on behalf of special
organizations or even nation-states, they carefully pick high-profile targets usually
with advanced security levels. These attacks require in-depth reconnaissance and
planning. The cyber attacks take a long time (months to years) because of the com-
plexity and the unobtrusive way they are executed. Occasionally, threat actors need
to create tools or exploits and tailor already existing tools for the unique tasks they
receive from the contracting entity. As these activities are time consuming and cost-
intensive, their impacts are more dangerous. The consequences can be monetary
loss, loss of intellectual property, or operative disruption of critical infrastructures
and can escalate to a considerable national security impact.
A Systematic Study and Comparison of Attack Scenarios ◾ 61
2.6 Conclusion
Today’s cyber defense approaches and security solutions need to evolve as threat
actors and attack scenarios change. Already existing cyber defense strategies usu-
ally have a defensive attitude, instead of a preventive and cooperative attitude. The
presentation of the cyber kill chain and the comparison of past cyber attacks high-
lighted the current challenges in cyberspace. The attacks are becoming increasingly
complex and sophisticated. On the one hand, this situation calls for new techniques
and approaches in order to respond to the evolving threats and TTPs of the threat
actors. And on the other hand, the situation requires a national and international
cooperation for protecting a nation-state’s essential infrastructures and its citizens.
Research, industry, and international security communities are already working on
a wide variety of possible solutions, which account for technical, organizational,
and legal perspectives. The European Union, as well as the United States, demon-
strates growing interest to enable information sharing (cf. Chapters 4 and 5), set up
cybersecurity centers to establish effective cyber situational awareness and support
fast decision-making (cf. Chapter 6), and elaborate on the legal background (cf.
Chapters 7 and 8). These are the first steps on a long way to a secured cyberspace.
The following chapters present the need for information sharing and new meth-
ods, techniques, and solutions in order to enhance cyber defense capabilities at
both national and international levels and the protection of critical infrastructures
within cyberspace.
List of Abbreviations
AD Active Directory
APT Advanced persistent threat
BYOD Bring your own device
CERT Computer Emergency Response Team
C&C or C2 Command and control
CMF Cyber Mission Force
COTS Commercial off-the-shelf
DDoS Distributed denial of service
DDoSaaS DDoS-as-a-Service
DLL Dynamic link library
DNS Domain Name System
DSOs Distribution systems operators
Dyn Dynamic Network Services
GOP The Guardians of Peace
ICS Industrial control system
ICT Information and communication technology
IoT Internet of Things
62 ◾ Collaborative Cyber Threat Intelligence
IS Information security
LAN Local area network
OSINT Open source intelligence
PtH Pass-the-Hash
PtT Pass-the-Ticket
P2P Peer-to-peer
PLC Programmable logic controller
RPC Remote procedure call
RTU Remote terminal unit
SCADA Supervisory control and data acquisition
TOR The Onion Router
TTPs Tactics, techniques, and procedures
USCYBERCOM U.S. Cyber Command (USCYBERCOM)
References
Abdollah, T. 2015. Sony Pictures CEO had “no playbook” for mega-hack on studio, https://
finance.yahoo.com/news/sony-pictures-ceo-had-no-063849901.html, last accessed on
12-12-2016.
Adachi, D. and Omote, K. 2016. A host-based detection method of remote access Trojan
in the early stage. In International Conference on Information Security Practice and
Experience (pp. 110–121). Springer International Publishing.
Barber, R. 2001. Hackers profiled: Who are they and what are their motivations? Computer
Fraud & Security, 2001(2), 14–17.
Bergman, M. K. 2001. White paper: The deep web: Surfacing hidden value. Journal of
Electronic Publishing, 7(1).
Broad, W., Markoff, J., and Sanger, D. 2011. Israeli test on worm called crucial in iran
nuclear delay, New York Times. http://www.nytimes.com/2011/01/16/world/
middleeast/16stuxnet.html, last accessed on 15-01-2011.
Bronk, C. and Tikk-Ringas, E. 2013. The cyber attack on Saudi Aramco. Survival, 55(2),
81–96.
Chen, P., Desmet, L., and Huygens, C. 2014. A study on advanced persistent threats. In
International Conference on Communications and Multimedia Security (pp. 63–72).
Springer, Heidelberg, Berlin.
Chicone, R. 2015. A layman’s guide to cyber threats, threat actors, attacks, and intelligence,
http://alliance.kaplan.edu/uploadedFiles/_Global_Content/Generic/Promotional
contents/Laymans%20Guide%20to%20Cyber%20Threats%20Article.pdf, last accessed
on 02-02-2017.
Chiu, D., Weng, S., and Chiu, J. 2014. Trend Micro research paper, backdoor use in targeted
attacks, http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/
white-papers/wp-backdoor-use-in-targeted-attacks.pdf, last accessed on 23-07-2016.
Ciancaglini, V., Balduzzi, M., McArdle, R., and Rösler, M. 2016. Below the surface: Exploring
the deep web. Trend Micro Incorporated.
A Systematic Study and Comparison of Attack Scenarios ◾ 63
Cluley, G. 2016. These 60 dumb passwords can hijack over 500,000 IoT devices into the
Mirai botnet. N.p., 10 Oct. 2016. https://www.grahamcluley.com/mirai-botnet-pass-
word/, last accessed on 31-07-2017.
Collier, S. and Lakoff, A. 2008. The vulnerability of vital systems: how “critical infra-
structure” became a security problem. The Politics of Securing the Homeland: Critical
Infrastructure, Risk and Securitisation, 40–62. http://www.anthropos-lab.net/wp/publi-
cations/2008/01/collier-and-lakoff.pdf, last accessed on 31-07-2017.
Common Vulnerabilities and Exposures (CVE). 2010. CVE-2010-2772, http://cve.mitre.
org/cgi-bin/cvename.cgi?name=cve-2010-2772, last accessed on 22-06-2016.
Cowley, R. and Parker, G. 1996. The Reader’s Companion to Military History. Boston:
Houghton Mifflin Harcourt (HMH).
Cyber Security Blog. 2013. Sony hack: Too easy and predicted by “The Paramount Brief ” 5 years
ago. http://www.cyber-security-blog.com/2014/12/sony-hack-act-of-cyber-vandalism-
is-the-whole-world-sitting-on-a-ticking-bomb.html, last accessed on 23-08-2016.
Damballa. 2016. Advanced persistent threats: A brief description, https://www.damballa.com/
paper/advanced-persistent-threats-a-brief-description/, last accessed on 22-07-2016.
Dobbins, R. and Bjarnason, S. 2016. Mirai IoT botnet description and DDoS attack mitiga-
tion, https://www.arbornetworks.com/blog/asert/mirai-iot-botnet-description-ddos-
attack-mitigation/, last accessed on 02-02-2016.
Ducklin, P. 2016. Mirai “Internet of things” malware from Krebs DDoS attack goes open
source, https://nakedsecurity.sophos.com/2016/10/05/mirai-internet-of-things-mal-
ware-from-krebs-ddos-attack-goes-open-source/, last accessed on 02-02-2017.
Dull, T. SAS. 2015. Big data and the Internet of things: Two sides of the same coin? http://
www.sas.com/en_ph/insights/articles/big-data/big-data-and-iot-two-sides-of-the-
same-coin.html, last accessed on 17-11-2016.
Engel, G. 2014. Deconstructing the cyber kill chain, DarkReading, http://www.darkread-
ing.com/attacks-breaches/deconstructing-the-cyber-kill-chain/a/d-id/1317542, last
accessed on 23-07-2016.
Everett, C.. 2016. Ransomware: to pay or not to pay? Computer Fraud & Security, 2016(4) 8–12.
Fagerland, S. and Norman, A. S. A. 2012. The many faces of Gh0st Rat, http://ver007.com/
tools/APTnotes/2012/Faces_Ghost_RAT.pdf, last accessed on 11-12-2016.
Falliere, N. 2010. Symantec official blog, exploring Stuxnet’s PLC infection process, https://
www.symantec.com/connect/blogs/exploring-stuxnet-s-plc-infection-process,last
accessed on 22-07-2016.
Falliere, N., Murchu, L. O., and Chien, E. 2011. W32. Stuxnet dossier. White paper,
Symantec Corp., Security Response, 5, 6.
Farwell, J. P. and Rohozinski, R. 2011. Stuxnet and the future of cyber war. Survival, 53(1), 23–40.
Fildes, J. 2010. Stuxnet worm ‘targeted high-value Iranian assets’. BBC News. http://www.
bbc.com/news/technology-11388018, last accessed on 23-09-2010.
FireEye. 2013, FireEye advanced threat report 2013, http://www2.fireeye.com/rs/fireye/
images/fireeye-advanced-threat-report-2013.pdf, last accessed on 01-05-2016.
FireEye. 2016. M-Trends 2016, https://www.fireeye.com/current-threats/annual-threat-
report.html, last accessed on 04-01-2017.
Franceschi-Bicchierai, L. and Warren, C. 2014. Hackers sent extortion email to Sony execu-
tives 3 days before attack. http://mashable.com/2014/12/08/hackers-emailed-sony-
execs/#fRptVBHYMPqC, last accessed on 25-08-2016.
F-Secure. 2009. Tracking GhostNet: Investigating a cyber espionage network, https://www.f-
secure.com/weblog/archives/ghostnet.pdf, last accessed on 29-01-2017.
64 ◾ Collaborative Cyber Threat Intelligence
Gandhi, R., Sharma, A., Mahoney, W., Sousan, W., Zhu, Q., and Laplante, P. 2011.
Dimensions of cyber-attacks: Cultural, social, economic, and political. IEEE Technology
and Society Magazine, 30(1), 28–38.
Geers, K., Kindlund, D., Moran, N., and Rachwald, R. 2016. FireEye report, world war C:
Understanding nation-state motives behind today’s advanced cyber attacks, https://
www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/fireeye-
wwc-report.pdf, last accessed on 23-06-2016.
Geers, K. 2015. Coder, hacker, soldier, spy. In Cyber Security: Analytics, Technology
and Automation, Martti Lehto, Pekka Neittaanmäki (eds.) (pp. 73–87).
Springer International Publishing. https://www.springerprofessional.de/cyber-secu-
rity-analytics-technology-and-automation/2436834.
Gen. Larry D. Welch. 2011. Institute of Defense Analyses, Cyberspace: The fifth operational
domain, https://www.ida.org/~/media/Corporate/Files/Publications/ResearchNotes/
RN2011/2011%20Cyberspace%20-%20The%20Fifth%20Operational%20Domain.
pdf, last accessed on 24-07-2016.
Gordon, R. Clarke, D. R., and Edwin, W. 2004. Practical Modern SCADA Protocols: DNP3,
60870.5 and Related Systems. Newnes, 19–21.
Greene, T. 2015. Biggest data breaches of 2015. Network, 10, 14.
Hanford, E. 2014. The cold war of cyber espionage. Public Interest Law Reporter, 20, 22.
Higgins, K. J. 2017. DarkReading, latest Ukraine blackout tied to 2015 cyberattackers,
http://www.darkreading.com/threat-intelligence/latest-ukraine-blackout-tied-to-
2015-cyberattackers/d/d-id/1327863? last accessed on 02-02-2017.
Hilton, S. 2016. Dyn analysis summary of Friday October 21 attack, http://dyn.com/blog/
dyn-analysis-summary-of-friday-october-21-attack/, last accessed on 05-02-2017.
Hollis, D. 2015. Cyberwar case study: Georgia 2008. Small Wars Journals. http://smallwars-
journal.com/jrnl/art/cyberwar-case-study-georgia-2008, last accessed on 31-07-2017.
Hollywood Presbyterian Medical Center. 2016. Official release, http://hollywoodpresbyte-
rian.com/default/assets/File/20160217%20Memo%20from%20the%20CEO%20v2.
pdf, last accessed on 12-01-2017.
Hunton, P. 2009. The growing phenomenon of crime and the Internet: A cybercrime execu-
tion and analysis model. Computer Law & Security Review, 25(6), 528–535.
Interpol. 2016. Cybercrime, https://www.interpol.int/Crime-areas/Cybercrime/Cybercrime,
last accessed on 12-12-2016.
ISACA. 2014. APT survey report, http://www.isaca.org/Knowledge-Center/Research/
Documents/APT-Survey-Report-2014_whp_Eng_0614.pdf?regnum=277325, last
accessed on 20-06-2016.
Kienzle, D. M. and Elder, M. C. 2013. Recent worms: A survey and trends. In Proceedings
of the 2003 ACM Workshop on Rapid Malcode (pp. 1–10). Washington, DC, Oct.
27–30, 2003.
Kim, D., Vouk, M. A. 2015. Securing scientific workflows. In: Software Quality, Reliability
and Security-Companion (QRS-C), 2015 IEEE International Conference on. IEEE,
2015. S. 95–104.
Kraus, J. 2014. Iranian Revolutionary Guard Corps and their influence on the Iranian gov-
ernment, military and economy. The International Annual Scientific Session Strategies
XXI, 1, 171.
Kriaa, S., Bouissou, M., and Piètre-Cambacédès, L. 2012. Modeling the Stuxnet attack with
BDMP: Towards more formal risk assessments. 2012 7th International Conference on
Risks and Security of Internet and Systems (CRiSIS). IEEE.
A Systematic Study and Comparison of Attack Scenarios ◾ 65
Kriaa, S., Pietre-Cambacedes, L., Bouissou, M., & Halgand, Y. 2015. A survey of approaches
combining safety and security for industrial control systems. Reliability Engineering &
System Safety, 139, 156–178.
Kumar, A., Zero day exploit. 2014. https://papers.ssrn.com/sol3/papers.cfm?abstract_
id=2378317, last accessed on 31-07-2017.
Kurtz, A., Gascon, H., Becker, T., Rieck, K., and Freiling, F. 2016. Fingerprinting mobile
devices using personalized configurations. Proceedings on Privacy Enhancing Technologies,
2016(1), 4–19.
Lesk, M. 2007. The new front line: Estonia under cyberassault. IEEE Security & Privacy,
5(4), 76–79.
Lewis, J. A. 2005. Computer espionage, titan rain and China. Center for Strategic and
International Studies-Technology and Public Policy Program, 1.
Li, C., Jiang, W., and Zou, X. 2009. Botnet: Survey and case study. Innovative Computing,
Information and Control (ICICIC), 2009 Fourth International Conference on (pp. 1184–
1187). IEEE.
Lockheed, M. 2014. Cyber kill chain, http://cyber. lockheedmar-tin.com/hubfs/Gaining_
the_Advantage_Cyber_Kill_Chain.pdf, last accessed on 01-01-2017.
Lynn, W. J. 2010. Defending a new domain: The Pentagon’s cyberstrategy. Foreign Affairs
89.5 (2010): 97–108.
Matrosov A., Rodionov E., Harley D., and Malcho J. 2011. Stuxnet under the microscope,
ESET. Technical Report. Revision 1.31.
Mansfield-Devine, S. 2016a. DDoS goes mainstream: How headline-grabbing attacks
could make this threat an organisation’s biggest nightmare. Network Security, 2016(11),
7–13.
Mansfield-Devine, S. 2016b. Ransomware: Taking businesses hostage. Network Security,
2016(10), 8–17.
Mather, D., Security Zap. 2016. Researchers discovered a government-made malware on the
deep web, http://securityzap.com/researchers-discovered-government-made-malware-
deep-web/, last accessed on 24-07-2016.
Microsoft Corporation. Security Bulletin MS08-067. 2008. Microsoft Security Bulletin
MS08-067. https://technet.microsoft.com/en-us/library/security/ms08-067.aspx, last
accessed on 24-06-2016.
Microsoft Corporation. Security Bulletin MS10-061. 2010. Microsoft Security Bulletin
MS10-061. 2010. https://technet.microsoft.com/library/security/ms10-061, last
accessed on 23-06-2016.
NATO Cooperative Cyber Defence Centre of Excellence (NATO CCDCOE). 2017.
Cyber definitions. https://ccdcoe.org/cyber-definitions.html, last accessed on
06-01-2017.
NIST, S. 800-39. 2011. Managing Information Security Risk–Organization, Mission, and
Information System View. National Institute of Standards and Technology. Retrieved
from http://csrc. nist. gov/publications/nistpubs/800-39/SP800-39-final. pdf., last
accessed on 31-07-2017.
Novetta. 2016. Operation blockbuster: Unraveling the long thread of Sony attack,
https://www.operationblockbuster.com/wp-content/uploads/2016/02/Operation-
Blockbuster-Report.pdf, last accessed on 02-02-2017.
Oltisk, J. 2009. Russian cyber attack on Georgia: Lessons learned? http://www.csoonline.
com/article/2236816/cisco-subnet/russian-cyber-attack-on-georgia---lessons-learned-.
html, last accessed on 31-07-2017.
66 ◾ Collaborative Cyber Threat Intelligence
From Monitoring,
Logging, and Network
Analysis to Threat
Intelligence Extraction
Ivo Friedberg
Austrian Institute of Technology and Queen’s University Belfast
Markus Wurzenberger
Austrian Institute of Technology
Contents
3.1 Introduction................................................................................................70
3.2 A n Overview of Concepts in Cyber Threat Intelligence..............................73
3.2.1 A
rtifacts in Cyber Threat Intelligence..............................................74
3.2.2 A
sset Management.......................................................................... 77
3.2.2.1 A sset Identification............................................................79
3.2.2.2 A sset Operation.................................................................80
3.2.2.3 A sset Adaptation................................................................80
3.2.2.4 A sset Disposal....................................................................81
3.3 R aw Monitoring Data: Origin, Structure, and Insights...............................81
3.3.1 L og Data..........................................................................................82
69
70 ◾ Collaborative Cyber Threat Intelligence
3.3.1.1 Observables.......................................................................82
3.3.1.2 Monitoring Infrastructure.................................................85
3.3.1.3 E vasion Techniques...........................................................86
3.3.1.4 Current Applications.........................................................86
3.3.2 N etwork Traffic...............................................................................87
3.3.2.1 Observables.......................................................................87
3.3.2.2 Monitoring........................................................................95
3.3.2.3 Evasion Techniques...........................................................96
3.3.3 Files and Processes...........................................................................97
3.3.3.1 Observables.......................................................................98
3.3.3.2 Obfuscation Methods......................................................102
3.4 Evaluation and Analysis of Monitoring Data to Derive Cyber
Incident Alerts..........................................................................................102
3.4.1 Rule-Based Analysis.......................................................................104
3.4.1.1 Black-Listing....................................................................104
3.4.1.2 W hite-Listing..................................................................105
3.4.1.3 Black- vs. White-Listing..................................................105
3.4.1.4 Sharing............................................................................106
3.4.2 Intrusion and Anomaly Detection.................................................107
3.4.2.1 W hat Are Anomalies?......................................................107
3.4.2.2 Intrusion and Anomaly Detection Approaches................108
3.4.2.3 Self-Learning and Adaptive Approaches.......................... 110
3.4.2.4 Sharing............................................................................112
3.4.3 Ontologies..................................................................................... 113
3.4.3.1 W hat Is an Ontology?...................................................... 113
3.4.3.2 Features of an Ontology (Why to Use an Ontology?)...... 115
3.4.3.3 W hat Are Ontologies Used For?...................................... 116
3.4.3.4 Ontology Design and Implementation............................ 117
3.4.3.5 Ontological Approaches for Cybersecurity
Information Sharing������������������������������������������������������� 117
3.4.3.6 Limitations and Research Challenges.............................. 119
3.5 Conclusion................................................................................................ 119
List of Abbreviations..........................................................................................120
References..........................................................................................................121
3.1 Introduction
The importance and high connectivity of today’s information and communication
technologies motivate a more coordinated approach to cybersecurity than is com-
mon today. Sharing threat intelligence among companies (Section 3.5) and states
(Section 3.4) is one approach that we argue is critical to achieving a coordinated
push for cybersecurity.
From Monitoring, Logging, and Network Analysis ◾ 71
Public domain
Mail server Web server Public database
VPN tunnel
Business network
Clients Internal services
Demilitarized zone
Log server Security services Data historian Update server
SCADA environment
Industrial network
Physical process
further connected to the demilitarized zone (DMZ). The DMZ is a separate net-
work segment that hosts services that manage critical data, host security services,
or auxiliary services for the industrial network (e.g., Data Historian or Update
Server). The industrial network is again isolated from the rest of the system.
Human–machine interfaces (HMIs) are used to manage the industrial processes
over supervisory control and data acquisition (SCADA) environments. They con-
nect to programmable logic controllers (PLCs) that in turn control the physical
processes. For management a VPN tunnel can be used to access the industrial
network from the DMZ, but in general communication is only outgoing (e.g.,
to store sensor measurements in the Data Historian). The communication within
the industrial network is not necessarily IP based; it can also make use of analog
signals or bus systems.
The remainder of this chapter is structured as follows: Section 3.2 provides an
introduction into the concepts of information sharing. It further highlights the
need for corporate processes like asset management to leverage the benefits of infor-
mation sharing effectively. Section 3.3 introduces different sources of information
that are currently used to identify cybersecurity incidents on a system or corporate
level. It highlights their benefits and shortcomings and describes the common setup
of monitoring infrastructures. Section 3.4 provides details about analysis methods
that combine information from multiple sources in different ways to derive higher-
level alerts. These concepts include signature-based approaches, anomaly detection,
stateful analysis, and ontologies. For each approach, the section discusses benefits
and shortcomings and highlights the possible interfaces to information sharing.
Section 3.5 concludes the chapter.
1 http://stixproject.github.io/data-model/.
2 http://www.openioc.org/.
74 ◾ Collaborative Cyber Threat Intelligence
3 http://cybox.mitre.org/documents/Cyber%20Observable%20eXpression%20(CybOX)%20
Use%20Cases%20-%20(ITSAC%202011)%20-%20Sean%20Barnum.pdf.
4 https://www.us-cert.gov/ncas/alerts/TA14-353A (accessed 16 February, 2017).
From Monitoring, Logging, and Network Analysis ◾ 75
SNORT RULE
alert tcp any any -> any any (msg: “Wiper 1”; sid:42000001; rev:1;
flow:established; content: “|be 64 ba f2 a8 64|”; depth:6; offset:16;
classtype:bad-unknown;)
5 https://www.crowdstrike.com/blog/indicators-attack-vs-indicators-compromise.
76 ◾ Collaborative Cyber Threat Intelligence
attack. At each stage of the attack, different techniques can be used by the adver-
sary to achieve a certain goal. For example, the initial infiltration of an IT sys-
tem can be caused by a phishing e-mail, a drive-by download, an unchecked
USB drive plugged into a machine in the network or through social engineer-
ing, just to name a view options. TTPs describe common behavioral patterns
of adversaries. Threat actors tend to use similar attack patterns and pieces of
malware in their attacks. They leverage resources including service providers
(cloud infrastructure, registrars, etc.) and have certain targets and goals. TTPs
structure this information to describe adversary behavior that can be used for
attribution6 (Wheeler and Larsen, 2003).
Incident: An incident describes the events that took place during a cybersecu-
rity incident as well as the effects the incident had on the observed systems. On
a technical level, it contains the vulnerabilities that were exploited, indicators
that were found in the systems, and the TTPs used by the attacker. It further
describes the impact of the attack on the systems and the organization as a
whole: what was the impact on operations, was sensitive data exfiltrated, and
what was the timeline of the attack? This information is necessary for internal
reporting but can also be used to achieve awareness on a national level when
shared with governmental organizations or as a guideline for other potential
targets to identify the attack.
Course of action: When information about new types of malware, vulner-
abilities, or attack campaigns is circulated, it usually also contains a set of rec-
ommendations or guidelines on how to detect and mitigate the described threat.
These recommendations can contain actions that should be taken in advance to
prevent a successful compromise or in response to an attack in order to miti-
gate the effects. This approach is usually used in published CVEs or in security
advisories issued by national CERTs. Simple examples of preventive measures
are software updates to remove vulnerable application versions or updated con-
figurations. However, more complex actions can be shared, which should then
also include information about efficacy, expected impact, and expected cost.
Effective use of this information requires efficient asset management processes
be in place to identify the potentially vulnerable components in the managed
network (see Section 3.2.2).
Threat intelligence reports: In contrast to most of the previous items described, a
report is not structured for automated processing but is instead a prose document
aimed at decision makers in organizations. A report can be technical with details
about a new piece of malware and how it is used by a threat actor or more abstract
to provide situational awareness to an organization about a new attack campaign.
It can contain specific IoCs useful for detecting future instances of the described
attack. Therefore, it is a critical tool for information sharing.
7 https://www.axelos.com/best-practice-solutions/itil.
78 ◾ Collaborative Cyber Threat Intelligence
Change Plan
procure
Replacement Dispose
Update
management Adapt
Change Operate
management Identify
Location
Monitoring
Version/
Permission
model Owner
management
EXAMPLE: STUXNET
The Stuxnet attack (see Chapter 2) leveraged multiple zero-day exploits in
the windows operating system to infect vulnerable machines during lateral
movement. One of these exploits was the Microsoft Windows Print Spooler
Service Remote Code Execution Vulnerability that allowed remote code execu-
tion during a vulnerable print spooler implementation in various versions of
Windows including Windows XP SP3, Windows Vista SP2, and Windows
Server 2008 SP2. Stuxnet was first spread in 2008, and the vulnerability was
only published in 2010. It was a severe security risk, and proper asset manage-
ment would have helped to minimize the attack surface for an organization.
From Monitoring, Logging, and Network Analysis ◾ 79
To achieve these goals, the following information should be stored about each asset.
Identifiers: An asset appears in different organizational contexts with different
identifiers. An office PC will have an inventory number to identify the physical PC,
and it will be assigned a location (e.g., room number) to allow easy location. At the
same time, it has an IP address in the company network. It will thus not be possible
to correlate traffic that originates from the PC with the asset if the IP address of the
PC is not stored as an additional identifier. In this way, sufficient identifiers need to
be stored for each asset to allow efficient management.
Owner: Each asset needs to be owned by a real person in the organization. This
is of high importance to ensure responsible operation and management of the asset.
Further, only a real person can be held accountable in an incident that was caused
by mismanagement of the asset in question.
Asset information: For each asset, a number of properties should be stored in
a central asset database that can then be filtered. This is important to respond in
a timely manner and appropriately to newly shared indicators. If a new exploit is
found for a specific version of a software product, a list of machines running the
product is not sufficient unless it also contains the currently installed version (and
effective configuration) of each instance. Similarly, the vendor of a network router
identified a problem with a number of components sold. A list of model numbers
of all machines affected is publicly made available. A company, however, addition-
ally requires an internal list of the model numbers of their deployed devices against
which the affected model numbers in the public list can be compared. If such a
company-specific list of model numbers does not exist, each hardware device has to
be physically located and checked which again is not efficient.
80 ◾ Collaborative Cyber Threat Intelligence
1. New information about the asset becomes available. For example, a CVE that
describes a vulnerability in a software component should trigger mitigation
strategies.
2. Updates are available for the asset. For each type of asset, there should be
organization-wide update policies in place that regulate how updates must be
handled. This also includes the management of new user accounts or changed
configurations.
3. A related asset is changed. Each asset interacts with other assets. These inter-
actions are usually well defined to ensure correct operation. Therefore, they
need to be evaluated if one of the related assets is changed. For example, the
installation of a software update in response to a newly found vulnerability
might violate interoperability constraints.
3.3.1.1 Observables
A single log line usually consists of a time stamp and one protocolled event. The time
stamp holds the information about when the logged event occurred. Depending on
the configuration of the logging, it provides information about the day, the month,
and the year, as well as the time the log line was produced. The event describes a
From Monitoring, Logging, and Network Analysis ◾ 83
Binary analysis
Log file generation
Network data
Public domain
Mail server Web server Public database
VPN tunnel
Business network
Clients Internal services
Demilitarized zone
SCADA environment
Industrial network
Physical process
process in an ICT network, a network connection, or any other action carried out
by a user or a program. While the time stamp carries the information when a log
message was generated, the event stores information about where and why the log
message was created.
The timestamp Jan 01 00:00:01 holds the month and the time when the log
line was produced. database.local is the name of the service that produced
the log line and mysql-normal specifies the type and the class of the service.
Connect [email protected] on is the event that has been logged: The user
with the username user connected to the database host database.host.local.
The protocoled events stored in log files include observables of malicious activi-
ties in a computer network. Besides user activities, observables of harmful program
processes and network connections occur in log data. Depending on the configu-
ration of the logging, information about which content has been sent/received is
stored as well. When the protocol standard syslog (Gerhards, 2009) is used for
generating log data, every log message is labeled with a severity level between 0
and 7: emergency (0), alert (1), critical (2), error (3), warning (4), notice (5), infor-
mational (6), and debug (7). Depending on the configuration of the deployed log-
ging, log messages of different levels are stored. Log messages between level 0 and
3 contain only events that describe erratic system behavior and therefore security
related observables that lead to program and system crashes.
Log messages of a higher severity level do not necessarily comprise security rel-
evant observables. Therefore, tools for security analysis are required to filter out the
relevant information describing security relevant observables, such as the following:
Especially for legacy systems and products with small market shares, which are
often not directly supported by security solution providers and vendors (e.g., SIEM
vendors that provide parsers for well-known products), log data is an important
source for observables.
3.3.1.2 M
onitoring Infrastructure
Usually, by default, log files are stored as simple text files. This has the advantage of
easy access in the case of a system crash. Using a database format raises the problem
that the log data is reachable only if the database itself is available. Because of the
growing digitalization in recent years, the amount of produced log data is increasing
exponentially. Thus, suitable log management solutions are needed, and not only for
large-scale network environments. These have to handle this large amount of data.
Log management comprises collecting logs, storing log data, and analyzing log data,
as well as searching and reporting log data (Chuvakin et al., 2013).
There are so-called logging frameworks for most programming platforms (see, e.g.,
the documentations of Java8 and Python9), which aids the implementation of proper
logging support in new software products. For logging, usually three components are
required: a logger, a formatter, and a handler. The logger is responsible for collecting
the information that should be logged. Usually for each class a separated logger is
defined. The configuration of the logger defines at which level of detail information
is finally logged. This so-called severity level can be defined for each logger. Based on
the configuration of the severity level, the logging framework decides whether a log
message is logged or not. After the logger forwards the log information to the logging
framework, the formatter takes the object provided, which is usually represented as a
binary object, and converts it for output into a string. Finally, the handler, which lis-
tens for log messages at or above the defined level of severity, displays the resulting log
line in a console, writes it to a file, or forwards it to another application.
The common standard for transmitting log messages is syslog (Gerhards, 2009).
The key advantage of the syslog protocol is that it is supported by a wide range
of devices and network components. Its primary use is to send log messages to a
8 https://docs.oracle.com/javase/8/docs/technotes/guides/logging/overview.html (03/03/17).
9 https://docs.python.org/3.6/library/logging.html (03/03/17).
86 ◾ Collaborative Cyber Threat Intelligence
It can also be used to detect the reasons for other system failures: misconfiguration
or crashed network components.
Besides forensic analysis, log data can be used for real-time intrusion detec-
tion (Liao et al., 2013). Therefore, signature-based detection methods that analyze
single log lines to identify erratic and malicious system behavior, which might be
caused by an attacker or malware, can be utilized. More intelligent anomaly detec-
tion methods (Chandola et al., 2009) that, e.g., correlate log lines over time can be
applied to detect more sophisticated and tailored attacks, such as advanced persis-
tent threats (APTs).
Database logs can be used to back up and restore database content in case of a
system crash or destruction caused by an access violation (Frühwirt et al., 2012).
Transactions and activities stored in a text format in log data are easier to restore
than those in a corrupted binary file.
Firewall logs can be used to validate, if implemented firewall rules are working
properly. Furthermore, they can provide information if the firewall is the reason
for application errors. They can also be used to detect malicious activities such as
multiple unsuccessful attempts to overcome the firewall, which is an indication of
an intrusion attempt. Also suspicious outgoing connections might be an indication
that malware is used to launch an attack (see, e.g., the attack scenarios described
in Chapter 2).
(Braden, 1989; Bush and Meyer, 2002). It defines seven layers used in the transmis-
sion of data between two applications. While the data make their way through the
layers, each layer attaches a further envelope around the packet. Figure 3.4 shows
the process.
This also means that each router in the network removes layer one and two
protocol information to uncover the network layer header. It then decides on the
correct port to forward the packet, makes any adaptions to protocol information
necessary (such as replacing IP addresses), and rewraps it into layer two and one
before the physical transmission is started.
An alternative to the ISO/OSI model is the TCP/IP model widely used on
the Internet (Braden, 1989; Bush and Meyer, 2002). It defines only four layers
(Application, Transport, Internet, and Data Link), which partly fulfills the tasks of
multiple layers in the ISO/OSI model.
There are two approaches to monitoring network traffic. When traffic flow is
monitored, only the data contained in the protocol envelopes is stored and analyzed.
Packet captures on the other hand store the full packet, which contains the header
information as well as the payload (see Section 3.3.2.2 for details). Observables are
present in both parts of a packet: the envelope and the payload. This chapter catego-
rizes them as follows in four categories: transport oriented observables, application
oriented observables, payload, and general traffic observables. While transport-
oriented and application-oriented observables are found in the protocol envelopes,
payload observables require access to the actual data. General traffic observables
are found in helper protocols that are used implicitly by network components or by
analyzing traffic occurrence over time.
Logical connection
Application process 1 Data Application process 2
Physical transmission
Figure 3.4 Overview of the packing and unpacking process in the OSI model.
From Monitoring, Logging, and Network Analysis ◾ 89
3.3.2.1.1 Transport-Oriented Observables
Transport-oriented observables are found in the packet envelopes that are intro-
duced at the layers 1–4 of the ISO/OSI model. The information in the packet head-
ers provides the most common observables used in network traffic monitoring. Due
to its wide acceptance and use, this section focuses on the Internet protocol suite
also known as TCP/IP (Braden, 1989; Bush and Meyer, 2002). It can be related
to the OSI model where TCP is the transport layer protocol and IP is the network
layer protocol. Layers 5–7 are combined into the application layer (more details on
application layer protocols are given in Section 3.3.2.1.2).
Figure 3.5 shows the header structure of the IP and the TCP protocol. Transport-
oriented observables are found in the various fields of these protocol headers. When
the packet is received by a network device, it interprets the IP header to identify
how the packet should be handled and routed to get to the intended destination.
When the encapsulated protocol (in this case TCP) can be interpreted, the TCP
header fields can also be recorded and used as observables. Examples for observ-
ables are the source and destination IP address of a given packet. One example
of how these observables can be used as indicators is to detect the presence of a
botnet client in the monitored network. Whenever the malware connects to the
command and control server, the packets with the suspicious IP address in the
source IP address field can be detected. Another example is to monitor network
traffic to detect beaconing (Villeneuve and Bennett, 2012). Whenever the initial
infection of a host happened, the malware pings the C2 infrastructure regularly
to make it aware that it is ready to accept further commands. This traffic usually
leverages ports of well-known protocols that are most likely not blocked by firewalls
in operative networks (e.g., HTTP (80), HTTPS (443). However, the destination
port of the traffic is often abnormal for regular traffic. The reason for this is that
the traffic is often routed through multiple proxies that are unaffiliated with the
attackers. These proxies have their regular ports used by benign services. So the
90 ◾ Collaborative Cyber Threat Intelligence
Source IP address
Destination IP address
Options
IP packet
Header Payload
TCP packet
Header Payload
Sequence number
Acknowledgment number
Options
Figure 3.5 Packet and header structure of IPv4 and TCP packets. The header fields
are ordered by their byte size and position where each line is a 32-byte block.
malicious traffic needs to be directed to unbound ports that are not used normally.
Finally, tools such as nmap10 make use of TCP among other protocols to perform
port scans. Depending on the detailed settings in the response packets, the identi-
fied asset can be fingerprinted to identify its operating system, for example. This
behavior can also be detected through network traffic monitoring through analysis
of the number of connection attempts and the range of ports that are probed.
10 https://nmap.org/.
From Monitoring, Logging, and Network Analysis ◾ 91
3.3.2.1.2 Application-Oriented Observables
The application layer protocols manage higher level functionality of services rather
than the classical transmission. As such, they often contain valuable observables
that can be used to detect the use of well-known application protocols for mali-
cious activities. For threat actors, the use of well-known protocols is very beneficial.
Malicious traffic can be hidden more easily between the large amounts of legiti-
mate traffic sent with the same protocols. Table 3.1 gives an overview of the most
common application-layer protocols, their standard TCP port mappings, and the
application in which they are used.
Based on observables at the application layer, it is possible to monitor whether
the respective underlying application is used as expected. The HTTP connection
attempts to various well-known paths of the administration section of widely used
content management systems (CMSs) can be an indicator for probing, which could
be part of the reconnaissance phase. However, nowadays, these brute-force attempts
are widely considered regular noise when a machine is reachable from the Internet.
Another example is the header information in e-mails that were sent using
SMTP. They contain the route of the mail over various mail servers between sender
and receiver. This information can be used to detect suspicious routes between two
mail addresses, which can be an indication for a spoofed mail. This can be detected
if mails appear to come from the same office network (e.g., from one employee to
another in the same company), but the route either does not originate on the office
mail server or seems to leave the domain before entering it again.
92 ◾ Collaborative Cyber Threat Intelligence
Table 3.1 List of the Most Well-Known Application Layer Protocols Used
on the Internet and Their Standard TCP Port Mappings
Standard
Protocol Full Name Port Description
3.3.2.1.3 Payload
Another source for observables is the payload of the packets. The information that is
encapsulated in the protocols can be reassembled by a monitoring system to discover
malicious content. This capability is especially helpful in ICSs where clear-text mea-
surements and control actions are sent between assets. With information about the
From Monitoring, Logging, and Network Analysis ◾ 93
underlying physical system, indicators can be designed to detect malicious (or errone-
ous) measurements or set points. It can however also be used in traditional Internet
applications. Section 3.3.3 gives a detailed introduction about the observables contained
in binaries that can be used to detect malware. The same tools can be used directly on
the monitored network traffic. Attachments to e-mails are good examples of payloads
that can be monitored at the mail server before the mail is transmitted to the end user
to limit the risk for infection. Similarly, outgoing FTP or HTTP file transfers can be
monitored to check for confidential documents that leave the controlled perimeter.
The analysis of payloads is getting increasingly difficult with the use of encryp-
tion techniques, especially the wide adoption of SSL/TLS. While encryption has to
be encouraged from a security standpoint, it is also heavily used by adversaries to
circumvent the monitoring of payloads.
3.3.2.1.4 Traffic-Specific Observables
Packet-switched networks are configured dynamically. This is the main reason
for the success of the Internet as we know it today. It was originally designed to
withstand large-scale physical attacks. In order to dynamically handle the net-
work setup, helper protocols are used by network equipment and hosts to connect
the network nodes and ensure connectivity where possible. These protocols were
designed without IT security in mind, and they still provide attack vectors in mod-
ern networks. They usually make no use of encryption techniques and are therefore
easy to use for reconnaissance and as observables. In the following part, this chapter
discusses three of the most widely used helper protocols.
The Dynamic Host Configuration Protocol (DHCP) (Droms, 1997, 2004) is used
by clients that connect to DHCP-managed IP networks. A DHCP server listens for
client requests and assigns them a free IP address through a DHCP lease, which
is time limited. As DHCP does not include encryption, an infected or malicious
node in the network can act as a rogue DHCP server. As a consequence, manipu-
lated leases can be issued that can either cause a denial-of-service attack (invalid IP
addresses will prohibit the client from connection) or a man-in-the-middle attack
(e.g., when the lease specifies a wrong DNS server for DNS lookups, which redi-
rects HTTP traffic to malicious servers).
94 ◾ Collaborative Cyber Threat Intelligence
At the same time, DHCP can be used to identify new hosts that connect to a
network. The monitored packets can indicate rogue machines that send out invalid
DHCP leases or clients that try to forge DHCP requests to take over IP addresses.
The Address Resolution Protocol (ARP) (Plummer, 1982) is used within the
boundaries of a single network (it is not routed) to find out the MAC address
for a machine when the IP address is known. This is important as the TCP/
IP information is most often used to identify the intended receiver of a data
stream rather than the link layer information (MAC). IP to MAC mappings that
are known once are stored in a local buffer to minimize communication. If an
intended receiver’s mapping is not known, a broadcast request (ARP request) is
sent to all machines in the local network. All machines receive this request, but
only the machine with an active interface with the requested IP responds with its
own MAC address.
Despite well-known vulnerabilities (e.g., ARP cache poisoning), the broadcast
nature of this protocol makes it a prime candidate for monitoring the behavior of
machines in a network.
The Internet Control Message Protocol (ICMP) is designed to manage IP traffic
through control and error messages. It is usually used directly by networking hard-
ware and not through user interaction. However, the ICMP ping command and
traceroute are example cases for ICMP in the user domain. Pings use the ICMP
echo command to determine if a host is available and reachable. Similarly, tra-
ceroute makes use of time-to-live exceeded in transit and host unreachable ICMP
error messages. Due to their vulnerabilities, many switches filter ICMP messages.
However, they are often used by network administrators for fault analysis and
attackers for reconnaissance.
By monitoring a stream of network traffic, other patterns can also be identified
and used as observables. This can include the traffic load on a certain node that is
different from the expected traffic behavior. Similarly, traffic flows between spe-
cific assets can be identified. While a public Webserver is expected to have a large
amount of traffic aimed for destinations outside the company’s borders, the same
does not hold for an internal database server. In the second case, a significant
increase in data sent out of the company network can indicate data exfiltration.
3.3.2.2 Monitoring
The challenge of network traffic monitoring is getting a complete picture of the traffic
in a network. Modern packet-switched networks use network switches to distribute
packets to the intended receivers. The hosts only receive the packets that are relevant to
that host. Monitoring at host level is useful for error analysis but not for network moni-
toring; a complete picture cannot be seen at one host. Instead, the common approach
is to monitor network traffic at the network switches on the border between segre-
gated subnetworks. This is shown in the reference network in Figure 3.3. Monitoring is
installed on the network switches between the different domains; for example between
the Corporate Network and the public Internet. Industrial network switches provide
so-called mirroring ports. The switch can be configured to send a copy of every net-
work packet seen on one switch port out through the mirroring port. Attached to
this mirroring port is the monitoring infrastructure that collects and analyzes traffic.
In Cisco systems, port mirroring is generally referred to as Switched Port Analyzer
(SPAN).11 One problem with port mirroring is that traffic within the network is usually
not completely monitored. Only traffic that transcends the borders between segregated
networks or broadcast traffic is captured and analyzed. The reason is that the switch
does not have the bandwidth to redirect the traffic from all ports to a single mirroring
port. Neither is there a mirroring port for each regular port. A decision needs to be
made as to what traffic is most important to monitor, and this is usually the traffic that
transcends network borders.
In case of additional critical communication links within the subnetwork,
in-line monitoring can be applied. In-line monitoring is implemented by a net-
work bridge that receives all traffic between two communication partners and can
then read but also manipulate all traffic before forwarding it. This is also done to
support intrusion prevention systems (IPSs) that need this type of installation to
actively intercept malicious traffic. In-line monitoring systems pose a connectiv-
ity risk in the case that the in-line system powers down due to errors or power
loss. Therefore, they are installed with the use of bypass switches. These special
switches can detect the state of the in-line system and forward the traffic directly
if the connection is lost due to a fault. Figure 3.3 does not show any in-line moni-
toring, but in-line monitoring could be helpful to monitor all traffic from and
to a specific internal service in the corporate network. For example, it would be
helpful to monitor all access to the server that stores the credit card information
of customers.
Helper protocols often send some commands in a broadcast fashion. This
means that the packet can be seen by every host in the subnet. It can therefore also
be analyzed by monitoring systems at all three locations (host based, port mirror-
ing, or in-line monitoring).
11 http://www.cisco.com/c/en/us/tech/lan-switching/switched-port-analyzer-span/index.html.
96 ◾ Collaborative Cyber Threat Intelligence
Depending on the monitoring, there are two main formats in which network
traffic is usually collected. The first type is network traffic flow information. It
was first developed by Cisco as NetFlow (Introduction to Cisco IOS NetFlow—A
Technical Overview, 2017) but later adapted by multiple companies. The router col-
lects and aggregates the information about different flows of IP traffic. A NetFlow
record contains: Version, Sequence Number, Input and Output Interface ID, time-
stamps for start and end time of the flow, number of bytes and packets observed,
IP header information (most important here are source and destination IP address
and port numbers), and a union of all TCP flags that were observed throughout the
lifetime of the flow. The flow records observed at the router are then forwarded to a
collector using UDP and deleted at the router. To limit the overhead from the newly
introduced network traffic, the collector should be located in close proximity to the
recording device. In Figure 3.3, the collector would be situated in the DMZ with
the security services node. This leaves at most one network segment between the
collector and the recording switches (with exception of the switch that connects the
public domain to the Internet, which is acceptable). The generation of flow records
is very resource demanding at the router. Further, the content of the packets is not
stored and therefore cannot be analyzed when flow records are used for monitoring.
Packet captures are the second type of network monitoring. In this case, the
complete packet (i.e., header information and payload) is collected, stored and
parsed. This approach is usually necessary for deep-packet inspection and is per-
formed by tools like tcpdump12 and wireshark.13 Since the complete packet infor-
mation is stored, the same observables that are captured by flow records are also
present in packet captures. However, the amount of data stored in packet captures
is much greater, and thus, algorithms need to be applied to process the data and
extract observables of interest.
3.3.2.3
Evasion Techniques
Adversaries can use various approaches to disguise attack indicators in network
traffic in order to circumvent detection.
With the increased use of encryption in communication protocols (e.g., HTTPS)
encrypted traffic is a normal occurrence in monitored traffic. While encryption is
an important security and privacy feature, it is also widely used by adversaries to
prevent payload analysis. A detection mechanism can only analyze the payload if it
has a copy of the private key used during the encryption. Packet headers of trans-
port protocols, however, usually cannot be encrypted by the attacker, as they need
to be readable by the network equipment to ensure correct delivery. If the transport
layer protocol uses encryption, however, then the header information of the appli-
cation layer protocols cannot be monitored.
12 http://www.tcpdump.org/.
13 https://www.wireshark.org/.
From Monitoring, Logging, and Network Analysis ◾ 97
14 http://techterms.com/definition/malware.
98 ◾ Collaborative Cyber Threat Intelligence
file itself. Dynamic analysis performs runtime analysis that runs the executable file,
monitors its behavior, and investigates how the program affects the host machine.
This is possible since malware includes at least one executable file that contains
malicious contents. Some malware detection methods, as hybrid solutions, com-
bine both analysis methods to overcome drawbacks of each.
Malware detection methods capture any malicious content or behavior by mon-
itoring observables at the host machine including binary patterns, instructions, or
system calls.
3.3.3.1
Observables
Depending on the method of analysis, different observables are used to identify
malware. Some of the most widely used observables will be described in the follow-
ing. However, as new techniques are developed, new observables are identified or
the way observables are grouped to form indicators are adopted.
3.3.3.1.1 Binary Patterns
Malware consists of single or multiple files that contain malicious contents. These
files are usually stored as binaries after they are compiled by the threat actor. Often,
these binaries contain unique code patterns that can be extracted directly or from
decoded data. Malware may further include additional information such as com-
mands, the control server, or target locations. The additional information can
be written as alphabet strings, and those strings can be used as unique patterns.
Patterns are derived from executable code or additional configuration and meta-
information of malware. Combined, sets of unique patterns form signatures to later
detect the same malware file in different locations. The pattern analysis can then be
triggered by any new file or any update on existing files in the monitored memory
space. These signatures can also be shared as indicators (IoC) and used by various
organizations in their detection processes.
Unfortunately, malware authors use obfuscation techniques (e.g., code com-
pressions and encryption) (You and Yim, 2010) and write variants of the same
malware to avoid binary pattern based malware detection. However, unique binary
patterns can be identified and used to detect known malware, and sometimes obfus-
cation techniques fail to generate a significant number of variants. For example, if
the same encryption key or small number of keys is used, the encrypted patterns
remain the same or the number of the encrypted patterns is not big.
information about the program than the binary does, e.g., instructions, func-
tions, or system calls. In order to perform its task, the program executes various
instructions sequentially where any instruction consists of exactly one opcode and
optionally (depending on the opcode) one or more operands. Opcodes are primitive
operations of programs such as register and memory operations, but they repre-
sent the behavioral information of the programs. Opcode-based malware detection
methods include sequence, frequency analysis, or both.
Bilar (2007) used the difference of opcodes histograms between known malware
and benign programs for malware prediction. Similarly, other methods employ
frequency (Santos et al., 2010) of opcodes and sequences (Santos et al., 2013) of
opcodes to model the malicious behavior. Runwal et al. (2012) proposed a graphi-
cal technique to find the similarity of the opcode sequence.
For opcode analysis, it is essential to translate a binary file into executable code and
extract opcodes from the executable code. For the translation, disassemblers can be
used and different types of opcode information extracted depending on the method.
In order to overcome obfuscation methods, debuggers or instrumentation techniques
can be used to extract opcode information, or operating system level tools can be used.
Dynamic approaches analyze the program behavior during execution. Principal
dynamic techniques include virtual machine inspection (Garfinkel et al., 2003),
function call monitoring (Forrest et al., 1996; Bayer et al., 2006; Canali et al.,
2012; Chandramohan et al., 2013; Creech and Hu, 2014; Lanzi et al., 2010; Xue
et al., 2015), dynamic binary instrumentation (Newsome and Song, 2005; Santos
et al., 2013; Bilar, 2007), and information flow tracking (Christodorescu et al.,
2008; Gascon et al., 2013). Although these approaches can potentially detect the
obfuscated malware and the malware variants, they require a large amount of
resources and cause substantial overhead. These difficulties often limit malware
detection to a static approach (e.g., antivirus, scanners); however, they can be easily
evaded due to the known limitations.
3.3.3.1.3 System Calls
System calls are responsible for primitive and essential functions in operating sys-
tems, such as memory access, network communication, etc. It is almost impossible
to develop a program with no system call. System calls have been recognized as a
promising feature that can be monitored and used for malware detection. System
call patterns provide effective information about the runtime activities of a pro-
gram, which can be used to characterize malicious behavior.
Clustering techniques, like the n-gram approach (Canali et al., 2012), can be
used to group the system calls of a sample to identify malicious patterns. Another
approach is to group the system calls based on common operating system resources
to identify malicious intent (Chandramohan et al., 2013; Bayer et al., 2009).
Another approach considers system call sequences that can indicate a sequence
of malicious activities (e.g., read important file(s) and transfer the file(s) through
100 ◾ Collaborative Cyber Threat Intelligence
S1 S1 S1 S1
S2 S2 S2 S2
S3 S3 S3 S3
S4 S4 S4 S4
S5 S5 S5 S5
S6 S6 S6 S6
S7 S4 S4 S4
S8 S5 S5 S5
S9 S6 S6 S6
S10 S7 S4 S7
S11 S8 S5 S8
S12 S9 S6 S9
S11 S8 S15
S12 S9 S16
S11 S13
S12 S15
S13 S16
Note: The relative frequencies of system calls (S1–S13) performed by a process stay
fairly constant. In this case, the difference among the three sequences is the
number of iterations in a loop (S4–S6 are called in the loop). In the case of an
attack, however, these calls would change which can be detected.
From Monitoring, Logging, and Network Analysis ◾ 101
analysis, such as debugging and instrumentation, can also track the system
calls during the runtime. In order to avoid more advanced obfuscation tech-
niques like sandbox detection, researchers came up with ways to monitor the
program behavior in hardware. NumChecker (Wang and Karri, 2013) detects
malicious modifications to a kernel function (system call) by checking the hard-
ware events including total instructions, branches, returns, and floating point
operations. Ozsoy et al. (2015) proposed the design of a malware-aware proces-
sor using architectural events (e.g., frequency of memory read/writes, immedi-
ate branches taken, frequency of opcodes) as the features and machine learning
for the classification of malware. All the above methods use low-level hardware
features to model the malicious behavior. Rahmatian et al. (2012) proposed
host-based intrusion detection using FPGA, which uses system call sequences to
characterize the correct system behavior. The main limitations of this approach
are as follows: Each program needs to be assisted by system calls-based FSM;
it does not allow unknown programs to run; and FSM of system calls would
be significantly large for complex programs, thus demanding large memory
size. While these approaches are harder to circumvent by the attacker, they
are also more cost intensive to implement and hard to deploy in an operational
environment.
3.3.3.1.4 Information Flow
Opcode and system call information focus on what operations programs do, but
what (or how) information (or data) a specific program handles is another perspec-
tive of program behavior analysis. In this case the analysis method is not interested
in how data are handled but what data are handled.
Data can be located (or generated) inside programs or delivered from outside
(e.g., input files, data transmission, and user actions). What data (or resource) are
accessed by programs can be traced, and links between data accesses can be identi-
fied that might indicate suspicious activities. Hidden information can be identified
by monitoring operations that programs perform on data rather than monitoring
all operations. As one obfuscation technique, garbage instructions can be injected
between real instructions. However, by filtering out instructions that are not
related to specific data, the garbage instructions can be removed (Tang et al., 2014).
Information flow can be traced in both static and dynamic analysis, but dynamic
analysis is more robust to obfuscation techniques.
Similar approaches can again be done in hardware to circumvent specific
obfuscation techniques. Demme et al. (2013) proposed the use of a hardware per-
formance counter to monitor lower level micro-architectural parameters such as
instruction per cycle and cache miss rate. Tang et al. (2014) built baseline models
of benign program execution using unsupervised machine learning to detect the
deviations that occur as a result of malware exploitation.
102 ◾ Collaborative Cyber Threat Intelligence
3.3.3.2
Obfuscation Methods
Typical static solutions, such as antivirus, scanners, and anti-malware tools, use
signatures for malware detection. Unique sequence of bytes can be identified from
malware and used to detect the same malware. Unfortunately, malware authors use
obfuscation techniques (e.g., code compressions and encryption) and write variants
of the same malware to avoid the signature detection (You and Yim, 2010). Besides
that, signature generation requires a lot of manpower and time to extract the signa-
tures of each malware.
As a first line of defense against signature detection, malware can be encrypted
or “packed” (i.e., compressed). The advantage of encryption is that a signature
that is present in the unencrypted code will not appear in the encrypted version.
From the malware author’s perspective, the disadvantage of encryption is that the
code must be decrypted at some point, and the decryption code itself cannot be
encrypted. Consequently, the decryption code can be the signature.
Polymorphic malware is the next logical step in the arms race between SD and
malware authors. Polymorphic malware morphs the decryption code, and conse-
quently there is no fixed decryption code that can be used as a signature. Ideally,
new decryption code would be generated for each infection. Robust detection of
polymorphic malware is difficult (Runwal et al., 2012).
Metamorphic malware is sometimes said to be “body polymorphic”
(Konstantinou and Wolthusen, 2008; Péter and Ferrie, 2001) That is, instead of
morphing the decryption code, metamorphic code morphs the entire malicious
code. If the morphing is sufficiently thorough, no common signature will exist and
therefore, no encryption is necessary. A wide variety of techniques can be employed
to create metamorphic software. Such techniques include register swapping, gen-
eral code obfuscation, equivalent instruction substitution, code shuffling, and sub-
routine permutation.
Malware authors use advanced techniques (e.g., anti-virtual machine inspec-
tion and anti-debuggers) to hide the malicious activity and finally avoid detec-
tion (Chen et al., 2008). For example, a malware uses anti-debugger techniques
including anti-ptrace, anti-sigtrap and anti-breakpoint to detect the presence of
malware detectors on the host machine and exits cleanly once it finds any malware
detectors.
techniques can be applied on top of observables for more effective detection. This
section presents five categories of analysis techniques: (1) signature-based analy-
sis, (2) stateful analysis, (3) cross-layer analysis, (4) anomaly detection, and (5)
ontologies. Signature based analysis and stateful analysis are described under the
umbrella of rule-based analysis, whereas cross-layer analysis is described with
anomaly detection.
This section describes general concepts and the possibilities for integrating each
approach with information sharing frameworks. One central question is how each
approach can benefit from shared information and how it can be used to generate
new information that should be shared. Figure 3.6 presents the approaches on a
plane, where one axis describes their requirements on the analyzed information,
while the other axis shows for each approach whether it is more suitable for detect-
ing known attacks or novel or highly sophisticated attacks. It can be seen that rule-
based approaches are more suitable for the detection of known attacks. In contrast,
anomaly detection approaches can be used to get indications of novel or unknown
le
ab
s erv m Cross layer
Ob strea
analysis Anomaly
detection
Ontologies
Stateful
analysis
Signatures
gle le
Sin rvab
s e
ob n
Know ated
attac
k histic
l/sop
Nove attack
Figure 3.6 Classification of the five analysis categories. The position on the
plane indicates if a specific approach operates on single observables or a stream
of observables. It further shows if a method is more suitable to detect known
attacks or novel and highly sophisticated attacks.
104 ◾ Collaborative Cyber Threat Intelligence
attacks. With the use of streams of observables, more data can be used and more
complex situations can be classified. In contrast, simpler rule-based approaches
often give more reliable results in known attacks.
3.4.1
Rule-Based Analysis
There are two concepts for establishing rule-based analysis:
1. Black-listing
2. White-listing
3.4.1.1 Black-Listing
A black-listing rule detects pre-defined values in the monitored data. Black-lists are
applied to detect specific IP addresses, port numbers, user names, or clients that
should not occur in an organization’s network (Vacca, 2013). A major drawback of
black-list approaches is that it is easy for attackers to avoid the prohibited values and
circumvent security tools applying black-listing. While those approaches are very
effective to prevent known attacks, it is difficult to keep them up to date, which
makes these approaches vulnerable to unknown attacks that, e.g., make use of zero-
day exploits (Liao et al., 2013).
Common security solutions such as firewalls, signature-based detection
approaches, and antivirus programs utilize black-listing approaches. Black-listing
rules are in general relatively easy to set-up and update and are very effective against
known attacks, which are the majority of malicious activities. Hence, they form
the important base of security analysis especially in smaller companies that can-
not afford the resources and the personnel to set up complex security solutions.
Also for private use, they are a preferred solution. Since black-listing rules forbid
specific events, such as occurring malware signatures or communication on specific
ports, black-lists have to be updated frequently to keep a sufficient protection level
of an ICT network infrastructure. Since this is a resource-intensive task, black-
listing approaches are usually based on centralized distribution mechanisms, where
solution vendors update their customers with predefined signatures and rules to
detect new malware. Hence, those approaches profit from automatically shared
Indicators of Compromise (IoC). This process benefits from the fact that rules
to detect malware signatures do not have to be configured for a specific network
infrastructure—they rather look the same in each environment. However, a draw-
back of such widely distributed and general rules is that they are not able to detect
From Monitoring, Logging, and Network Analysis ◾ 105
3.4.1.2 White-Listing
In contrast to black-listing, white-listing does not prohibit specific actions or values
visible in the monitored data per se. Those approaches allow a specific baseline of
normal system behavior, which forms the so-called ground truth. Continuously
collected data are then compared against the previously defined ground truth. It is
more difficult for an attacker to not violate this ground truth, since the attacker’s
actions usually cause the generation of log and network events that differ from the
normal system behavior. Simple white-listing rules (i.e., the model of the ground
truth) can analyze single events, such as one log line, and allow using, e.g., only
specific IP addresses, ports or Web browsers, and the correlation of multiple events.
This means that in contrast to black-listing approaches, where specific system
behavior is prohibited, a baseline of normal system behavior is allowed (“ground
truth”). The model for this baseline of normal system behavior can be obtained
from data sources such as log data and network traffic (see Section 3.3.2). Thus,
white-listing approaches attempt to avoid the drawback of black-listing, that rules
can be possibly avoided by an attacker, after s/he recognizes them. Furthermore,
white-listing approaches enhance security against unknown attacks that make use
of zero-day exploits or attack vectors nobody thought about when designing the
rules, because they only allow normal user and system activities.
3.4.1.4 Sharing
Rule-based analysis is the vital backbone of a working security solution. While
black-listing approaches are well established for many years, white-listing
approaches are just about to gain more importance. From this development, black-
listing approaches can also profit. White-listing does not rely on frequent updates
of signatures and allows the detection of deviations from normal system behav-
ior and therefore the observation of new, as yet unknown attacks. Based on this,
observable IoCs can be defined. For enabling a useful processing of these IoCs,
system information and event management (SIEM) systems can be used. SIEM
systems can interpret alarms by combining the provided information from security
solutions (e.g., firewalls, IDS, etc.) and organizational context as well as shared
open/external threat intelligence from vulnerability databases, mailing lists, and
online platforms. All this information then can be used to define signatures for
black-listing approaches based on the IoC that have been obtained from white-
listing approaches.
Furthermore, SIEM systems can be used to correlate alarms with information
from risk management, configuration management, compliance management, etc.
The particular challenge here is to apply the data fusion methods suitable to the
context in which a network is used to limit the vast amount of information with-
out losing important insights. Through applying the right mix of data fusion and
From Monitoring, Logging, and Network Analysis ◾ 107
◾◾ Invaders
◾◾ Cyber attacks
◾◾ Misconfiguration
◾◾ System failures
3.4.2.1
What Are Anomalies?
There are different types of anomalies (Chandola et al., 2009) that can indicate
malicious system behavior:
◾◾ A point anomaly is the simplest form and is often also referred to as outlier,
i.e., an anomalous single event. In a two-dimensional space, a point anomaly
is an element at a large distance from all the other elements. In an ICT net-
work, this could be an unexpected login-name or IP address.
◾◾ A contextual anomaly is an event that is anomalous in a specific context but
might be normal in another one. In an ICT network, this can be an anoma-
lous event parameter, such as an unexpected timestamp. A contextual anom-
aly could, e.g., be a system login of an employee outside the normal working
hours, while this login would be normal during normal working time.
◾◾ A collective anomaly usually originates in an anomalous frequency of a usu-
ally normal single event. In an ICT network, this could be a database dump,
which could be caused by a SQL-Injection. During a database dump, a large
number of log lines that refer to normal SQL-Queries are generated. In this
case, the single lines are normal, but their high frequency is anomalous.
Anomalies that refer to the described types might also be detected with simpler
detection methods mentioned in previous sections. But these kinds of anomalies
are usually not caused by APTs (see also Chapter 2), which aim to stay below the
radar. An APT is a tailored and sophisticated attack that is difficult to detect,
usually aims at a specific target, and results in significant damage, such as high
108 ◾ Collaborative Cyber Threat Intelligence
1 2 3
6 5 4
Figure 3.7 The normal log in process to an online shop: (1) the client tries to log
into an online shop on a web server, (2) a connection through firewall occurs,
(3) the Web server checks credentials through a database query, (4) the database
query returns some result, (5) a response through firewall: access acceptance or
denial, (6) client receives response.
3.4.2.2
Intrusion and Anomaly Detection Approaches
In Section 3.4.1 two basic concepts of detecting malicious system behavior were
discussed. This section (Section 3.4.2.2) reviews methods of intrusion detection
and focuses especially on anomaly detection. These approaches usually make use
of statistical methods and machine learning (Tsai et al., 2009). Anomaly detection
tools can use various types of input data, such as network traces and textual log
data (see also Section 3.3.2).
There are three general methods that are used in intrusion detection systems
(IDS): (1) signature-based detection (SD), (2) stateful protocol analysis (SPA), and
(3) anomaly-based detection (AD) (Liao et al., 2013).
1.
SD uses predefined signatures and patterns to detect attackers. This method
is simple and effective for detecting known attacks. The drawbacks of this
method are as follows: it is ineffective against unknown attacks or unknown
variants of an attack, which allows attackers to evade IDS based on SD.
Furthermore, since the attack landscape is rapidly changing, it is difficult
to keep the signatures up-to-date, and thus maintenance is time consuming
(Whitman and Mattord, 2012).
From Monitoring, Logging, and Network Analysis ◾ 109
2.
SPA uses predetermined profiles that define benign protocol activity.
Occurring events are compared against these profiles to determine whether
protocols are used in the correct way. IDSs based on SPA track the state of
network, transport, and application protocols. They use vendor-developed
universal profiles and therefore rely on their support (Karen and Mell, 2007).
3.
AD approaches learn a baseline of normal system behavior, a so-called
ground truth. Against this ground truth, all occurring events are compared
to detect anomalous system behavior. In contrast to SD- and SPA-based
IDS, AD-based approaches allow detection of previously unknown attacks.
A drawback of AD-based IDS is the usually high false positive rate (García-
Teodoro et al., 2009).
SD and SPA use signatures and rules that describe malicious events and thus can be
categorized as black-listing approaches. AD approaches are more flexible and are also
able to detect novel and previously unknown attacks. They permit only normal system
behavior and therefore implement white-listing approaches. While SD and SPA are
relatively easy to deploy, they usually require the support of vendors that share signa-
tures. On the other hand, AD-based approaches are more flexible and can adapt to dif-
ferent situations (see next section about self-learning), but are usually harder to set up.
IDS approaches can be distinguished by the level on which the detection takes
place and can be roughly categorized as host-based IDS (HIDS), network-based IDS
(NIDS), and hybrid or cross-layer IDS (Sabahi and Movaghar, 2008; Vacca, 2014):
◾◾ Host level: HIDS is the initial form of IDS and was invented for the purpose
of securing military mainframe computers (Intrusion Detection System/
Intrusion Prevention System (IDS/IPS) Market (Host Based, Network
Based, Wireless, On-Premise & Cloud Deployment, Appliances, Software,
Professional Services)—Global Advancements Forecasts & Analysis (2014–
2019), 2014). Similar to simple security solutions such as anti-viruses, this
sort of IDS has to be installed on every system (host) in the network to be
monitored. While HIDS delivers specific high-level information about an
attack and allows comprehensive monitoring of a single host, it can be dis-
abled by, e.g., a denial-of-service (DoS) attack, because once a system is com-
promised the HIDS is as well.
◾◾ Network level: NIDS monitors and analyzes the network traffic of a whole
network. The optimal application of NIDS would be monitoring inbound as
well as outbound traffic. However, this might create a bottleneck and slow
down the network. For monitoring a whole network with a NIDS, a single
sensor node is sufficient, and the functionality of the sensor is not effected
if one system of the network is compromised. A major drawback of NIDS is
that if the NIDS’s band width is overloaded, complete monitoring cannot be
guaranteed, because some network packets and therefore possibly essential
information might be dropped.
110 ◾ Collaborative Cyber Threat Intelligence
Table 3.4 Describes Which Type of IDS Considers Which Data Source
Data Source HIDS NIDS Cross-Layer
Network traffic − + ~
Log data + ~ ~
Table 3.4 visualizes which data types are considered by which type of IDS to detect
attacks and invaders.
can be applied for detecting attacks and invaders. But usually these systems pro-
duce some logs, and network packets can be collected for monitoring the system
status and errors. Thus, flexible anomaly detection approaches are required so they
can adapt to the available data and the quickly changing threat landscape and
secure these systems.
One solution to solve problems, such as missing signatures, lacking vendor
support, and challenges created by a quickly changing threat landscape are self-
learning anomaly detection approaches. Generally, there are three methods for
implementing self-learning features to build a baseline of normal system behavior
that then serves as the “ground truth” (Goldstein and Uchida, 2016):
1.
Unsupervised: This method does not require any labeled data; it is able to
learn to distinguish normal from malicious system behavior during a train-
ing phase. Based on the findings, it classifies any other given data after the
training is completed.
2. Semi-supervised: This method is applied when the training set only contains
anomaly-free data and is therefore also called “one-class” classification.
3.
Supervised: This technique requires a labeled training set containing both
normal and malicious data.
These three methods do not require active human intervention during the learning
process. While unsupervised self-learning is entirely independent from human
influence, for the other two methods the user has to ensure that the training data
is anomaly free or correctly labeled. Consequently, the previously described meth-
ods can be categorized as unsupported self-learning approaches. Using completely
unsupported self-learning raises some challenges. While providing training data for
unsupervised self-learning is rather easy and does not require any pre-processing of
the data, these approaches might learn actual malicious system behavior as normal.
Semi-supervised approaches try to avoid this problem by using anomaly-free train-
ing data. Applying these methods raises the problem of obtaining training data
guaranteed to be anomaly free. Retrieving such a dataset from a running produc-
tive system is usually difficult. Also for self-learning based anomaly detection, it is
true that the more information provided during the training phase the more accu-
rately the system works later while an ICT network is monitored. Thus, supervised
self-learning approaches provide the most detailed ground truth, but providing
suitable training datasets for specific network environments is time and resource
consuming. Consequently, the false positive rate is the lowest for AD-based IDS
that apply supervised learning.
To avoid drawbacks such as learning malicious behavior as normal and vice
versa, supported self-learning approaches can be applied, where also system admin-
istrators can influence the anomaly detection process. This means, e.g., that when
an event occurs for the first time (therefore, not part of normal system behav-
ior) and as a consequence is classified as anomalous, the administrator can decide
112 ◾ Collaborative Cyber Threat Intelligence
whether the event comprises an anomaly or is a false alarm so the event should be
considered normal system behavior in the future. Furthermore, self-learning can be
used to adapt the baseline, which describes the normal behavior and keep it actual,
when, e.g., new devices are added to or removed from a network or if the used soft-
ware changes because of updates.
Predicted Condition
Attack
Detected No Attack
3.4.2.4 Sharing
In Section 3.4.2.2, the three methods of IDS were introduced. Since SD and SPA
comprise black-listing approaches and AD implements white-listing, the points dis-
cussed in Section 3.4.1.4 are also valid for IDS. Furthermore, since AD-based IDS
are especially suitable for reveal ng modern sophisticated attacks, such as APTs, a
victim to such an attack can share detailed information on detected observables
e.g., IoC) and the different steps the attacker carried out. A CERT can adopt this
From Monitoring, Logging, and Network Analysis ◾ 113
3.4.3 Ontologies
3.4.3.1 What Is an Ontology?
An ontology is a knowledge representation technique that concerns understanding
and representing important concepts along with their relationship in a particu-
lar domain of interest. The term ontology was originally taken from a branch of
philosophy called metaphysics, associated with studying the nature of existence.
This term was adopted by researchers in the artificial intelligence (AI) field in the
mid-1970s due to its recognized applicability in mathematical logics and building
computational models that enable automated reasoning (Hayes, 1985). In the con-
text of computer and information sciences, an ontology is defined as “an explicit
specification of conceptualization” (Gruber et al., 1993), which formally represents
the knowledge within a domain as a set of concepts and their relationships to model
the domain and support reasoning of concepts. The main representational primi-
tives used by an ontology to specify captured knowledge in the domain are:
Classes or concepts are collections or abstracted groups that can be unambiguously
defined using a property shared by all its members. A concept can be anything in the
domain such as description of a task, function, action, strategy, process, or classifica-
tion of objects. For instance, people or system groups in the organization, depart-
ments, roles, or processes could be specified into classes or subclasses in the ontology.
The subclasses can inherit the common attributes specified in their root class.
114 ◾ Collaborative Cyber Threat Intelligence
Instances or individuals are concrete objects in the domain such as people, sys-
tems, attacks, or resources. These objects represent an individual or specific system
in the domain such as John, Employee01 or ERPserver03. An instance could be
attached to the class to which it belongs. Instances on a technical level are also con-
nected to assets discussed in Section 3.2.2.
Attributes or properties are mainly used to describe the relationship that may
exist between classes or to attach data values. There are two types of properties:
object properties and data properties. Object properties are used to represent the
relations between classes such as binary relationships of subclass-and superclass.
The data properties on the other ha nd are used to attach values and information to
classes or their individual members. These values can be the raw packet features or
any information extracted for the input data.
Rules and axioms are a set of statements and assertions that enable inferring
implicit information based on existing facts on the knowledge. The axioms are used
to model sentences that are always true.
An example of the described ontology primitives and their logical relationship
is illustrated in Figure 3.8. Consider a cyber security domain where an attacker
exploits an input validation vulnerability on a database server to perform SQL
injection attack and steal sensitive information. In this case, main classes of
[Attack, Attacker, Vulnerability, Asset, Impact] could be defined in the ontology,
injection
n
isA
injection device
IsA
IsA
n
isA
isA
n
Data IsA
Mechanism Aff
spoofing Impact ect
s
IsA us Asset IDS
eM
Malformed ec
ha
IsA
ha pr
sI
packets Firewall
IsA
ni ot
mp
sm ec
VulnerableBy
ts IsA
act
Dropping
attacks e IsA
ourc Attack
hasS Control Policy
Threat ex
By
pl
ted
source oi
ts
A
a
tig
mi
issues Configuration
IsA
weakness
Communication
media System
weakness weakness
while subcategories such as type of attacks (e.g., database attacks, Web attacks,
network-attacks) are added as subclasses of the attack class. Moreover, the SQL
injection is represented an instance of the database attacks class. Therefore, the
described connections between various classes are the logical relationships such as
an attacker [exploits] a vulnerability.
15 http://www.sensormeasurement.appspot.com/index.html?p=ontologies#security_onto.
From Monitoring, Logging, and Network Analysis ◾ 117
16 http://www.eil.utoronto.ca/theory/enterprise-modelling/tove/.
17 http://www.idef.com/idef5-ontology-description-capture-method/.
18 http://www.ksl.stanford.edu/software/ontolingua/.
118 ◾ Collaborative Cyber Threat Intelligence
caused interoperability issues. Furthermore, this issue may be more visible when
attempts to integrate information from operational context or human knowledge
or mapping it to technical features in the dataset is approached. For instance, the
detection of some cyber attacks in many critical infrastructures may require evalu-
ating information about the involved processes and system configurations and not
to solely rely on network packet traces.
Current state-of-the-art solutions for cybersecurity event management and
information exchange are mainly hampered by the large volumes of heterogeneous
data to be integrated, modeled, and analyzed. Furthermore, the absence of auto-
mated approaches to deal with dynamic context information, missing data, and
finding the logical connections between various pieces of information is limiting
their ability in detecting modern sophisticated attacks such as Stuxnet malware.
Therefore, recent research efforts toward addressing these issues and improving
cybersecurity analysis and information exchange using ontology are being reported.
The main advantages of ontology-based systems may include its ability in flexibly
modeling big data while enable capturing and integrating contextual information,
extracting the logical relationship among various information pieces, and reason-
ing capabilities to deal with data quality issues such as missing or bad data (Leenen
and Meyer, 2015).
Takahashi and Kadobayashi (2015) proposed a reference ontology for cyberse-
curity operational information exchange on a global scale. The authors structured
cyber information knowledge into four databases which are user resources, pro-
vider resources, incidents, and warning to be integrated and shared among different
organizations. Similarly, Dandurand and Serrano (2013) proposed an approach for
mapping common standards such as STIX and IODEF into ontologies to enable
cybersecurity information integration and sharing. The authors concluded that the
use semantic approaches can enable a more powerful sharing format and leads to
improvements in decision making by security professionals. In addition, Asgarli
and Burger (2016) provided an analysis on the cybersecurity data exchange require-
ments and proposed an ontology framework that addresses these requirements
including correlating data from different domains or in different formats, automat-
ing data interpretation and sharing.
Ontology-based approaches have been also adopted in security information and
event management (SIEM) platforms to enable automated analysis and sharing
of information. Kotenko et al. (2013) presented the design and implementation
of a hybrid ontological-relational data repository for SIEM systems which enables
retrieving vulnerability information from external databases and ontologically inte-
grate them with other information for attack modeling and security evaluation.
Moreover, Kenaza and Aiash (2016) proposed the use of ontological representation
for event correlation in SIEM. In this approach, an ontology is developed to repre-
sent and logically link events, vulnerabilities, attacks, contextual information and
users that may be retrieved from in different formats from different sources such as
IDMEF, TAXII, STIX, OVAL, and NVD.
From Monitoring, Logging, and Network Analysis ◾ 119
3.5 Conclusion
Various different technical solutions are in use nowadays to detect and manage
cyber incidents. While no silver bullet exists, the increasing amount and vari-
ety of low-level sensor data provides a promising source of information to detect
cyber attacks reliably and timely. With the use of different analysis techniques like
signature-based detection, anomaly detection, stateful analysis or ontologies, the
industry tries to manage the data effectively. Still, success rates cannot live up to
the expectations. While it is not sensible to aim at a replacement of all existing tech-
nologies, information sharing can be used to support the existing tools. Signatures
of attacks can be shared and automatically applied to enable timelier detection of
novel attack campaigns. Anomaly detection techniques still need a lot of manual
analysis to understand the underlying attack but provide valuable insights when
it comes to the detection of APTs or truly novel attack vectors. Finally, ontologies
provide the means to identify causality between alerts rather than pure correlation.
Not only is this critical to human investigators, but ontologies are also provided in a
structured format that is sharable between organizations. It becomes clear that the
120 ◾ Collaborative Cyber Threat Intelligence
current tools can benefit from a more collaborative approach to cybersecurity. The
next chapters will therefore discuss remaining challenges and current approaches
to information sharing.
List of Abbreviations
AD Anomaly detection
AI Artificial intelligence
APT Advanced persistent threat
C2 Command and control
CAPEC Common Attack Pattern Enumeration and Classification
CCE Common Configuration Enumeration
CERT Computer emergency response team
CPE Common Platform Enumeration
CPS Cyber-Physical System
CVE Common Vulnerabilities and Exposures
CYBEX Cybersecurity Information Exchange Framework
DMZ Demilitarized zone
DoS Denial of service
EISAS European Information Sharing and Alert System
FPGA Field programmable gateway array
FPR False positive rate
FSM Finite-state machine
HIDS Host-based intrusion detection system
HMI Human–machine interface
ICS Industrial control system
ICT Information and communication technology
IDMEF Intrusion Detection Message Exchange Format
IDS Intrusion detection system
IoA Indicator of Attack
IoC Indicator of Compromise
IODEF Incident Object Description Language
MSSP Managed Security Service Provider
NIDS Network-based intrusion detection system
NVD National Vulnerability Database
OS Operating system
OVAL Open Vulnerability and Assessment Language
PLC Programmable logical controller
SCADA Supervisory, control, and data acquisition
SD Signature-based detection
SIEM System information and event management
SPA Stateful protocol analysis
From Monitoring, Logging, and Network Analysis ◾ 121
References
Asgarli, E. and E. Burger. 2016. Semantic ontologies for cyber threat sharing standards. In
2016 IEEE Symposium on Technologies for Homeland Security (HST), 1–6, May 2016,
Waltham, MA. doi:10.1109/THS.2016.7568896.
Babbin, J., ed. 2006. Security Log Management: Identifying Patterns in the Chaos. Rockland,
MA: Syngress Publishing.
Bayer, U., P. Comparetti, C. Hlauschek, C. Kruegel, and E. Kirda. 2009. Scalable, behavior-
based malware clustering. In NDSS, 9:8–11. San Diego, CA: Citeseer.
Bayer, U., A. Moser, C. Kruegel, and E. Kirda. 2006. Dynamic analysis of malicious code.
Journal in Computer Virology 2(1): 67–77. doi:10.1007/s11416-006-0012-2.
Bhandari, P. and M. S. Gujral. 2014. Ontology based approach for perception of network secu-
rity state. In 2014 Recent Advances in Engineering and Computational Sciences (RAECS),
1–6, 6–8 March 2014, Chandigarh, India. doi:10.1109/RAECS.2014.6799584.
Bilar, D. 2007. Opcodes as predictor for malware. International Journal of Electronic Security
and Digital Forensics 1(2): 156–168. doi:10.1504/IJESDF.2007.016865.
Bittau, A. 2005. The fragmentation attack in practice. In IEEE Symposium on Security and
Privacy, IEEE Computer Society, May 2005, Oakland, CA
Blanco, C., J. Lasheras, R. Valencia-García, E. Fernández-Medina, A. Toval, and M. Piattini.
2008. A systematic review and comparison of security ontologies. In 2008 Third
International Conference on Availability, Reliability and Security, 813–820, 4–7 march
2008, Barcelona, Spain. doi:10.1109/ARES.2008.33.
Braden, R. 1989. Requirements for internet hosts: Communication layers. STD 3. RFC
Editor. http://www.rfc-editor.org/rfc/rfc1122.txt.
Bush, R. and D. Meyer. 2002. Some internet architectural guidelines and philosophy. RFC
3439. RFC Editor. http://www.rfc-editor.org/rfc/rfc3439.txt.
Canali, D., A. Lanzi, D. Balzarotti, C. Kruegel, M. Christodorescu, and E. Kirda. 2012. A
quantitative study of accuracy in system call-based malware detection. In Proceedings
of the 2012 International Symposium on Software Testing and Analysis, 122–132. ISSTA
2012. New York: ACM. doi:10.1145/2338965.2336768.
Chandola, V., A. Banerjee, and V. Kumar. 2009. Anomaly detection: A survey. ACM
Computing Surveys 41(3): 15:1–15:58. doi:10.1145/1541880.1541882.
Chandramohan, M., H. B. K. Tan, L. C. Briand, L. K. Shar, and B. M. Padmanabhuni.
2013. A scalable approach for malware detection through bounded feature space
behavior modeling. In 2013 28th IEEE/ACM International Conference on Automated
Software Engineering (ASE), 312–322. doi:10.1109/ASE.2013.6693090.
Chen, X., J. Andersen, Z. M. Mao, M. Bailey, and J. Nazario. 2008. Towards an understand-
ing of anti-virtualization and anti-debugging behavior in modern malware. In 2008
IEEE International Conference on Dependable Systems and Networks with FTCS and
DCC (DSN), 177–186. doi:10.1109/DSN.2008.4630086.
122 ◾ Collaborative Cyber Threat Intelligence
Christodorescu, M., S. Jha, and C. Kruegel. 2008. Mining specifications of malicious behav-
ior. In Proceedings of the 1st India Software Engineering Conference, 5–14. ISEC ‘08.
New York: ACM. doi:10.1145/1342211.1342215.
Chuvakin, A. A., K. J. Schmidt, C. Phillips, and P. Moulder. 2013. Logging and Log
Management: The Authoritative Guide to Understanding the Concepts Surrounding
Logging and Log Management. Amsterdam, the Netherlands: Elsevier/Syngress.
Creech, G. and J. Hu. 2014. A semantic approach to host-based intrusion detection sys-
tems using contiguousand discontiguous system call patterns. IEEE Transactions on
Computers 63(4): 807–819. doi:10.1109/TC.2013.13.
Dandurand, L. and O. S. Serrano. 2013. Towards improved cyber security information shar-
ing. In 2013 5th International Conference on Cyber Conflict (CYCON 2013), 1–16, 4–7
june, Tallinn, Estonia.
Demme, J., M. Maycock, J. Schmitz, A. Tang, A. Waksman, S. Sethumadhavan, and S.
Stolfo. 2013. On the feasibility of online malware detection with performance
counters. In Proceedings of the 40th Annual International Symposium on Computer
Architecture, 559–570. ISCA ‘13, 23–27 June, Tel-Aviv, Israel. New York: ACM.
doi:10.1145/2485922.2485970.
Denker, G., L. Kagal, and T. Finin. 2005. Security in the semantic web using OWL.
Information Security Technical Report 10(1): 51–58. doi:10.1016/j.istr.2004.11.002.
Dou, D., H. Wang, and H. Liu. 2015. Semantic data mining: A survey of ontology-based
approaches. In Proceedings of the 2015 IEEE 9th International Conference on Semantic
Computing (IEEE ICSC 2015), 244–251, 7–9 February, Anaheim, CA. doi:10.1109/
ICOSC.2015.7050814.
Droms, R. 1997. Dynamic host configuration protocol. RFC 2131. RFC Editor. http://
www.rfc-editor.org/rfc/rfc2131.txt.
Droms, R. 2004. Stateless dynamic host configuration protocol (DHCP) service for IPv6.
RFC 3736. RFC Editor. https://tools.ietf.org/html/rfc3736.
Forrest, S., S. A. Hofmeyr, A. Somayaji, and T. A. Longstaff. 1996. A sense of self for Unix
processes. In Proceedings 1996 IEEE Symposium on Security and Privacy, 120–128, 6–8
May, Oakland, CA. doi:10.1109/SECPRI.1996.502675.
Frühwirt, P., P. Kieseberg, S. Schrittwieser, M. Huber, and E. Weippl. 2012. InnoDB database
forensics: Reconstructing data manipulation queries from redo logs. In Availability,
Reliability and Security (ARES), 2012 Seventh International Conference on, 625–633,
20–24 August, Prague, Czech Republic. IEEE.
García-Teodoro, P., J. Díaz-Verdejo, G. Maciá-Fernández, and E. Vázquez. 2009. Anomaly-
based network intrusion detection: Techniques, systems and challenges. Computers &
Security 28(1–2): 18–28. doi:10.1016/j.cose.2008.08.003.
Garfinkel, T., and M. Rosenblum. 2003. A virtual machine introspection based architecture
for intrusion detection. In NDSS, 3:191–206, 6–7 February, San Diega, CA.
Gascon, H., F. Yamaguchi, D. Arp, and K. Rieck. 2013. Structural detection of Android
malware using embedded call graphs. In Proceedings of the 2013 ACM Workshop
on Artificial Intelligence and Security, 45–54. AISec ‘13. New York: ACM.
doi:10.1145/2517312.2517315.
Gerhards, R. 2009. The syslog protocol. RFC 5424. RFC Editor. http://www.rfc-editor.org/
rfc/rfc5424.txt.
Gerhards, R. and C. Lonvick. 2012. Transmission of syslog messages over TCP. RFC 6587.
RFC Editor. https://tools.ietf.org/html/rfc6587.
From Monitoring, Logging, and Network Analysis ◾ 123
Leenen, L. and T. Meyer. 2015. The use of semantic technologies in cyber defence. In
Proceedings of the 10th International Conference on Cyber Warfare and Security:
ICCWS2015, 170, 24–25, March, Kruger National Park, South Africa. Academic
Conferences Limited.
Li, Y., M. A. Thomas, and K-. M. Osei-Bryson. 2016. Ontology-based data mining model
management for self-service knowledge discovery. Information Systems Frontiers 19(4):
925–943, August 2017. doi:10.1007/s10796-016-9637-y.
Liao, H-. J., C-. H. Richard Lin, Y-. C. Lin, and K-. Y. Tung. 2013. Intrusion detection
system: A comprehensive review. Journal of Network and Computer Applications 36(1):
16–24. doi:10.1016/j.jnca.2012.09.004.
Lin, T-. T. Y. and D. P. Siewiorek. 1990. Error log analysis: Statistical modeling and heuristic
trend analysis. Reliability, IEEE Transactions on 39(4): 419–432.
Liu, Y., B-. C. Seet, and A. Al-Anbuky. 2013. An ontology-based context model for wireless
sensor network (WSN) management in the internet of things. Journal of Sensor and
Actuator Networks 2(4): 653–674. doi:10.3390/jsan2040653.
Mandiant Consulting. 2016. M-Trends 2016. Mandiant.
Michael, S., H. Perper, L. Kauffman, C. Irrechukwu, and D. Wynne. 2015. NIST SP
1800-5-IT asset management. Special Publication 1800-5. NIST National Institute
of Standards and Technology. https://nccoe.nist.gov/publication/draft/1800-
5c/#t=ITAMHowTo%2FCover%2FCover.htm.
Mundie, D. A. and R. Ruefle. 2012. Building an incident management body of knowledge.
In 2012 Seventh International Conference on Availability, Reliability and Security, 507–
513, 20–24 August, Prague, Czech Republic. doi:10.1109/ARES.2012.83.
Newsome, J and D. Song. 2005. Dynamic Taint Analysis for Automatic Detection, Analysis,
and Signature Generation of Exploits on Commodity Software. In 12th Annual Network
and Distributed System Security Symposium (NDSS), 3–4 February, San Diego, CA.
Niles, I. and A. Pease. 2001. Origins of the IEEE standard upper ontology. In Working
Notes of the IJCAI-2001 Workshop on the IEEE Standard Upper Ontology, 37–42, 4–10
August, Seattle, WA. Citeseer.
Novetta. 2016. Operation blockbuster. Unraveling the long thread of the Sony attack.
https://www.operationblockbuster.com/.
Okmianski, A. 2009. Transmission of syslog messages over UDP. RFC 5426. RFC Editor.
https://tools.ietf.org/html/rfc5426.
Ozsoy, M., C. Donovick, I. Gorelik, N. Abu-Ghazaleh, and D. Ponomarev. 2015. Malware-
aware processors: A framework for efficient online malware detection. In 2015 IEEE
21st International Symposium on High Performance Computer Architecture (HPCA),
651–661, 7–11 February, Burlingame, CA. doi:10.1109/HPCA.2015.7056070.
Péter S., and P. Ferrie. 2001. Hunting for metamorphic. Symantec security response. Symantec.
https://www.symantec.com/avcenter/reference/hunting.for.metamorphic.pdf.
Plummer, D. C. 1982. Ethernet address resolution protocol: Or converting network protocol
addresses to 48.bit Ethernet address for transmission on Ethernet hardware. STD 37.
RFC Editor. http://www.rfc-editor.org/rfc/rfc826.txt.
Raghavan, S. 2013. Digital forensic research: Current state of the art. CSI Transactions on
ICT 1(1): 91–114.
Rahmatian, M., H. Kooti, I. G. Harris, and E. Bozorgzadeh. 2012. Hardware-assisted detec-
tion of malicious software in embedded systems. IEEE Embedded Systems Letters 4(4):
94–97. doi:10.1109/LES.2012.2218630.
126 ◾ Collaborative Cyber Threat Intelligence
Runwal, N., R. M. Low, and M. Stamp. 2012. Opcode graph similarity and metamorphic detec-
tion. Journal in Computer Virology 8(1–2): 37–52. doi:10.1007/s11416-012-0160-5.
Sabahi, F. and A. Movaghar. 2008. Intrusion detection: A survey. In 2008 Third International
Conference on Systems and Networks Communications, 23–26, 26–31 October, Sliema,
Malta, Malta. doi:10.1109/ICSNC.2008.44.
Sadighian, A., J. M. Fernandez, A. Lemay, and S. T. Zargar. 2014. ONTIDS: A highly flex-
ible context-aware and ontology-based alert correlation framework. In Foundations and
Practice of Security, 161–177. Springer. doi:10.1007/978-3-319-05302-8_10.
Salahi, A. and M. Ansarinia. 2013. Predicting network attacks using ontology-driven infer-
ence. arXiv:1304.0913 [Cs], April. http://arxiv.org/abs/1304.0913.
Santos, I., F. Brezo, J. Nieves, Y. K. Penya, B. Sanz, C. Laorden, and P. G. Bringas. 2010.
Idea: Opcode-sequence-based malware detection. In Engineering Secure Software and
Systems, 35–43. Springer, Berlin, Heidelberg. doi:10.1007/978-3-642-11747-3_3.
Santos, I., F. Brezo, X. Ugarte-Pedrero, and P. G. Bringas. 2013. Opcode sequences as
representation of executables for data-mining-based unknown malware detection.
Information Sciences, Data Mining for Information Security, 231 (May): 64–82.
doi:10.1016/j.ins.2011.08.020.
Shen, H., J. Hu, J. Zhao, and J. Dong. 2012. Ontology-based modeling of emergency
incidents and crisis management. In Proceedings of the 9th International ISCREAM
Conference, Vancouver, Canada.
Souag, A., R. Mazo, C. Salinesi, and I. Comyn-Wattiau. 2016. Reusable knowledge in secu-
rity requirements engineering: A systematic mapping study. Requirements Engineering
21(2): 251–283. doi:10.1007/s00766-015-0220-8.
Souag, A., C. Salinesi, R. Mazo, and I. Comyn-Wattiau. 2015. A security ontology for secu-
rity requirements elicitation. In Engineering Secure Software and Systems, 157–177.
Springer. doi:10.1007/978-3-319-15618-7_13.
Sridhar, S., A. Hahn, and M. Govindarasu. 2012. Cyber: Physical system security for
the electric power grid. Proceedings of the IEEE 100(1): 210–224. doi:10.1109/
JPROC.2011.2165269.
Symantec. 2016. Internet security threat report. https://www.symantec.com/content/dam/
symantec/docs/reports/istr-21-2016-en.pdf.
Takahashi, T. and Y. Kadobayashi. 2015. Reference ontology for cybersecurity operational
information. The Computer Journal 58(10): 2297–2312. doi:10.1093/comjnl/bxu101.
Tang, A., S. Sethumadhavan, and S. J. Stolfo. 2014. Unsupervised anomaly-based malware
detection using hardware features. In Research in Attacks, Intrusions and Defenses, 109–
129. Springer, Cham. doi:10.1007/978-3-319-11379-1_6.
Tankard, C.. 2011. Advanced persistent threats and how to monitor and deter them. Network
Security 2011(8): 16–19. doi:10.1016/S1353-4858(11)70086-1.
Tsai, C-. F., Y-. F. Hsu, C-. Y. Lin, and W-.Y. Lin. 2009. Intrusion detection by machine learn-
ing: A review. Expert Systems with Applications 36(10): 11994–12000. doi:10.1016/j.
eswa.2009.05.029.
Tsoumas, B. and D. Gritzalis. 2006. Towards an ontology-based security management. In
20th International Conference on Advanced Information Networking and Applications-
Volume 1 (AINA’06), 1:985–992, 18–20 April, Vienna, Austria. doi:10.1109/
AINA.2006.329.
Urbani, J., E. Oren, and F. Van Harmelen. 2009. RDFS/OWL reasoning using the
MapReduce framework. Science, 1–87, University is Vrije Universiteit, Amsterdam;
Faculty of Science.
From Monitoring, Logging, and Network Analysis ◾ 127
Vacca, J. R., ed. 2013. Computer and Information Security Handbook. 2. ed. Amsterdam, the
Netherlands: Elsevier/Morgan Kaufmann.
Vacca, J. R., ed. 2014. Managing Information Security. 2. ed. Amsterdam, the Netherlands:
Elsevier/Syngress.
Van Grembergen, W. and S. De Haes. 2009. Enterprise Governance of Information Technology:
Achieving Strategic Alignment and Value. New York: Springer.
Villeneuve, N. and J. Bennett. 2012. Detecting APT Activity with Network Traffic Analysis.
Trend Micro Incorporated.
Wache, H., T. Voegele, U. Visser, H. Stuckenschmidt, G. Schuster, H. Neumann, and
S. Hübner. 2001. Ontology-based integration of information: A survey of existing
approaches. In IJCAI-01 Workshop: Ontologies and Information Sharing, 2001:108–117,
4–6, August, Seattle, WA. Citeseer.
Walter, T., F. S. Parreiras, and S. Staab. 2014. An ontology-based framework for domain-
specific modeling. Software & Systems Modeling 13(1): 83–108. doi:10.1007/
s10270-012-0249-9.
Wang, X. and R. Karri. 2013. NumChecker: Detecting kernel control-flow modify-
ing rootkits by using hardware performance counters. In Proceedings of the 50th
Annual Design Automation Conference, 79:1–79:7. DAC ‘13. New York: ACM.
doi:10.1145/2463209.2488831.
Wheeler, D. A. and G. N. Larsen. 2003. Techniques for Cyber Attack Attribution. Defense
Technical Information Center.
Whitman, M. E. and H. J. Mattord. 2012. Principles of Information Security. 4. ed.,
International ed. Stamford, CT: Course Technology, Cengage Learning.
Xue, Y., J. Wang, Y. Liu, H. Xiao, J. Sun, and M. Chandramohan. 2015. Detection and clas-
sification of malicious JavaScript via attack behavior modelling. In Proceedings of the
2015 International Symposium on Software Testing and Analysis, 48–59. ISSTA 2015.
New York: ACM. doi:10.1145/2771783.2771814.
Yao, Y., X. Ma, H. Liu, J. Yi, X. Zhao, and L. Liu. 2014. A semantic knowledge base con-
struction method for information security. In 2014 IEEE 13th International Conference
on Trust, Security and Privacy in Computing and Communications, 803–808, 24–26
September, Beijing, China. doi:10.1109/TrustCom.2014.106.
You, I. and K. Yim. 2010. Malware obfuscation techniques: A brief survey. In 2010
International Conference on Broadband, Wireless Computing, Communication and
Applications, 297–300. doi:10.1109/BWCCA.2010.85.
Chapter 4
The Importance of
Information Sharing
and Its Numerous
Dimensions to
Circumvent Incidents and
Mitigate Cyber Threats1
Florian Skopik, Giuseppe Settanni,
and Roman Fiedler
Austrian Institute of Technology
Contents
4.1 Introduction..............................................................................................131
4.2 The Dimensions of Information Sharing...................................................133
4.3 Dimension I: Efficient Cooperation and Coordination.............................135
1 Parts of this chapter appeared first in “Florian Skopik, Giuseppe Settanni, Roman Fiedler: A
problem shared is a problem halved: A survey on the dimensions of collective cyber defense
through security information sharing. Computers & Security 60: 154-176 (2016)”. Reuse with
permission from Elsevier.
129
130 ◾ Collaborative Cyber Threat Intelligence
4.1 Introduction
The smooth operation of critical infrastructures such as telecommunications and
electricity supply is essential for our society. In recent years, however, operators
of critical infrastructures have increasingly struggled with cybersecurity problems
(Langner, 2011). Through the use of standard information and communications
technology (ICT) products and increasing network interdependencies (Rinaldi,
2004), the surfaces and channels of attacks have increased significantly. New
approaches are required to tackle this serious security situation.
One promising approach is the exchange of network monitoring data and status
information (Hernandez-Ardieta et al., 2013) of critical services across organizational
boundaries with strategic partners and national authorities. The main goal is to create
an extensive situational awareness picture (cf. Chapter 6) about potential threats and
ongoing incidents, which is a prerequisite for effective preparation and assistance in
large-scale incidents. Collaboration based on threat information sharing is believed to
be effective in a multitude of cybersecurity scenarios (cf. Chapter 2) including finan-
cially driven cybercrimes, cyberwar, hacktivism, and terrorism (see Dacey, 2003; Denise
and James, 2015). The attack morphology can be different depending on the scenario,
e.g., cybercrime might use stealthy advanced persistent threats (APTs) to steal intellec-
tual property, while cyberwar or cyberterrorism uses botnets to run distributed denial-
of-service (DDoS) attacks. However, information sharing enables the victims to run
coordinated and effective countermeasures and provides preventive support to potential
future targets on how to effectively protect their ICT infrastructures (see NIST, 2016).
We argue that since attacks are becoming increasingly sophisticated, custom-
ized, and coordinated, we also need to employ targeted and coordinated coun-
termeasures. Typical commercial-off-the-shelf (COTS) virus scanner and firewall
systems appear incapable of sufficiently protecting against APTs (Tankard, 2011).
The rapidly growing complexity of today’s networks, emergence of zero-day exploit
markets (Miller, 2007), and often underestimated vulnerabilities (e.g., outdated
software or policies) lead to novel forms of attacks appearing daily. Thus, numerous
information security platforms and knowledge bases have emerged on the Web.
From there, people can retrieve valuable information about identified threats, new
132 ◾ Collaborative Cyber Threat Intelligence
malware, and spreading viruses, along with information about how to protect their
infrastructure (e.g., see national Computer Emergence Response Teams (CERTs)).2
However, this information is usually quite generic, not shaped to particular indus-
tries, and often lacks in-depth knowledge.
In order to make such platforms more effective, sector-specific views along with
rich information and experience reports are required to provide an added value to
professional users. Many standardization bodies, including NIST (2014), ITU-T
(2012), and ISO (2015), have proposed the establishment of centrally coordinated
national cybersecurity centers, which are currently emerging all over the world.
However, effective cybersecurity centers are hard to establish, and often neither
governmental bodies nor companies and customer organizations are well prepared
to run and use them. The challenges are grounded in the fact that cybersecurity
information sharing requires a great deal of multidisciplinary research. Although
the setup of such systems is often reduced to addressing technical aspects, it is a
similarly significant challenge for legal experts, standardization committees, and
social as well as economic scientists. For example, questions dealing with the shar-
ing-process design (i.e., who is allowed to share what and when in a corporate
environment) legal dependencies and regulatory compliance, as well as what can we
learn from existing implementations of CERTs, are of equal importance.
Moreover, while there are many works that deal with information sharing among
CERTs, such as the European Network and Information Security Agency (ENISA,
2011a, 2013a), there is little experience so far with peer-to-peer (P2P) sharing of
such information among companies (cf. Chapter 5). This is due to numerous res-
ervations (ENISA, 2010), such as low quality information, reputational risks, and
poor management. Raising awareness of these issues and providing an overview of
potential solutions are two goals of this chapter.
It is therefore critical to take a closer look into all of these aspects in a struc-
tured form—from the economic motivation (and requirements) on information
sharing, over legal and regulatory aspects, to structural and technological matters.
Therefore, this chapter provides further insights into the following aspects:
The remainder of this chapter is structured as follows: Section 4.2 describes the vari-
ous dimensions of cybersecurity information sharing that need to be considered. For
that purpose, we group all relevant aspects into five distinct categories. After that,
relevant regulations, standards, concepts, supporting tools, and protocols that are
essential for setting up effective information-sharing procedures are discussed. In
particular, Section 4.3 outlines cooperation and coordination aspects and presents
some sample sharing scenarios. Section 4.4 reviews existing regulatory directives
and legal recommendations. Subsequently, Section 4.5 refers to well-recognized
standards in this area, while Section 4.6 covers concrete implementations in terms
of organizational structures. Section 4.7 deals with technologies, tools, and appli-
cable protocols. In Section 4.8, we critically review the applicability of existing solu-
tions in a large-scale national security information-sharing network (as set up in the
context of a number of projects together with national stakeholders). Section 4.9
provides an overview of further readings; finally, Section 4.10 concludes the chapter.
1.
Efficient cooperation and coordination: Real world experiences highlight the
economic need for coordinated cyber defense (Gal-Or and Ghose, 2005;
Gordon et al., 2003), e.g., due to increased system complexity and attack sur-
faces, as well as the sophistication of attacks. This coordinated cyber defense
is mainly realized through information sharing. A wide variety of shared
information classes is viable for a wide range of stakeholders: indicators of
3 Notice that we intentionally left out social aspects, such as personal incentive and motivation
to share, as well as reward and trust. These issues have been extensively studied in the literature
(cf. Abrams et al., 2003; Fernandez Vazquez et al., 2012; Golle et al., 2001; Parameswaran
et al., 2001; Skopik and Li, 2013) and are thus omitted here for the sake of brevity. Moreover,
incentive and motivation of individuals are comparatively neglectable where sharing is either
legally enforced or performed due to compliance issues.
134 ◾ Collaborative Cyber Threat Intelligence
1. | Efficient
cooperation and
coordination 2. | Legal and 3. | Standardization
regulatory landscape efforts
is about sharing resources and
keeping costs for security low such as directives and clear legal from NIST, ENISA and the like are
through, e.g., exchanging boundaries are the basis for essential to understand how to
indicators of compromize, zero day enabling effective information implement and handle information
vulnerabilities, early warnings, sharing. sharing procedures.
and providing mutual help
and support.
5. | Technology
4. | Regional and int'l integration into
implementations organizations
deal with the integration of sharing is about selecting appropriate
procedures in existing structures protocols and tools, which fit to
and coupling to existing processes organizational processes to
and initiatives, such as CERTs. support incident information
sharing.
Figure 4.1 The primary dimensions of information sharing and their concerns.
Although information sharing might seem in contrast with the attitude of some
nation-states performing espionage on other countries, this should not void infor-
mation-sharing efforts among organizations (especially those with similar infra-
structures, thus suffering from similar vulnerabilities or being potentially similarly
attractive to attackers) from these countries on another layer. The key message of
ENISA is to transfer knowledge from the cybersecurity community to the user
groups for the purpose of strengthening cyber defense. To this end, effective infor-
mation sharing, not only between security professionals, but also between all stake-
holders dealing with critical ICT systems, needs to be enabled.
CERTs. This taxonomy (see Kácha, 2014) groups incidents into eight main catego-
ries (incident classes) and 25 subcategories (incident types). Several features make
this taxonomy convenient to use. The main categories are actual and universal,
while the subcategories became a part of the description rather than a concrete
schema for classification.
Eventually, all these measures are suitable for increasing cyber situational awareness.
The Importance of Information Sharing Dimensions ◾ 145
FURTHER INFORMATION
Compare the scenarios of Chapter 2 with the available information at dif-
ferent stages of an attack (cf. Chapter 3). Clearly, in different stages of an
attack varying levels of information are available to different stakeholders.
Connecting those parties and enabling them to exchange vital information,
in an early stage to trigger timely prewarnings and in later stages to help
investigations, is the key to success—and eventually a partial goal of the
European NIS directive (see Chapter 7).
◾◾ Organizations inform the national cyber center about the status of the ser-
vices they provide.
◾◾ The national cyber center informs organizations about other organizations’
service status.
◾◾ Organizations inform one another about their service status.
146 ◾ Collaborative Cyber Threat Intelligence
◾◾ An organization asks for assistance from other organizations that might have
dealt with similar issues in the past.
◾◾ The cyber center asks federated organizations for support for organizations
facing a particular issue.
Several smaller countries, outside the EU and the US, are currently discussing the
essential aspects of Critical Information Infrastructure Protection (CIIP) to be
regulated in their upcoming policies and directives. Due to resource limitations,
the cybersecurity strategies being developed by Latin American countries such as
Argentina, Colombia, Uruguay, and Trinidad and Tobago are mostly based on
best practices and models adopted from more developed countries (see Micro and
Organization of American States, 2015). According to BSA-The Software Alliance
and Galexia (2015), a study providing a comprehensive overview on cybersecurity
policy environment in ten Asia-Pacific markets, the markets included in the study
have historically been slow to produce comprehensive national cybersecurity strat-
egies and to implement the necessary legal frameworks for security and critical
infrastructure protection. However, in order to strengthen the protection of criti-
cal infrastructure from cyber threats, in the Asia-Pacific region public and private
stakeholders are now cooperating to the establishment of proper policy, legal, and
operational frameworks; improve collaboration with various relevant stakeholders’
communities; effectively share meaningful cybersecurity information; and priori-
tize the protection of critical infrastructures.
In the following we focus on the most prominent regulatory efforts and report
excerpts, related to cybersecurity in critical infrastructure and information sharing,
collected from the aforementioned European and American bills. Notice that these
will be studied in more detail in Chapters 7 and 8 of this book.
Particularly relevant for the scope of this work is the recent establishment of
the NIS directive (European Commission, 2016) and the subsequently planned
implementation in all European Member States. The NIS directive requires each
Member State to set up a well-functioning CERT and adopt a national and interna-
tional NIS cooperation plan. Sharing information and mutual assistance among the
national NIS competent authorities is identified as a primary requirement for coor-
dinating prevention, detection, mitigation, and response to cyber attacks. Private
and public players in different areas (i.e., energy, transport, banking, public admin-
istration, etc.) are requested to perform appropriate risk management and share
identified information with the national NIS competent authorities. Incidents with
a significant impact on the continuity of core services must be reported to the same
authorities that will in turn exchange this information, if necessary, with cooperat-
ing regulatory bodies and law enforcement authorities.
Another priority in this strategy is the fight against cybercrime. For this pur-
pose, the EC is asked to support the European Cybercrime Centre (EC3) in provid-
ing analysis, intelligence, investigation of forensics, facilitation of cooperation, and
creating of channels for information sharing among the competent authorities in
the Member States, the private sector, and other stakeholders.
Moreover, the EC aims to develop a cyber defense policy framework to protect
networks according to the Common Security and Defence Policy (CSDP) mission.
Implementing dynamic risk management, threat analysis, and information sharing
is a crucial objective of this mission.
In order to face the complexity of managing cyber incidents within the inter-
connected networks of the Union, the strategy instructs all the different involved
actors (NIS competent authorities, CERTs, law enforcement, and industry) on roles
and responsibilities they should take both on a national and an EU level. National
governments are most suitable for carrying out prevention and response to cyber
incidents and attacks and establishing contacts and networks with the private sector.
At the same time, to be effective a national response requires EU-level involvement.
technical, financial, and human resources and processes fulfill the high security
requirements will be eligible to get access to the sharing infrastructure.
According to the Directive, early warnings should be made within the network
only in the case of significantly severe incidents or risks that may affect more than
one Member State and therefore require coordination of the response at the Union
level. In the notification process, particular attention should be paid to preserving
informal and trusted channels of information sharing between market operators
and between the private and public sectors.
The Commission shall be empowered to adopt a Union NIS cooperation plan
providing for:
1. A definition of the format and procedures for the collection and sharing of
compatible and comparable information on risks and incidents by competent
authorities
2. A definition of the procedures and the criteria for the assessment of the risk
and incidents by the cooperation network
8 The implementation of these programs has been further detailed in the Cybersecurity
Information Sharing Act (CISA) of 2015, Section 103(a)(4).
150 ◾ Collaborative Cyber Threat Intelligence
(Continued)
152 ◾ Collaborative Cyber Threat Intelligence
Table 4.2 (Continued) Subjects Addressed in the Different EU and U.S. Regulatory Initiatives
Regulated Subject EU CS Strategy EU NIS Directive US WH EO 13636 US PPD-21
Format and procedure — Compatible and Provide classified and Timely exchange of
for collection and comparable information unclassified threat threat and
sharing information on risks and incidents and attack vulnerability
shall be shared by information to information.
Member States companies. Near Identify data
real-time sharing of formats and
cyber threat accessibility,
information system
interoperability,
and redundant
systems
Privacy Considered but only Personal data protection Considered but only —
partly addressed authorities shall be partly addressed
involved when required
The Importance of Information Sharing Dimensions ◾ 153
Strategic Imperative 1). It shall include the capability to collate, assess, and
integrate vulnerability and consequence information with threat streams and
hazard information to aid in prioritizing assets and managing risks to critical
infrastructure, anticipate interdependencies and cascading impacts, recom-
mend security and resilience measures for critical infrastructure prior to, dur-
ing, and after an event or incident, and support incident management and
restoration efforts related to critical infrastructure.
The legal initiatives reviewed in the previous sections are summarized in Table 4.2.
The table provides an overview on the main subjects the documents analyze. It also
highlights the different approaches the initiatives suggest or demand in order to
address the various issues.
9 An updated version (Version 1.1) of this framework is being drafted and will be published by
NIST in autumn 2017. Providing new details on managing cyber supply chain risks, clarifying
key terms, and introducing measurement methods for cybersecurity, the updated framework
aims to further develop NIST’s voluntary guidance to organizations on reducing cybersecurity
risks.
The Importance of Information Sharing Dimensions ◾ 157
framework core then identifies underlying key categories and subcategories for each
function and matches them with example informative references such as existing
standards, guidelines, and practices for each subcategory.
Profiles are defined to help organizations align their cybersecurity activities with
their business requirements, risk tolerances, and resources. A framework profile
represents the outcomes based on business needs an organization has selected from
the framework categories and subcategories. The profile can be characterized as the
alignment of standards, guidelines, and practices to the framework core in a par-
ticular implementation scenario. Profiles can be used to identify opportunities for
improving cybersecurity posture by comparing a “current” profile with a “target”
profile. To develop a profile, an organization can review all of the categories and sub-
categories and, based on business drivers and a risk assessment, determine which are
most important; they can add categories and subcategories as needed to address the
organization’s risks. The current profile can then be used to support prioritization and
measurement of progress toward the target profile, while factoring in other business
needs including cost effectiveness and innovation. Profiles can be used to conduct
self-assessments and communicate within an organization or between organizations.
The tiers support organizations in understanding the characteristics of their
approach to managing cybersecurity risk. Framework tiers provide context on how
an organization views cybersecurity risk and the processes in place to manage that
risk. Tiers describe the degree to which an organization’s cybersecurity risk man-
agement practices exhibit the characteristics defined in the framework (e.g., risk
and threat aware, repeatable, and adaptive). The tiers characterize an organization’s
practices over a range, from partial (tier 1) to adaptive (tier 4). These tiers reflect
a progression from informal, reactive responses, to approaches that are agile and
risk-informed. During the tier-selection process, an organization should consider
its current risk management practices, threat environment, legal and regulatory
requirements, business/mission objectives, and organizational constraints.
The framework also includes a methodology to protect individual privacy and
civil liberties when critical infrastructure organizations conduct cybersecurity
activities. While processes and existing needs will differ, the framework can assist
organizations in incorporating privacy and civil liberties as part of a comprehensive
cybersecurity program. Moreover, the framework enables organizations to apply
the principles and best practices of risk management to improving the security and
resilience of critical infrastructure. The framework finally provides organization
and structure to today’s multiple approaches to cybersecurity by assembling stan-
dards, guidelines, and practices that are working effectively in the industry today.
For the exchange of cybersecurity information to occur between any two enti-
ties, the exchange must be structured and described in some consistent manner
that is understood by both of those entities. For the purposes of accomplish-
ing these exchanges, cybersecurity information includes structured information
or knowledge concerning the following characteristics: the state of equipment,
software, or network-based systems as related to cybersecurity, especially vulner-
abilities; forensics related to incidents or events; heuristics and signatures gained
from experienced events; cybersecurity entities involved; specifications for the
Protection of ✓ ✓ ✓
shared
information
Cybersecurity ✓ ✓
risk
management
Privacy ✓ ✓ ✓
preservation
in information
sharing
Data format, ✓ ✓
protocols and
standards
Data quality ✓
improvement
Incident ✓ ✓ ✓
handling
process
160 ◾ Collaborative Cyber Threat Intelligence
4.6.1 CERTs
Asia: APCERT 10: Formed during the first Asia-Pacific Security Incident Response
Coordination (APSIRC) meeting in Japan in March 2002, with the aim of improving
working relationships between CERT neighbors across national borders, APCERT is
the vehicle for regional cross-border cooperation and information sharing. In February
2003, 15 CERT teams from the 12 Asia-Pacific economies accepted the APCERT
agreement. APCERT aims at maintaining a trusted network of computer security
experts in the Asia-Pacific region to improve the region’s awareness and competency in
relation to computer security incidents, enhance Asia-Pacific regional and international
cooperation on information security, jointly develop measures to deal with large-scale
or regional network security incidents, promote collaborative research and development
on subjects of interest to its members, assist other CERTs in the region in conducting
efficient and effective computer emergency response, and provide input and/or recom-
mendations to help address legal issues related to information security and emergency
response across regional boundaries.
10 http://www.apcert.org; April 2016.
The Importance of Information Sharing Dimensions ◾ 161
Networks (NRENs) with each other and Europe. More at http://www.redclara.net; April
2016.
14 https://www.us-cert.gov; April 2016.
162 ◾ Collaborative Cyber Threat Intelligence
government also cooperates with the sector Information Sharing and Analysis
Centers (ISACs), hosting meetings limited to organizations dealing with the pro-
tection of critical national infrastructure. Specifically, the Information Technology
Information Sharing and Analysis Center (IT-ISAC) is established as a trusted com-
munity of security specialists, from companies across the Information Technology
industry, dedicated to protecting the Information Technology infrastructure by
identifying threats and vulnerabilities to the infrastructure and sharing best prac-
tices on how to quickly and properly address them. The IT-ISAC also communi-
cates with other sector-specific ISACs, enabling members to understand physical
threats, in addition to cyber threats. Taken together, these services provide mem-
bers a current and coherent picture of the security of the IT infrastructure.
4.6.2.1 FIRST
FIRST is an organization formed in 1990 with the goal of establishing better com-
munication and coordination between incident response teams. Today the FIRST
membership consists of 286 teams across 61 countries from a variety of organi-
zations including educational, commercial, vendor, government, and military.
Membership in FIRST enables incident response teams to respond to security inci-
dents by providing access to best practices, tools, and trusted communication with
member teams. FIRST members develop and share technical information, tools,
methodologies, processes, and best practices. FIRST encourages and promotes
the development of quality security products, policies, and services, develops and
publishes best practices, promotes the creation and expansion of incident response
teams and memberships from organizations from around the world.
incentives to cooperate; some teams, being in private or public sector, affiliate and
start cooperation because of their common area of interest.
The European government CSIRTs group (EGC) is an informal group of gov-
ernmental CERTs. Given the similarity in constituencies and problem sets between
its members, this group aims at developing methods for incident response, taking
advantage of the cooperation between its members. EGC members carry out dif-
ferent activities in order to reach this objective. They develop measures to deal with
network security incidents, enable information-sharing and technology exchange
relating to IT security incidents and malicious code threats and vulnerabilities,
identify areas of specialist knowledge and expertise to share within the group, iden-
tify areas of collaborative research and development, and communicate common
views with other initiatives and organizations. Moreover, EGC members cooperate
with other international CERT initiatives dealing with vulnerabilities and incident
management on a global scale (e.g., many EGC teams are members of FIRST and
TF-CSIRT).
16 https://www.bsi.bund.de/EN/Topics/IT-Crisis-Management/itcrisismanagement_node.
html; April 2016
17 https://www.ncsc.nl/english/; April 2016.
18 http://www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/ccirc-ccric-eng.aspx; April 2016
The Importance of Information Sharing Dimensions ◾ 165
19 Notice that we left commercial products out intentionally, as it is not our goal to adver-
tise certain products here, and thus rather survey tool/solution categories with open-source
alternatives.
166 ◾ Collaborative Cyber Threat Intelligence
SIEM (Security Information and Event Management) tools are used to perform
correlation on the enterprise level, by analyzing information derived from varying
datasets, and are already available on the market. However, commercial solutions
often come at high costs, while the open-source solutions are usually harder to
manage. There is still no standard framework that defines how to get to the root
cause of an incident by fully utilizing all data feeds available to a CERT/CSIRT
team. Emerging solutions that enable correlation of external services that provide
incident data, such as Megatron20 or AbuseHelper,21 are becoming available now,
but are still not mature. The need for such tools is recognized by many CERTs, but
they remain underemployed.
In the following section, we provide a short comparison of some of the open
web-platform and open-source tools that are currently employed by CERTs and
cybersecurity centers, for information sharing and data correlation.
FURTHER INFORMATION
One of the main challenges of any type of information-sharing platform is
to motivate participants to share valuable information. The MISP solves this
issue in an elegant way: People can query the platform for any information
about a suspicious process name, log entry, file, or hash value (and more types
of information fragments)—in the background requests are transformed into
hash values. However in order to do that, they also contribute. For instance,
if multiple people query the platform for information on a specific process
name, they mutually reinforce their suspicion, so that everyone knows others
have seen a similar possibly unwanted information fragment.
Risk/Attack Asset
Threat indicators definition
alerts CyBOX SWID
Vulnerability CAPEC CEE CPE CPE
alerts
Configuration CVRF
CWE
guidance CVSS
CVE Incident
XCCDF CCSS report
OCIL
CCE RID-T CYBEX
STIX RID CWSS
IODEF IndEX
OVAL MAEC
Figure 4.2 Knowledge areas covered by the different existing standards. (From
Hernandez-Ardieta, J.L. et al., 2013 5th International Conference on Cyber
Conflict (CyCon), IEEE, pp. 1–28, 2013. With permission.)
formats for IoC descriptions. In the following, we briefly describe the two most
prominent initiatives from OASIS (formerly developed by MITRE) and the IETF.
the language so that portions of the available features are independently usable,
accounting for the relevance of a specific use case.
Trusted Automated eXchange of Indicator Information (TAXII)26 defines
a set of services and message-exchange mechanisms for the detection, preven-
tion, mitigation, and sharing of cyber threat information across organization
and service boundaries. It allows organizations to achieve improved situational
awareness about emerging threats, enabling them to share subsets of informa-
tion with a selected list of partners they choose. TAXII is the preferred method
to securely and automatically exchange information represented in the STIX
language. TAXII use cases include public alerts or warnings, private alerts and
reports, push and pull content dissemination, and set-up and management of
data sharing between parties. It uses a modular design that can accommodate
a wide array of optional sharing models. Sharing models supported by TAXII
include (but are not limited to):
FURTHER INFORMATION
STIX and TAXII are currently (January 2017) under heavy development.
STIX 2 is going to be released soon with major improvements. The types of
entities and their relations have been revised, as well as the underlying tech-
nology completely changed from XML to JSON. Furthermore, OASIS CTI
plans to integrate STIX 2 with TAXII into one consistent standard. For most
recent information, interested readers should refer to the OASIS CTI web
page: https://oasis-open.github.io/cti-documentation/
FURTHER INFORMATION
The closer collaboration between private and public bodies shall be enforced
by the European Cyber Security Organisation (ECSO).27 ECSO is a fully
self-financed not-for-profit organization under the Belgian law, established
in June 2016. ECSO represents an industry-led contractual counterpart
to the European Commission for the implementation of the cybersecurity
contractual public–private partnership (cPPP). ECSO members include a
wide variety of stakeholders such as large companies, SMEs and Start-ups,
research centers, universities, end-users, operators, clusters, and association
as well as European Member States’ local, regional, and national administra-
tions, countries part of the European Economic Area (EEA), the European
Free Trade Association (EFTA), and H2020 associated countries. The main
objective of ECSO is to support all types of initiatives or projects that aim to
develop, promote, and encourage European cybersecurity.
and private stakeholders. Moreover, the EU incentivizes the enhancement and sub-
sequent exploitation of the synergies between civilian and military approaches in
protecting critical cyber assets by the means of establishing research and devel-
opment programs and closer cooperation among governments, private sector and
academia in the EU.
No particular focus is reserved in these documents on sharing of information
about vulnerabilities affecting the ICT “supply chain” itself. Legal frameworks reg-
ulating the discovery of traces of possible threats, such as the presence of hardware
back doors (see Waksman and Sethumadhavan, 2011), “built-in” by IT systems
manufacturers, are strongly required.
2003; Gibson and Cohen, 2003). This type of approach, on the other hand, leads
to increased value and sensitivity of the information shared and therefore requires
a more secure and reliable communication infrastructure.
public; however, the vendor needs to be contacted upfront to also provide a solution
(bugfix, update, configuration change) together with the disclosure. Similarly, the
Enhanced Cybersecurity Program, extended by the U.S. Executive Order (White
House, 2013a), imposes the sharing of sensitive and classified government-vetted
cyber threat information with qualified commercial service providers and opera-
tional implementers. The DHS, therefore, does not share threat indicators with CI
entities directly but rather with participating CSPs.
4.10 Conclusion
In practice, security-information sharing is usually accomplished via ad-hoc and
informal relationships. Often, national CERTs assume the role of a contact point for
coordinating and aggregating security incidence reports. However, the information
List of Abbreviations
APCERT Asia-Pacific CERT
APT Advanced persistent threat
ASN Autonomous System Number
CAPEC Common Attack Pattern Enumeration and Classification
CCIRC Canadian Cyber Incident Response Centre
CEENet Central and Eastern European Networking Association
CERT Computer Emergence Response/Readiness Team
CI Critical infrastructure
CIIP Critical Information Infrastructure Protection
CISA Cybersecurity Information Sharing Act
CLARA Cooperation of Advanced Networks in Latin America
COTS Commercial off the shelf
CSIC Computer Security Incident Coordination
CSIRT Computer Security Incident Response Team
CTI Cyber threat intelligence
CyBOX Cyber Observable Expression
ENISA European Network and Information Security Agency
EO Executive Order
ETSI European Telecommunications Standards Institute
FIRST Forum for Incident Response and Security Teams
HTTPS Hyper Text Transfer Protocol Secure (over SSL/TLS)
182 ◾ Collaborative Cyber Threat Intelligence
References
Abrams LC, Cross R, Lesser E, Levin DZ. Nurturing interpersonal trust in knowledge-shar-
ing networks. Acad Manage Exec, 2003;17(4):64–77.
Agrawal R, Evfimievski A, Srikant R. Information sharing across private databases. In:
Proceedings of the 2003 ACM SIGMOD International Conference on Management of
Data. ACM; San Diego, CA, June 9-12, 2003. pp. 86–97. ISBN 1-58113-634-X.
Anonymous. Port scanning/0 using insecure embedded devices. 2012. http://internetcen-
sus2012.bitbucket.org/paper.html [accessed April 2016].
Arora A, Telang R, Xu H. Optimal policy for software vulnerability disclosure. Manage Sci,
2008;54(4):642–56.
Arstechnica. Spamhaus DDoS grows to internet-threatening size. 2013. http://arstechnica.
com/security/2013/03/spamhaus-ddos-grows-to-internet-threatening-size/ [accessed
April 2016].
BSA-The Software Alliance and Galexia. Asia-pacific cybersecurity dashboard—A path to
a secure global cyberspace. 2015. http://www.bsa.org/APACcybersecurity [accessed
April 2016].
Clarke R. China cyberassault on America. Wall Street J, June 15, 2011.
The Importance of Information Sharing Dimensions ◾ 183
Maltby D. Big data analytics. In: Communication and information in society, technology and
work, vol. 48. ASIST; 2011. Proceedings of the 74th ASIS&T Annual Meeting. Bridging
the Gulf: Communication and Information in Society, Technology, and Work, New
Orleans, LA, October 9–12, 2011. https://www.asist.org/events/annual-meeting/past/.
Micro T, Organization of American States. Report on cybersecurity and critical infrastructure
in the Americas. 2015.
Miller C. The legitimate vulnerability market: The secretive world of 0-day exploit sales. In:
Proceedings of the Workshop on the Economics of Information Security (WEIS). Pittsburgh,
PA, June 7– 8, 2007. pp. 1–10.
Moriarty K. Rfc 6545: real-time inter-network defense (RID), 2012. http://www.ietf.org/
rfc/rfc6545.txt accessed April 2016].
NATO Cooperative Cyber Defence Centre of Excellence. International cyber incidents—
Legal consideration. 2010.
NATO Cooperative Cyber Defence Centre of Excellence. Strategic cyber security. 2011.
NATO Cooperative Cyber Defence Centre of Excellence. National cyber security—
Framework manual. 2012.
NATO Cooperative Cyber Defence Centre of Excellence. Tallinn manual on the interna-
tional law applicable to cyber warfare. 2013.
NIST. Framework for improving critical infrastructure cybersecurity, Version 1.0, February
12, 2014. https://www.nist.gov/sites/default/files/documents/cyberframework/cyber-
security-framework-021214.pdf.
NIST. Guide to cyber threat information sharing. NIST special publication 800-150.
October 2016. http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-
150.pdf.
Olson P. We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global
Cyber Insurgency. Little, Brown 2012;528. Back Bay Books, ISBN-10: 0316213527;
ISBN-13: 978-0316213523, https://books.google.at/books?id=ncGVPtoZPHcC
[accessed April 2016].
Parameswaran M, Susarla A, Whinston AB. P2P networking: An information-sharing alter-
native. Computer, 2001;34(7): 31–38.
Phillips CE Jr, Ting T, Demurjian SA. Information sharing and security in dynamic coali-
tions. In: Proceedings of the Seventh ACM Symposium on Access Control Models and
Technologies. ACM; Monterey, CA, June 3–4, 2002. pp. 87–96. http://dl.acm.org/
citation.cfm?id=507711&picked=prox.
Rinaldi SM. Modeling and simulating critical infrastructures and their interdependen-
cies. In: Proceedings of the 37th Annual Hawaii International Conference on System
Sciences. IEEE; Big Island, HI, January 5–8. 2004. p. 8. http://ieeexplore.ieee.org/
document/1265029/.
Sarter NB, Woods DD. Situation awareness: A critical but ill-defined phenomenon. Int J
Aviat Psychol, 1991;1(1):45–57.
Settanni G, Skopik F, Fiedler R, Shovgenya Y. A blueprint for a pan-European cyber incident
analysis system. In: Proceedings of 3rd International Symposium for ICS and SCADA
Cyber Security Research. Ingolstadt, Germany, September 17–18, 2015. pp. 84–88.
Shepherd S. Vulnerability disclosure: How do we define responsible disclosure? GIAC SEC
practical repository. SANS Institute, 2003;9.
186 ◾ Collaborative Cyber Threat Intelligence
Shin S, Gu G. Conficker and beyond: A large-scale empirical study. In: Proceedings of the
26th Annual Computer Security Applications Conference. ACM; Austin, TX, December
06–10, 2010. pp. 151–60. http://dl.acm.org/citation.cfm?id=1920261.
Skopik F, Li Q. Trustworthy incident information sharing in social cyber defense alliances.
In: 2013 IEEE Symposium on Computers and Communications. ISCC; Split, Croatia,
July 7–13, 2013. pp. 233–9.
Skopik F, Schall D, Dustdar S. Modeling and mining of dynamic trust in complex service-
oriented systems. Inform Syst, 2010;35(7):735–57.
State of California Department of Justice Office of the Attorney General. Sony Pictures
Entertainment notice letter. 2014.
Tadda G, Salerno JJ, Boulware D, Hinman M, Gorton S. Realizing situation awareness
within a cyber environment. In: Defense and Security Symposium. International Society
for Optics and Photonics. Orlando, FL, April 18–19, 2006. p. 624204.
Tankard C. Advanced persistent threats and how to monitor and deter them. Network
Security, 2011;(8):16–19.
The Senate of The United States. Cybersecurity Information Sharing Act, 2015. https://
www.congress.gov/114/bills/s754/BILLS-114s754es.pdf [accessed April 2016].
US Homeland Security Cyber Security R&D Center. A roadmap for cybersecurity research.
2009.
Virvilis N, Gritzalis D. The big four-what we did wrong in advanced persistent threat detec-
tion? In: 2013 Eighth International Conference on Availability, Reliability and Security
(ARES). IEEE; Regensburg, Germany, September 2–6, 2013. pp. 248–54.
Waksman A, Sethumadhavan S. Silencing hardware backdoors. In: 2011 IEEE Symposium on
Security and Privacy (SP). Oakland, CA, May 22–25, 2011. pp. 49–63.
White House. Executive order (EO13636): improving critical infrastructure cybersecurity.
2013a. http://www.whitehouse.gov/the-press-office/2013/02/12/executive-order-
improving-critical-infrastructure-cybersecurity [accessed April 2016].
White House. Presidential policy directive—Critical infrastructure security and resilience.
2013b. http://www.whitehouse.gov/the-press-office/2013/02/12/presidential-policy-
directive-critical-infrastructure-security-and-resil [accessed April 2016].
Zhao W, White G. A collaborative information sharing framework for community cyber
security. In: 2012 IEEE Conference on Technologies for Homeland Security (HST). IEEE;
Waltham, MA, November 13–15, 2012. pp. 457–62.
Chapter 5
Contents
5.1 Introduction..............................................................................................188
5.2 The Promise of Intelligence Communities.................................................189
5.3 CTI Community Structures..................................................................... 191
5.4 Organizational Context of a CTI Community.........................................197
5.5 Tooling and Infrastructure........................................................................201
5.5.1 Introduction..................................................................................201
5.5.2 CTI Sharing Infrastructure...........................................................202
5.5.3 CTI Sharing Platforms..................................................................205
5.5.4 M alware Information Sharing Platform........................................ 208
5.6 Case Studies..............................................................................................210
5.6.1 E TIS CERT-SOC Telco Network.................................................210
5.6.2 N ational Detection Network.........................................................213
5.6.3 Lessons Learned............................................................................. 215
5.7 Community Enrichment and Enhancements............................................ 218
5.7.1 F eedback and Additions................................................................. 218
187
188 ◾ Collaborative Cyber Threat Intelligence
5.1 Introduction
Over the past years, the landscape of cyber threats has greatly evolved. High-end
cyber attacks are now conducted by professional organizations that have substan-
tial resources and (technical) capabilities at their disposal. Such attacks are often
targeted in nature and may involve a great degree of persistence and (technical)
sophistication (see Chapter 2). To deal with the nature and dynamics of present-
day cyber threats, most large and ICT intensive organizations have fundamentally
revised their cyber resilience strategies. Most prominently, it has become common
to complement traditional (preventive) security controls with elaborate provisions
for security monitoring and incident response. Underlying this development is a
widespread notion that no preventive measure can avert a security incident if the
adversary is sufficiently motivated and competent.
As depicted in Figure 5.1, the evolution of cyber resilience strategies is still ongoing.
While monitoring and response provisions have greatly helped to reduce the damage
resulting from cyber attacks, relying on such a reactive strategy is generally considered
suboptimal. To regain some of the initiative, many organizations are now developing
cyber threat intelligence (CTI) capabilities. In essence, such capabilities serve to antici-
pate (existing or emerging) cyber threats rather than awaiting an actual incident. To
this end, organizations collect and process vast amounts of threat related data, some
structured (i.e., in a standardized, machine-readable format) and some unstructured
(narrative, e.g., threat investigation reports) in nature. Typically, this involves as follows:
Such cyber threat intelligence (CTI) can be acquired from a great variety of sources (see
Chapter 3). Companies such as FireEye, AlienVault, and IBM, for instance, supply CTI
on a commercial basis. Alternatively, CTI can be gathered from public sources (e.g.,
national CERTs, open source intelligence repositories) or even from company-internal
processes and systems. The great wealth of sources presents security practitioners with
an overwhelming amount of data in which it is hard to assess what is truly relevant for
their specific organization and business. Apart from the sheer volume, much of this
data are unqualified and lacks proper context.1 Moreover, some of the most interest-
ing threat intelligence (e.g., pertaining to state actors or zero-day exploits) might appear
fairly late—if at all—through public or commercial channels.2 Thus, while valuable in
their own right, common sources of CTI tend to come with some intrinsic limitations.
Some of the aforementioned issues might be overcome through the concept of
threat intelligence communities, i.e., networks of organizations that exchange CTI
among one another. The remainder of this chapter will explore characteristics of such
CTI communities and the value that might be gained from participating in them.
Interestingly, benefits such as these have also been recognized at the level of
national and regional politics. The U.S. government, for instance, recently intro-
duced legislative provisions to stimulate threat information sharing within the
private sector as well as between private companies and the federal government.4
Similarly, the European NIS Directive (EU, Directive 2016/1148) (adopted by
the European Parliament in July 2016) addresses the exchange of cyber threat
intelligence (a.o. referred to as “early warnings”) among national (Member State)
CSIRT teams and CERT-EU.5 These developments are addressed further in
Chapters 7 and 8.
The concept of a threat intelligence community is not entirely new. Sharing
threat-related insights is a common activity of CSIRT collaboration bodies
such as FIRST6 and TF-CSIRT7 and also takes place through sector-oriented
Information Sharing and Analysis Centers (ISACs8), Information Sharing and
Analysis Organizations (ISAOs), and various other platforms and initiatives (e.g.,
3 Community relevance of specific threat information can be appraised most accurately if part-
ners have some familiarity with each other’s business and infrastructure, e.g., because they
operate in the same industry or geographic region. This will be addressed further in Section 5.6.
4 https://en.wikipedia.org/wiki/Cybersecurity_Information_Sharing_Act; January 2017.
5 CERT-EU, established in 2012, is the permanent Computer Emergency Response Team for
of their vital industries, e.g., water, energy, telecommunications, finance, and health care.
Cyber Threat Intelligence Sharing through National ◾ 191
the information exchanges maintained by CPNI UK). For the actual exchange
of threat-related information, such communities have traditionally relied on fairly
conventional channels and instruments. Threat intelligence might for instance be
shared through e-mail distribution lists or discussed among experts and coordina-
tors via physical meetings, conference calls or IRC9 channels.
The dynamics of present-day cyber threats are quickly pushing traditional
community channels to their limits. Malware families, zero-day exploits, phishing
schemes, DDoS campaigns and numerous other threat manifestations emerge at
such a tremendous pace that it is simply impossible to capture every piece of (seem-
ingly) relevant intelligence in an e-mail thread or IRC chat. To complicate matters
further, threat information acquired via human dialogue or as narrative text in an
e-mail body is typically not suited for any form of automated processing. Thus even
the most basic forms of analysis (e.g., cross-referencing community data with inter-
nal or public intelligence sources) or mitigation (e.g., converting threat indicators
into a detection signature) will immediately put a strain on (usually scarce) expert
resources.
Since traditional channels for exchanging threat intelligence are limited in both
speed and efficiency, they will ultimately not suffice to keep pace with the unremit-
tent stream of threat information. To overcome this, communities are increasingly
streamlining the exchange of threat intelligence through dedicated technical plat-
forms. Such platforms not only facilitate an efficient exchange of threat informa-
tion (e.g., Indicators of Compromise, see above), but also optimize the practicality
of such information in company-internal security processes (e.g., patch manage-
ment and incident monitoring). The latter is fortified by the advent (and industry
adoption) of standardized technology for threat intelligence exchange such as the
framework of protocols developed by the MITRE Corporation (see Section 5.5).
The remainder of this exploration will focus on CTI communities that exchange
threat information via such dedicated automation solutions.
(Continued)
Table 5.1 (Continued) CTI Communities That Employ Automated Channels
Community Est. Region Constituents Description
FS-ISAC42 2013 Global Financial services Global exchange of threat information among financial institutions
firms via vendor-operated platform. Information flow a.o. encompasses
threat indicators, incidents and vulnerabilities. Dedicated analysis
NATO MISP44 2012 NATO National and Operated by NATO Computer Incident Response Capability
member military CERTs (NCIRC). Efforts focus on exchanging samples and indicators
nations (IoCs) of malware encountered by community participants.
Context of incidents is explicitly excluded to reduce sensitivity.
Participation is open to cyber defense and government related
constituents of NATO Member States
42 https://www.fsisac.com/; January 2017.
43 https://www.ncsc.nl/english/Cooperation/national-detection-network.html; January 2017.
44 https://www.ncia.nato.int/Documents/Agency%20publications/MISP%20leaflet.pdf; January 2017.
(Continued)
194 ◾ Collaborative Cyber Threat Intelligence
Table 5.1 (Continued) CTI Communities That Employ Automated Channels
Community Est. Region Constituents Description
NICP MISP 2016 NATO Diverse Exchange of threat information among members of the NATO
member Industry Cyber Partnership (NICP). Efforts focus on unique threat
nations indicators (IoCs) that resulted from investigations at individual
partners. Initial pilot involved NATO itself and a selection of
security solution providers and telecommunications firms
membership. To achieve the desired focus and ensure a sufficient degree of mutual
trust, most such CTI communities are—at least to a certain degree—closed in
nature. This means that admission is restricted by specific criteria or even subject
to invitation (see Section 5.4). The technical solutions employed for exchanging
threat information vary per individual community, as does the extent to which
such exchange is based on standardized technical protocols (see Section 5.5).
Notably, automated channels for threat information sharing rarely stand on their
own. Communities typically use their technical solution of choice to disperse (and
process) machine readable data as efficiently as possible while employing fairly con-
ventional methods (e.g., mailing lists or periodic conference calls) to share support-
ing material (e.g., threat investigation reports) or exchange in-depth insights.
The communities outlined in Table 5.1 are all operated by the constituents
themselves, a representing body or a designated service provider. A separate class of
communities revolves around cloud-based CTI sharing services offered by vendors
of commercial CTI platforms. Prominent examples of such vendor-driven CTI
communities are presented in Table 5.2.
Contrary to the communities outlined in Table 5.1, these vendor-driven com-
munities are generally open to any interested security practitioner or researcher
(specific terms or conditions may apply). Essentially they apply the concept of
“crowdsourcing” to CTI sharing and collaboration. While this offers benefits in
terms of scale, such environments do not encompass the trusted relationships typi-
cal of private CTI communities. Rather than engaging with known and trusted
peers, participants collaborate with entities that have at best been vetted by the
vendor operating the platform. Thus, these vendor-driven communities differ in
nature from the private CTI communities described above. That does not detract
from the fact that these are viable platforms for exchanging CTI that can offer
access to some interesting threat information (not least that supplied by the vendor
itself). A particularly interesting characteristic is they allow participants to engage
in ad hoc (temporary) collaborations, typically driven by shared interest in a con-
temporary threat.
As explained in the table, cloud-based sharing services usually offer means to
exchange threat information within a predefined (closed) user group. Thus, they
can also be employed by private CTI communities.10 The obvious benefit of using
a cloud service is that it removes the need to maintain dedicated technical infra-
structure for exchanging CTI. The inevitable downside is that communities will
have less control over their (potentially sensitive) threat information. For starters,
all such information resides “in the cloud,” and community members must rely on
the vendor to protect it from third-party abuse. On top of this, the vendor itself
may require access to all CTI that is exchanged via its public intelligence platform.
10 The U.S. based Information Technology ISAC in fact employs HP Threat Central for
exchanging intelligence among its members; see http://www8.hp.com/us/en/hp-news/press-
release.html?id=2184147.
Table 5.2 Cloud-Based Services for CTI Sharing
HPE Threat Central47 2014 Hewlett Packard Aggregates intelligence from public sources, security vendors and community
members into thread feeds for communities with a common interest (e.g., of a
common industry or geography). Users can access, create, and share threat
information via a web portal. Dedicated research teams validate data before
community dissemination and contribute specific threat information
Open Threat 2012 Alienvault OTX enables members to share, discuss, and research security threats. Users can share
eXchange (OTX)48 threat information themselves or subscribe to the ongoing analysis of a specific threat
(a so called “pulse”). All data submitted are validated and anonymized by automated
tools. Participants can create private communities for in-depth discussions on specific
threats
ThreatConnect49 2013 ThreatConnect Distributes latest threats via social media-type feeds and allows users to contribute
their own analysis where they see fit. Collaboration can take place with the general
user base or within specific (industry-oriented or privately created) communities.
Supports both attributable (named) and anonymous information sharing. A dedicated
research team contributes threat information and participates in moderated
communities
X-Force Exchange50 2015 IBM Combines community intelligence with the full repository of IBM security intelligence
and several third-party sources. Users can create custom collections of indicators,
vulnerabilities, and contextual data, access other (public) collections or exchange
them more selectively in a private group. The platform tracks trending indicators and
displays current threat activity. It also serves as a distribution point for X-Force
advisories
47 http://www8.hp.com/us/en/software-solutions/cyber-threat-analysis/index.html; January 2017.
48 https://www.alienvault.com/open-threat-exchange; January 2017.
49 https://www.threatconnect.com/; January 2017.
50 https://exchange.xforce.ibmcloud.com/; January 2017.
Cyber Threat Intelligence Sharing through National ◾ 197
This is in fact a likely element in the vendor’s business model.11 Thus, communities
that exchange highly sensitive threat information (and require a corresponding
degree of trust) will often prefer a dedicated solution. Here we note that some
of the aforementioned vendors offer “private cloud” alternatives to their public
service that might prove equally viable as a self-managed platform for particular
communities.
1.
Community objectives. The foundation of any CTI community lies in a clear
definition of its mission and objectives. Most importantly, communities
should clearly demarcate the type and nature of threat information that is to
be exchanged. This demarcation primarily involves the following factors:
a. Manifestations of threat information. CTI comes in many shapes and for-
mats (see Section 5.1) and communities should choose which particu-
lar manifestations they wish to focus on. Some communities revolve
solely around Indicators of Compromise (IoCs) that members can use
to trace malicious activity in their infrastructures while others focus on
higher grade threat information, e.g., concerning (new) attacker meth-
ods or mid- to long-term attacker campaigns. Communities could enrich
their information exchange even further by including such things as IoC
sightings,12 recommended actions, or malware samples.
b. Vetting versus unicity. As explained in Section 5.2, a core benefit of shar-
ing CTI in a community context is that members can validate threat
information for the benefit of the entire membership. The concept of
“vetting” can in fact be the sole driver for sustaining a CTI community.
In such a setup, the threat information that members exchange is not
novel in itself, but the community acts as a filter that separates (and pos-
sibly enriches) relevant insights from the vast amount of publicly available
CTI. An alternative approach is to focus on truly unique threat informa-
tion. In communities that pursue this objective, members typically share
11 Vendors might want to use such threat information to enhance their broader security offering,
e.g., compile detection signatures for customers of their SIEM product.
12 In this context, the term “sighting” refers to an actual “hit” on indicators obtained via the
community exchange.
198 ◾ Collaborative Cyber Threat Intelligence
insights that stem from their internal investigations (e.g., forensic analysis
conducted by a company internal CSIRT or Red Team) that would often
not be disclosed via public channels.
Note that the choices outline above are not mutually exclusive—commu-
nities can focus on very distinct information types but might also have a
broader orientation if that is somehow more suitable for the member base.
It is essential, however, that the objectives of the community are unambigu-
ously clear since these not only determine the value that might be obtained
from participating but also the competence required to supply a meaningful
contribution.
2.
Membership conditions. Among the defining characteristics of any CTI com-
munity is its membership. Thus, communities need to determine upfront
which target audience best suits their objectives. This may result in dis-
tinct criteria concerning the profile of member organizations. A community
might for instance only be open to organizations in a particular industry or
region. Alternatively, some communities might only admit organizations that
have an acknowledged CTI or incident response capability (i.e., a CERT or
CSIRT) in place. Such criteria are often instrumental to the community’s
performance and should thus be unambiguously clear. Another factor to
consider is the required member contribution. Some communities maintain
strict (even quantitative) requisites concerning the supply of threat informa-
tion by individual members. The criteria maintained by the Cyber Threat
Alliance (see Figure 5.2) are illustrative of this approach. While such criteria
might discourage certain companies from joining, they do ensure an ongoing
level of community activity and may thus be worth considering.
Note that the duration of membership is also factor that can be tuned.
While not particularly common, some CTI communities maintain the
Organizational issues and constraints such as those outlined above are usually
specified in a community’s formal policy or Terms of Reference (ToR). Such terms
essentially demarcate the rules of play for members of a CTI community (explicitly
or implicitly).
CTI sharing
service
Web browser
Member 1
Member 2 Member 3
CTI storage
peer-to-peer model are that the participants do not need to set up their own CTI
sharing platforms and do not need to set up trust relations with all the other partici-
pants individually. Moreover, a central CTI service could provide additional services
such as customizable filtering, anonymization toward other members (e.g., hiding
the source of the CTI information or reporting of sightings). On the other hand,
peer-to-peer communities can share CTI information on a more equal trust basis
without having to trust or rely on a central entity. This is, e.g., relevant in the case
of commercial CTI sharing providers that will use the shared CTI for the commu-
nity for their own commercial services. Moreover, some organizations are typically
less reluctant to share CTI information with their peers than a government agency,
such as the national CERT. A novel approach for creating secure and trustworthy
CTI sharing without relying on a central authority may be created using blockchain
technology. The use of blockchain technology for intelligence sharing has been sug-
gested by Jerry Cuomo, IBM’s vice president of blockchain, during his testimony for
the USA President’s Commission on Enhancing National Cybersecurity, on May
16, 201616. This, however, is currently a topic for scientific research.
The Trusted Automated eXchange of Indicator Information (TAXII) standard sup-
ports both the hub–spoke and the peer-to-peer sharing models. By using standardized
CTI exchange data formats and protocols, such as TAXII and STIX, members should
be able to choose their own (vendor-independent) CTI sharing platform to participate
16 https://www.nist.gov/sites/default/files/documents/2016/09/16/ibm_rfi_executive_sum-
mary.pdf; January, 2017.
Cyber Threat Intelligence Sharing through National ◾ 205
in a CTI sharing community. This is unfortunately, nowadays, not yet possible due to
the use of proprietary exchange protocols and CTI data formats, and the lack of full
support of standards. Many vendors have started adopting STIX and TAXII17, 18. The
technical implementation, however, often does not fully support all fields and con-
structs of the STIX data model. If a CTI sharing platform does not support a particular
STIX construct (e.g., TTP, Incident, Campaign) it will discard that information when
it receives STIX documents containing that information formatted in that construct.
The developers of STIX recognized this issue and developed a mechanism to sup-
port interoperability by means of the so-called STIX profiles.19 In a STIX profile, one
describes what STIX fields and constructs MUST, SHOULD, MAY, SHOULD NOT,
or MUST NOT be in the exchanged STIX document. A STIX profile is exchanged
out-of-band. A community can describe in a so-called community profile how it will
use STIX. A member of the community can use the community profile to determine
whether a CTI sharing platform supports all required STIX fields and constructs, both
as consumer and as producer. At the moment of writing this chapter, the OASIS CTI
working group is drafting a new approach for STIX interoperability for STIX version
2.0. Note that vendors do not always implement all TAXII capabilities. When only
the TAXII server is implemented (e.g., inbox), the platform can only receive CTI. This
is typically sufficient if the CTI platform is only intended to receive CTI information
from a CTI feed. For CTI feeds TAXII provides the one-way source/subscribe mecha-
nism. In order to also share CTI information with other members, a TAXII client is
necessary. The TAXII client pushes CTI information to the TAXII server in the central
hub, or directly to TAXII servers of other members in a peer-to-peer community.
gives an overview of the main components and function of a CTI sharing platform.
In order to clearly describe these functions some distinctions need to be made in
the type of CTI information stored by a CTI sharing platform. In this chapter,
distinction made among CTI data, CTI context information, and CTI meta data is
described in Table 5.6. The term CTI record is introduced to refer to the combined
set of CTI data, CTI context information, and CTI meta data that is to be shared.
The reason is that CTI sharing platforms use different terms for a CTI record (e.g.,
it is an Event in MISP, a Pulse in OTX, and an Activity in IBM X-Force Exchange).
The basic functions of a CTI sharing platform are:
◾◾ View, create, and edit function: This enables the user to create new CTI
records. In addition, the user should be able to view and edit CTI records.
◾◾ Import CTI data function: This supports the creation of new CTI records and
contributes to shared CTI records with, e.g., additional indicators; typically
an import function is provided to ingest CTI data from external sources,
such as an intrusion detection system (IDS), security information and event
management (SIEM) solution or other CTI platform. Typical formats for
ingestion of CTI data are OpenIOC, STIX or comma-separated values
(CSV). Some tools even allow the import of pdf and plain text files and sup-
port extracting Indicators from these files.
◾◾ CTI storage and search function: The CTI records are stored in a database with
a search function.
◾◾ CTI exchange function: This enables the user to securely share created CTI
events with community members. The way the exchange takes place depends
on the type of CTI sharing infrastructure (see Section 5.5.2). The security
requirements are confidentiality protection and integrity protection includ-
ing source authentication.
◾◾ Community management function: This provides the capability to add and
remove members and to configure the secure exchange.
◾◾ Notification function: When new CTI records are shared, this function pro-
vides a configurable notification to the user, for instance, by means of e-mail.
◾◾ CTI export function: To support the members to act upon the received CTI, a
CTI export function may be provided to enable exporting of the CTI data in
different formats. Typical formats are STIX, OpenIOC, and CSV. To make
the application of CTI for security monitoring even more simple, some ven-
dors provide export as in a specific IDS rule format (e.g., snort20, Suricata 21,
Bro22).
◾◾ Correlation, fusion, and analysis functions: CTI platforms are typically capable
of automatically correlating CTI data and identifying relations between CTI
records. A CTI sharing platform could provide such advanced functionality.
Analysis functions, such as statistical and graphical, can be beneficial for the
analyst.
◾◾ Automatic enrichment: Some CTI data can automatically be enriched, to
assist the analyst in making more informed decisions. For instance, geoloca-
tion and IP address can automatically be retrieved.
◾◾ Contributing, liking, and commenting: For active interaction between mem-
bers of a community, a function to contribute and comment on CTI records
from other members can be provided; even social media type of interactions,
such as liking the CTI record of another member. In the next section more
examples of collaboration are given that require specific advance functions
from the CTI sharing platform.
◾◾ Consuming CTI feeds: This can be of value for correlation and fusion with
the community-shared CTI data. Consuming CTI feeds is, however, more a
feature of a general CTI platform.
◾◾ Moderation and anonymous sharing function: For the hub–spoke type of CTI
infrastructure, the CTI platform could provide a moderation function and
anonymous sharing of CTI records.
Event Attribute
Org. Category
Id Type
Description Value
Analysis to_ids
ThreatLevel Comment
… …
Tag
Name
Value
Figure 5.6 Simplified data model of an event in MISP. (From Wagner et al.,
The design and implementation of a collaborative threat intelligence sharing
platform. In: Proceedings of the 2016 ACM Workshop Information Sharing and
Collaborative Security, ACM, New York, pp. 49–56, 2016.)
characterize the Event; for instance, to tag the TLP level of the Event. Over the
years, the MISP data model was extended.
MISP is a community sharing platform. It depends fully on community-
generated content. The MISP platform supports both types of CTI community
sharing infrastructures. Via the web interface a hub–spoke sharing community
can be set up. In addition, MISP has its own protocol to synchronize the events
between different MISP instances in a JSON format. MISP supports several
mechanisms: pull, push, and cherry picking. The pull mechanism enables MISP
to discover available events on another MISP instance and download a new or
modified event. The push mechanism sends an event to another MISP instance.
The cherry picking mechanism allows users to select events from another MISP
instance to be pulled to the local MISP instance. These synchronization mecha-
nisms are typically used for setting up a peer-to-peer CTI sharing infrastructure.
To control the distribution of events, MISP traditionally differentiates among
organization only, community only, connected communities, and all sharing
levels. Newer versions of MISP allow the user to define sharing groups more
granularly.
To integrate with other tools, MISP supports the export of events and attributes
in different formats (e.g., OpenIOC, CVS, STIX in XML, and JSON) and as
intrusion detection systems (IDS) signatures (e.g., Bro, Suricata, and Snort). For the
export as IDS rule, MISP allows the user to determine whether an attribute is eligi-
ble to be automatically included in an IDS rule. Some attributes may, for instance,
create an inappropriately large number of false positives or only include informa-
tion for a human analyst. In addition, MISP provides support to automatically
210 ◾ Collaborative Cyber Threat Intelligence
5.6.1 E
TIS CERT-SOC Telco Network
ETIS,25 the community for telecom professionals, is a membership-based organiza-
tion that facilitates collaboration among European telecom providers. Its member
base covers a substantial portion of the European telco landscape. Early 2013, ETIS
established the so-called CERT-SOC Telco Network, comprised of security opera-
tions and incident response specialists in the various member organizations. A key
activity of this group is the exchange of threat information and incident response
experiences. Originally, this took place via biweekly conference calls, online forum
discussions, and biannual meetings. While this dialogue offered valuable insights
and stimulated mutual familiarity and trust, the group gradually recognized that it
needed an enhanced setup to fully exploit its potential. Thus, the members set out to
explore the merits of structured automation in their mutual exchange of threat infor-
mation. A small-scale pilot was launched to establish and try the base infrastruc-
ture. The pilot involved four of the group’s member organizations and took place in
the first half of 2015. TNO26 was involved as a facilitator and independent advisor.
The pilot was exploratory in nature, and the group expressly embraced a practical
approach that would not be burdened by disproportionate governance or overhead.
The idea was to assess the feasibility of automated CTI exchange in the telco com-
munity, thus paving the way for a more elaborate and formal operational setup.
In the early stages of the pilot project, the participants selected the specific
manifestations of threat information they wished to exchange via the automated
channel. They decided to focus primarily on the following elements:
29 Specifically, the pilot employed MISP version 2.3.40 issued on January 29, 2015. This version
has since been succeeded by several (fairly fundamental) updates.
Cyber Threat Intelligence Sharing through National ◾ 213
The rules of play for the telco CTI community also dictated that sharing threat
information was strictly voluntary and that participants were free to act upon such
information as they saw fit. Thus, the telcos did not embrace the concept of “sup-
ply quota” as for instance employed by the Cyber Threat Alliance (see Section 5.4).
◾◾ Private companies in industries that are considered crucial for the proper
functioning of Dutch society. Examples of such industries are energy, water,
and telecommunications.
◾◾ Departments and agencies of the Dutch national government, e.g., the minis-
tries and executive bodies such as the tax and customs administration.
Notably, NCSC was already exchanging threat information with these target
groups well before NDN was conceived. With the NDN, however, came a tech-
nical environment that supports automation and (correspondingly) larger infor-
mation volumes. NDN started with a small number of participants but has the
ambition to grow quite considerably in the near future.
NDN was originally positioned as a platform where NCSC could dissemi-
nate unique high-profile threat information—e.g., concerning state actor methods
and campaigns—to stakeholders in critical industries. CTI of this nature is often
bound by restrictions, at least for a certain period. NDN was seen as a means to
convey such high-value threat information at an appropriate speed to organizations
that needed it most. Over time, the scope was expanded to include cyber threat
information from public sources. At this level, the added value of NDN lies in con-
solidating a great variety of sources and selecting threat information that is actually
relevant for its member base. Thus, similar to the telco community addressed in the
previous section, NDN embraced the concept of “vetting.”
NDN also employs the MISP platform for all automated exchange of (techni-
cal) threat information. Contrary to the telco community outlined above, however,
NDN was set up as a centralized service facilitated by centralized technical infra-
structure (i.e., a hub–spoke architecture as depicted in Figure 5.4). This approach
was chosen to ensure that the uptake of the community would not be hindered by
practical obstacles. Figure 5.7 depicts the NDN architecture in more detail.
NDN actually encompasses three distinct instances of the MISP platform. The
internal (see figure) MISP platform serves to collect, enrich, and correlate source
information. The outcome of such processing is fed to separate, dedicated MISP
instantiations for each of the aforementioned target groups. This setup was chosen
because it allows the NCSC to
◾◾ Compile separate (customized) threat information feeds for private and gov-
ernmental community participants and avoid undesired spillover between
the two and
◾◾ Offer each target group specific means of interfacing with the community
platform that suit the corresponding agreements and relationships.
Concerning the latter, both target groups have similar (browser-based) web access
to their respective MISP environments. Specialists in the respective partner orga-
nizations can use this channel to log on to the appropriate MISP instantiation and
review the threat information that is in store. On top of this, NDN encompasses
specific technical interfaces that facilitate automation. Here the following applies:
◾◾ The platform for private partners is equipped with an API32 through which
native security solutions can be integrated with the NDN’s threat informa-
tion feed. Partners can for instance use this to automatically feed detection
signatures into their SIEM solutions, similar to the setup seen in the telco
community (see previous section). The extent to which such integration is
indeed established is currently left at the discretion of each partner.
Source ingestion
NCSC
Internal
Government Private
Automated CTI exchange
CTI storage
Web browser
Govern. agency Private partner IDS/SIEM
◾◾ The MISP instance maintained for government bodies can interface directly
with IDS sensors in governmental ICT networks. These sensors are offered by
the NCSC but installed and maintained by the government agencies them-
selves. They interact with the NCSC’s MISP environment (see Figure 5.7)
on a bidirectional basis. Specifically, IDS sensors are automatically fed with
detection signatures (deduced from threat information), and the IDS reports
so called “sightings” (i.e., actual “hits” on a particular threat indicator) back
to the centralized CTI platform. Such “sightings” alert the NCSC of poten-
tial incidents and strengthen its overall situational awareness.
This differentiated setup stems from the fact that the NCSC is itself part of the
national government, and as such is considered the same legal entity as other gov-
ernment bodies.33 Having said this, the NCSC would like to extend the NDN with
threat information (voluntarily) supplied by private partners. The aforementioned
API was in fact already prepared for such collection. At present, however, the inter-
action with private partners is largely one-way. This will be addressed further in the
“lessons learned” section.
Participation in NDN is strictly voluntary, for both private organizations and
the government. In its daily practice, NDN is operated by a dedicated team of ana-
lysts. For governance purposes, the community established a formal steering com-
mittee comprised of the NCSC itself and a selection of public and private partners.
This steering committee serves to govern the NDN road map (e.g., platform func-
tionality, member expansion) and resolve any operational or organizational issues.
33 The NCSC’s role toward government bodies a.o. includes security monitoring and (coordina-
tion of) incident response and thus extends well beyond the supply of threat information.
216 ◾ Collaborative Cyber Threat Intelligence
upon (potential) incidents that they might not have seen—at least not in
quite as timely a manner—had they not taken part in the community. On a
deeper level, these “sightings” indicate that community effort can indeed act
as an effective filter for identifying threat information with actual relevance
(see Section 5.2).
◾◾ Active participation in a CTI community requires a capability that is not always
in place. The CTI working area is fairly new, and many organizations are still
exploring what would constitute a mature CTI practice in their particular
context. The performance of a CTI community, however, is greatly affected
by the competence of its members. Organizations with limited CTI capabili-
ties may for instance have trouble supplying meaningful threat information
to their community partners. This was evident in the early stages of the telco
pilot (see above), where some participants shared lengthy sets of threat indica-
tors with no or limited contextual information (e.g., “malicious IPs” with no
explanation of their exact nature). This left the recipients with little founda-
tion to evaluate the threat and initiate an appropriate course of action. The
need for reasonably mature CTI provisions also extends to the receiving end
of the community concept. If participants are insufficiently able to follow up
on intelligence received and create tangible value from it (i.e., demonstrably
avoid incidents), the need to be present in the community might become
subject to debate.
Both communities outlined above have the experience that participation
in a CTI community actually stimulates the maturity of CTI provisions of
individual members. Arguably, if organizations join a CTI community that
is functioning well, they will be subjected to a steep learning curve that is
beneficial for all involved parties. To achieve this, however, the community
needs a foundation of members with (reasonably) mature CTI capabilities.
This is a factor to consider when founding a CTI community or moving
from a small pilot into a more elaborate operational setting. Based on the
above experiences, a viable expansion strategy is to start the community with
selected organizations that have relatively mature CTI capabilities (e.g., on
an invitational basis) and consider less-developed candidates in a second stage
(when a base level of community activity has been achieved). The message to
take away in this respect is that more participants will not necessarily imply
more participation.
Cyber Threat Intelligence Sharing through National ◾ 217
34 In The Netherlands, this act is known as the “Wet Openbaarheid Bestuur” or WOB.
35 In addition, the retention period of community intelligence was limited to a minimum (after
which only statistics remain).
218 ◾ Collaborative Cyber Threat Intelligence
◾◾ Number of sightings of one or more of the received IoCs: This will provide the
national CERT with information on the active use of the attack method or
malware.
◾◾ Potential impact of the threat for the organization: This will create insight at
the national CERT with respect to the severity of the threat for the organiza-
tions. The national CERT can use this information to assess the potential
level of damage this threat could cause.
◾◾ Incident related to the particular threat and/or IoC: This will inform the
national CERT of successful use of the attack method and will thereby
increase the situational awareness at the national CERT on the active usage
of the attack method.
◾◾ Incident related to the particular threat and/or IoC and the impact to the orga-
nization: In addition to the previous, this will inform the national CERT of
the damage and/or disruptions caused by the incident.
Current initiatives such as the NDN (see Section 5.6.2) are already working toward
the exchange of indicators of compromise and reporting back the “count” of the
number of sightings. This is a very good first indicator that something is happen-
ing, but what the effect is on services rendered by individual organizations is not
immediately clear. The ability to share the effects (or impact) is needed to get an
insight as to the (potential) impact.
To illustrate the differences, the analogy of weather radar can be used. In this
analogy, an indicator of compromise is the type of downpour (e.g., rain). The
220 ◾ Collaborative Cyber Threat Intelligence
sighting is the actual downpour (e.g., amount of rain) and the impact is the related
damage at a certain location (e.g., damage to a server due to leakage). The trick with
cybersecurity is that there is an ever-increasing type of downpour and not a lot of
experience in what the average impacts are when the downpour materializes. There
needs to be a “translation” from sightings to impact information.
Reporting incidents and information on the impact of these incidents in par-
ticular is not something an organization will easily do. Breach notification laws
(e.g., those in the Directive on Privacy and Electronic Communications (E-Privacy
Directive) from 2009, and in the EU’s General Data Protection Regulation) intro-
duce mandates to report certain types of incidents to an authority, but this will not
necessarily create a good basis for sharing sightings and incident information for
the purpose described above. Mandates to report on breaches will drive organiza-
tions to create a formal compliance-oriented process for reporting to the authorities.
When an organization can directly benefit from sharing this type of information,
the hesitance to share the information may reduce.
toward creating insight in the TTP, campaigns, and possible courses of actions, the
community can potentially achieve more value out of the collaboration.
sends it to the source. The source can only perform an AggregateDecrypt over all
collected encrypted values and thereby only learns the total number of sightings
reported.
In Settanni et al. (2016), an approach is described to limit the distribution
of CTI information within a community to specific community members based
on specific characteristics. The mechanism is based on attribute-based encryption
(ABE) that provides a mechanism to cryptographically enforce access policies that
are formulated using attributes describing the parties that should be able to decrypt
(see Bethencourt et al., 2007). The access policy becomes part of the encrypted
data and can only be decrypted if the access policy is satisfied. In other words, only
those members that fit the description in the access policy used to decrypt the CTI
information can decrypt it.
5.8 Conclusions
Driven by recent technological developments, CTI communities increasingly share
information via standardized and automated communication channels. Case stud-
ies reveal that this approach not only facilitates an efficient exchange of threat
information but also optimizes follow-up in the security processes of individual
community participants.
Establishing an effective and sustainable CTI community comes with several
challenges. While some of these are technical, special attention should be devoted to
organizational aspects and the CTI capabilities of community partners. Prominent
issues include demarcation of community objectives and membership conditions,
establishment of appropriate confidentiality arrangements and fulfillment of appli-
cable regulatory constraints.
While current solutions suffice for the basic exchange of threat information,
technical advancements could enhance the value of CTI communities even fur-
ther. Promising concepts include the establishment of recipient-to-sender feedback,
inclusion of “sightings” and impact information in the community exchange, and
provisions to share “sightings” and incidents anonymously.
Acknowledgments
The authors would like to thank the experts and coordinators of the Dutch National
Cyber Security Center (The Hague), Proximus CSIRT (Brussels), and Swisscom
CSIRT (Zurich) that kindly contributed to this chapter.
Cyber Threat Intelligence Sharing through National ◾ 223
List of Abbreviations
ABE Attribute-based encryption
API Application Programming Interface
CERT Computer Emergency Response Team
CIRCL Computer Incident Response Center Luxembourg
CPNI Centre for the Protection of National Infrastructure
CSIRT Computer Security Incident Response Team
CSV Comma-separated value
CTI Cyber threat intelligence
CVE Common vulnerabilities and exposures
DDoS Distributed denial of service
FIRST Forum of Incident Response and Security Teams
HASL Handling, action, sharing, and licensing
ICT Information and communications technology
IDS Intrusion detection system
IEP Information Exchange Policy
IoC Indicator of compromise
IRC Internet Relay Chat
ISAC Information Sharing and Analysis Center
ISAO Information Sharing and Analysis Organizations
JSON JavaScript Object Notation
MISP Malware Information Sharing Platform
MO Modus operandi
NCIRC NATO Computer Incident Response Capability
NCSC National Cyber Security Center
NDN National Detection Network
NICP NATO Industry Cyber Partnership
OTX Open Threat eXchange
SIEM Security information and event management
SOC Security Operation Center
STIX Structured Threat Information eXpression
TAXII Trusted Automated eXchange of Indicator Information
TF-CSIRT Task Force-Computer Security Incident Response Teams
TLP Traffic Light Protocol
TNO Nederlandse Organisatie voor Toegepast Natuurwetenschappelijk
Onderzoek (TNO; English: Netherlands Organisation for
Applied Scientific Research)
TTP Tactics, techniques, and procedures
XML Extensible Markup Language
224 ◾ Collaborative Cyber Threat Intelligence
References
J. Bethencourt, A. Sahai, B. Waters, Ciphertext-policy attribute based encryption. In: SP’07
Proceedings of the 2007 IEEE Symposium on Security and Privacy. 2007, pp. 321–334.
European Union, Directive 2016/1148 of the European Parliament and of the Council
concerning measures for a high common level of security of network and informa-
tion systems across the Union, 2016. (Accessed June 20, 2017). Available at: http://
eur-lex.europa.eu/legal-content/EN/TXT/?uri=uriserv:OJ.L_.2016.194.01.0001.01.
ENG&toc=OJ:L:2016:194:TOC.
F. Fransen, A. Smulders, R. Kerkdijk, Cyber security information exchange to gain insight into
the effects of cyber threats and incidents. e & i Elektrotechnik und Informationstechnik,
2015, 132: 106–112.
C. Johnson, L. Badger, D. Waltermire, J. Snyder, C. Skorupka, Guide to cyber threat infor-
mation sharing. NIST special publication 800-50, 2016. (Accessed June 20, 2017).
Available at: http://dx.doi.org/10.6028/NIST.SP.800-15.
G. Settanni, F. Skopik, Y. Shovgenya, R. Fiedler, M. Carolan, D. Conroy, K. Boettinger,
M. Gall, G. Brost, C. Ponchel, M. Haustein, H. Kaufmann, K. Theuerkauf, P. Olli, A
collaborative cyber incident management system for European interconnected critical
infrastructures. Elsevier Journal of Information Security and Applications (JISA), 2017,
34, Part 2, pp. 166–182.
E. Shi, T.H. Chan, E.G. Rieffel, R. Chow, D. Song, Privacy-preserving aggregation of time-
series data. In: NDSS. The Internet Society, 2011.
T.R. van de Kamp, A. Peter, M.H. Everts, W. Jonker, Private sharing of IOCs and sight-
ings. In: WISCS ‘16. Vienna, Austria, October 24, 2016. New York: ACM, 2016, pp.
35–38.
C. Wagner, A. Dulaunoy, G. Wagener, A. Iklody, MISP: The design and implementation of
a collaborative threat intelligence sharing platform. In: Proceedings of the 2016 ACM on
Workshop on Information Sharing and Collaborative Security. New York: ACM, 2016,
pp. 49–56.
Chapter 6
Contents
6.1 Introduction............................................................................................. 226
6.2 A n Overview of National and International
Cybersecurity Strategies................................................................. 229
6.2.1 Cybersecurity Strategies of International Organizations................229
6.2.1.1 European Union..............................................................230
6.2.1.2 United Nations................................................................232
6.2.1.3 NATO.............................................................................232
6.2.2 National Cybersecurity Strategies..................................................233
6.2.2.1 Germany..........................................................................235
6.2.2.2 Switzerland......................................................................236
6.2.2.3 United Kingdom.............................................................238
6.2.2.4 United States of America.................................................239
6.3 Cybersecurity Centers and Their Responsibilities and Tasks.....................241
6.3.1 Stakeholders...................................................................................241
6.3.2 T
asks and Responsibilities..............................................................242
6.3.3 S elected Examples of CSCs............................................................243
6.3.3.1 Germany..........................................................................243
225
226 ◾ Collaborative Cyber Threat Intelligence
6.3.3.2 Switzerland......................................................................243
6.3.3.3 United Kingdom............................................................ 244
6.3.3.4 United States of America................................................ 244
6.4 Situational Awareness Models Supporting Strategic
Decision-Making Processes.......................................................................245
6.4.1 Cognitive Models on Situational Awareness..................................248
6.4.1.1 S ituational Awareness Model (1995)................................248
6.4.1.2 O ODA Loop (1976)........................................................249
6.4.2 Cyber Situational Awareness Models.............................................250
6.4.2.1 J DL Data Fusion Model (1980).......................................251
6.4.2.2 Cyber Situational Awareness Model (2009).....................252
6.4.2.3 E ffective Cyber Situational Awareness (2014)..................252
6.4.2.4 CSA Model for National Cybersecurity
Centers (2017).................................................................253
6.4.3 O verview and Analysis of Situational
Awareness Models�������������������������������������������������������������������������� 256
6.4.3.1 Focus...............................................................................256
6.4.3.2 O perators.........................................................................257
6.5 Information and Sources for Situational Awareness
at the National Level................................................................................258
6.5.1 I nformation for Cyber Common Operating Pictures.....................258
6.5.1.1 C ore Information............................................................259
6.5.1.2 Contextual Information...................................................259
6.5.2 Sources for Cyber Common Operating Pictures............................265
6.5.2.1 C lassification by Accessibility......................................... 266
6.5.2.2 C lassification by Information Modeling..........................267
6.5.2.3 Classification by Ownership........................................... 268
6.6 Conclusion................................................................................................269
List of Abbreviations..........................................................................................270
References..........................................................................................................272
6.1 Introduction
The example scenarios in Chapter 2 demonstrated that cyber incidents, such as
the power outage in the Ukraine, can have an impact on citizens. Power out-
ages themselves can have a significant impact on health and life, environment,
institutions, lifestyle, or economy as shown in (Praktiknjo et al., 2011). It is incon-
testable that a similar incident like this or a series of incidents can have an impact
on national health, public safety and security, economy or other areas that are
typically overseen or controlled by governments (and governmental authorities).
In this chapter, “government” specifies a group of people who control a country
Situational Awareness for Strategic Decision ◾ 227
As cyber incidents can have an impact on many areas of economic systems, national
governments aim at gaining and providing situation awareness (situational aware-
ness will be interchangeably used in this chapter) in cyberspace. The definition of
situational awareness is mainly based on Endsley, 1988a,b, p. 792: “… the percep-
tion of the element in the environment within a volume of time and space, the com-
prehension of their meaning, and the projection of their status in the near future.”
Following this definition, national governments require
This description also shows that governments are acting as a point of exchange
between national stakeholders (e.g., critical infrastructure) and as a link to interna-
tional organizations as shown in Figure 6.1.
This chapter will focus on how to establish cyber situational awareness for
national governments. Section 6.2 will provide an overview on how nations
and international organizations establish cybersecurity policies. Furthermore,
the implementation of cybersecurity centers at the national level is analyzed in
Section 6.3. Section 6.4 examines situational awareness models for decision mak-
ers and how they can be adapted to national cybersecurity centers. How infor-
mation and sources can contribute to common operating pictures is outlined in
Section 6.5. Section 6.6 concludes this chapter.
6.2 A
n Overview of National and International
Cybersecurity Strategies
This section describes how cybersecurity strategies (e.g., standards, policies, obliga-
tions, recommendations, or strategies) are defined by international organizations
and national governments to maintain a level of security of and operations in cyber-
space. Both perspectives provide interesting insights and results. For example in
international organizations, Member States elaborate on and cooperate to identify
cybersecurity strategies. Their findings are often the outcome of hours of work, dis-
cussion, and international cooperation. Three example countries provide an insight
into how certain countries draft and implement cybersecurity policies.
The EU aims at engaging stakeholders from public and private sectors to increase
cyber resilience. Further cybersecurity activities are supported by ENISA and the
Computer Emergency Response Team for the EU institutions (CERT-EU). The
EU is also linked to international organizations and other Nations to collaborate in
matters concerning cyberspace.
28.12.2016.
Situational Awareness for Strategic Decision ◾ 231
◾◾ Training and exercises: EDA organizes and hosts several exercises in the area
of cybersecurity and cyber defense with different target groups (e.g., from
operational experts to decision makers).
◾◾ Cyber situational awareness: EDA is working on cyber defense situational
awareness for CSDP activities and ways cyber defense can be integrated into
military planning processes.
◾◾ Cyber Defence Research Agenda (CDRA): Research aims at developing “dual
use” technologies, technologies relevant for the civil and military domain.
The CDRA develops a R&D roadmap for the next 10 years.
◾◾ Advanced persistent threats (APT) Detection: APT detection is a key topic in
various projects as targets can be EU entities or other organizations. EDA is
currently leading a project to develop solutions.
◾◾ Protection of information, cryptography: Several initiatives have been started to
work on this area within the European Framework Cooperation.
6.2.1.3 NATO
NATO adopted an enhanced policy and action plan10 for cyber defense, which was
endorsed by the Allies in September 2014. This policy establishes that cyber defense
is part of NATOs core task on collective defense, acknowledges that international law
applies in cyberspace, and ensures partnerships with industry. The action plan includes
activities for capability development, education, training, and exercises and partnerships.
In July 2016, NATO recognized cyberspace as a domain of operation NATO
must defend, as in the air, on land, or at sea. Furthermore, developing cyber defense
27.12.2016.
Situational Awareness for Strategic Decision ◾ 233
capabilities is one of the main cyber defense activities of NATO. For example, the
NATO Computer Incident Response Capability (NCIRC) aims at protecting NATOs
networks and systems by providing 24/7 cyber defense support. Further, it has the key
role in responding in cases of collective defense. In addition, cyber-defense capabilities
are defined for NATO member countries via the NATO Defence Planning Process.
Furthermore, NATO aims at increasing cyber-defense capacity by improv-
ing and advancing cyber-defense education, training, and exercises. The NATO
Cooperative Cyber Defence Centre of Excellence (CCD CoE) in Tallinn, Estonia,
hosts the research and training center for cyber-defense education, consultation,
lessons learned, research, and development. The CCD CoE hosts regular NATO
exercises such as the annual Cyber Coalition Exercise that allows re-enacting cyber-
defense scenarios on virtual environments simulating IT networks and systems.
In 2016, CCD CoE has 16 sponsoring nations (NATO Member States) as well as
2 contributing participants (Austria and Finland). The NATO Communications
and Information Systems School (NCISS) in Latina, Italy, provides training to
staff from member countries as well as non-NATO countries relating to NATO
communication and information systems. The NATO School in Oberammergau,
Germany, conducts cyber defense-related education and training to support NATO
operations, strategy, policy, doctrine, and procedures. The NATO Defense College
in Rome, Italy, fosters strategic thinking on political-military matters.
NATO cooperates with partners such as the EU, the UN, or the Organization
for Security and Co-operation in Europe (OSCE) as well as other relevant countries
to support and strengthen international security. In addition, it provides a NATO
Industry Cyber Partnership (NICP) to foster relationships to industry as well as
other entities such as CERTs.
The policy on cyber defense is implemented by multiple NATO bodies and
members. Any collective defense response, however, would be managed by the
North Atlantic Council (NAC). The NAC is the principle authority in cyber
defense crisis and incident response management. Subordinate to NAC, the Cyber
Defence Committee (CDC) is the lead committee for cyber defense policy and
governance that provides also consultation in these matters to NATO allies.
Furthermore, the NATO Cyber Defence Management Board (CDMB) is responsi-
ble for coordinating cyber defense throughout NATO civilian and military bodies
and consists of stakeholders in cybersecurity within NATO. Moreover, the NATO
Communications and Information Agency (NCIA) deals with cyber activities. The
NCIRC is incorporated into NCIA.
has been identified in national and international cybersecurity strategies within the
past 10 years (Franke and Brynielsson, 2014). In fact, the long-term protection of
IT networks and systems can be ensured only by the cooperation of governments,
industry (such as vendors, owners, and operators), and society.
Nowadays, many national countries develop their own cybersecurity strategies.
Several reports have assessed national cybersecurity strategies. For example, Luiijf
et al. (2013) compare 19 national cybersecurity strategies of Australia, Canada,
Czech Republic, Estonia, France, Germany, India, Japan, Lithuania, Luxembourg,
Romania, the Netherlands, New Zealand, South Africa, Spain, Uganda, the
United Kingdom (2009 and 2011), and the United States. The authors compare
the strategies’ commonalities and weaknesses. For example, they assess the visions,
strategic objectives, guiding principles, and stakeholders. They further propose a
structure for a national cybersecurity strategy:
1. Executive summary
2. Introduction
3. Strategic national vision on cybersecurity
4. Relationship of the national cybersecurity strategy with other strategies
(national, international, and legal frameworks)
5. Guidance principles
6. Relationship with other strategies (national, international, and legal
frameworks)
7. Cybersecurity objective(s) (between one and four)
8. Outline of the tactical action lines
9. Glossary
10. Annex (optional). Envisioned operational activities
Other examples include handbooks such as the Crisis and Risk Network (CRN)
and the International Critical Information Infrastructure Protection (CIIP) hand-
book. The CIIP handbook 2008/2009 (Brunner and Suter, 2008) focuses on
national governmental efforts to protect critical infrastructure. It summarizes
the strategies and plans for national CIIP of Australia, Austria, Brazil, Canada,
Estonia, Finland, France, Germany, Hungary, India, Italy, Japan, Republic of
Korea, Malaysia, the Netherlands, Norway, Poland, Russia, Singapore, Spain,
Sweden, Switzerland, United Kingdom, and United States.
Following are four selected examples of national cybersecurity strategies. Please
refer to the studies mentioned above to investigate further national cybersecurity
strategies. Although each nation provides its own strategy, overall similarities can be
identified. For example, governments need to protect and defend their national econ-
omy, safety, and security as well as public health with adequate measures.
6.2.2.1 G
ermany
Germany published its national cybersecurity strategy (Federal Ministry of the
Interior) in 2011. The strategy aims at ensuring cybersecurity, enforcing rights, and
protecting critical information infrastructures at a national level and in cooperation
with international partners. The strategic objectives and measures for the cyberse-
curity strategy are based on the critical infrastructure protection (CIP) implemen-
tation that focuses on 10 strategic areas:
In the following, only the fourth and fifth strategic areas will be discussed. Please
refer to Federal Ministry of the Interior (2011) for more details. The fourth strategic
area “National Cyber Response Center” (NCRC) aims at establishing a national
cybersecurity center (NCSC) for enhanced cooperation and coordination among
all state authorities in case of cyber incidents. In particular, it will enable informa-
tion sharing of vulnerabilities in devices or products, attacks, and Threat Actors
and analyze and recommend mitigation measures. In addition, stakeholders will
incorporate adequate measures to contribute to cybersecurity. The NCRC will pro-
vide recommendations to the National Cyber Security Council for early warnings
and prevention on a regular or incident-specific basis.
236 ◾ Collaborative Cyber Threat Intelligence
The fifth strategic area is about setting up a national cybersecurity council that
includes representatives of governmental and federal authorities as well as associate
members from business and academia. It aims to coordinate interdisciplinary and
preventive cybersecurity measures between the private and public sectors.
6.2.2.2 Switzerland
In 2012, Switzerland defined a cybersecurity strategy in Eidgenössisches depart-
ment für Verteidigung, Bevölkerungsschutz and Sport VBS (2012) for the protec-
tion of information and communication infrastructures against cyber threats. It
aims for the following three long-term goals, based on Eidgenössisches department
für Verteidigung, Bevölkerungsschutz and Sport VBS (2012, p. 3):
In this context, seven spheres of actions and measures were proposed (see Table 6.1).
6.2.2.3 United Kingdom
The cybersecurity strategy of the United Kingdom has been developed in HM
Government (2010, 2016). This section will further discuss only the latter as
it provides a strategy through 2021. In the 2016 cybersecurity strategy, five
potential Threat Actors are identified: First, cyber criminals are criminals that
commit cyber-dependent crimes (such as stealing, destroying, or damaging
data) or cyber-enabled crimes (such as CEO fraud tactics or data theft). Second,
states and state-sponsored threats are typically larger groups of people that aim
to penetrate or infiltrate networks and services. These groups often have large
sets of cyber capabilities and therefore can launch more sophisticated attacks.
Third, terrorists are groups of people that aim to conspire to damage and poten-
tially harm national interests. Depending on the level of expert knowledge,
terrorists can use cyber-related activities to attract media and society. Fourth,
hacktivists are people that are decentralized and focus on specific issues. They
select potential targets based on a set of criteria related to the issue. They often
aim at disrupting business processes or value chains (e.g., DDoS attacks) or
attract media attention (e.g., website defacements). Last, script kiddies are typi-
cally individuals that use scripts and programs developed by others to perform
cyber attacks.
Also, several vulnerabilities are identified, such as an expanding range of
devices, poor cyber hygiene and compliance, insufficient training and skills, legacy
and unpatched systems, and availability of hacking resources.
In the cybersecurity strategy in HM Government (2016), three categories are
defined to tackle the challenges that lie ahead in cybersecurity. DEFEND aims at
defending systems, enabling incident response planning and management proce-
dures, and ensuring that systems are protected and resilient. DETER centers on
the detection and understanding of cyber incidents and not only how they can be
persecuted legally, but also how one can take offensive actions. DEVELOP is about
fostering and growing innovation and research to enable cybersecurity capabilities
for individuals as well as organizations and industry.
Situational Awareness for Strategic Decision ◾ 239
The international strategy for cyberspace in the White House (2011) analyzes
and defines the basic principles for using cyberspace, thereby relying on open
and interoperable, secure and reliable, and stable (through standardization)
technologies. Furthermore, it addresses how diplomacy, defense, and devel-
opment can be handled in cyberspace in the future, and policy priorities are
240 ◾ Collaborative Cyber Threat Intelligence
Furthermore, the DoD specifies five strategic goals and implementation measures
in DoD (2015):
6.3 C
ybersecurity Centers and Their
Responsibilities and Tasks
While the section above discussed national and international strategies, one of the
common themes is to establish (national) cybersecurity centers (CSCs or NCSCs)
to increase cyber resilience of nations as well as the coordination and provision
of information sharing systems between national stakeholders and governments
and other related activities. CSCs are often called situation centers or IT incident
response and management centers depending on the nation or intended functional-
ity. This section will use the term CSCs and further elaborate on their stakeholders,
tasks, and responsibilities. Selected examples are given at the end of the section.
6.3.1 Stakeholders
CSCs aim to coordinate (cybersecurity) activities with different stakeholders—from
vendors and critical infrastructure providers to political parties and organizations.
CSCs can enable and provide measures to ensure the information exchange of cyber
threat information between stakeholders. Doing that, CSCs aim to collect and
interpret this information in order to detect potential threats and attacks and pro-
vide countermeasures. Figure 6.2 displays how CSCs interact with decision makers
and other stakeholders from various domains (such as energy, oil and gas, or ICT).
CSCs interact for example with decision makers that require a certain Cyber
Common Operating Picture (cf. Section 6.5.1) to make decisions. Further
Reporting interface
Data sharing/distribution of information
commucation technology
Transportation systems
Critical infrastructures
Governmental facilities
Military installations
Agricilture and food
Banking and finance
Oil and gas supplies
Emergency services
Information and
Water supplies
Energy
12 ENISA, https://www.enisa.europa.eu/activities/cert/support/guide/appendix/csirt-services;
Last visited on 04.02.2016.
Situational Awareness for Strategic Decision ◾ 243
6.3.3 S
elected Examples of CSCs
This section provides an overview of selected examples of CSCs based on publicly avail-
able information. Note that there is limited information on CSCs available (to protect
national security measures). Hence, it can be assumed that there is far more (confiden-
tial) information available concerning the competencies and progress of the centers.
6.3.3.1 Germany
Germany has established several centers relating to cybersecurity that are coordinated
by the Federal Office for Information Security (abbreviated BSI, Bundesamt für
Sicherheit und Informationstechnik). In the following, the three centers are outlined:
◾◾ BSI IT-Lage und Analysezentrum13 (IT Situation and Analysis Center) was
established based on the national cybersecurity strategy (see Section 6.2.2.1).
The center is the primary 24/7 contact for public authorities, critical infra-
structure providers, and partners. On a daily basis, open sources on the
Internet are skimmed in order to determine the current state of the Internet
and to identify potential threats and vulnerabilities that are summarized in
regular reports.
◾◾ BSI IT-Krisenreaktionszentrum14 (IT Crisis and Response Center) aims pri-
marily at providing fast response to and countermeasures against major
incidents in order to minimize damages and impact. In the center, cyber
incidents are analyzed, rated, and forwarded to relevant offices.
◾◾ Nationales Cyber-Abwehrzentrum15 (National Cyber Defense Center) has the
objective to optimize the operational cooperation among all relevant offices
and public authorities and to coordinate protection and defense measures for
cyber incidents.
6.3.3.2 Switzerland
Die Melde- und Analysestelle Informationssicherung (MELANI)16 (Reporting and
Analysis Centre for Information Assurance) is a center where partners collaborate
IT-Netzpolitik/IT-Cybersicherheit/Cybersicherheitsstrategie/Cyberabwehrzentrum/cyber-
abwehrzentrum_node.html (in German); Last visited on 15.12.2015.
16 MELANI, https://www.melani.admin.ch/melani/de/home.html (in German); Last visited on
15.12.2015.
244 ◾ Collaborative Cyber Threat Intelligence
from areas of computer systems security, Internet security, and the protection of
critical infrastructure. In particular, the center’s tasks align with the four pillars of
the information assurance system are as follows: (1) prevention, (2) early detection,
(3) minimizing the impact of cyber attacks and crisis, and (4) alleviating the causes
of crisis. Please refer to Informatikstrategieorgan Bund ISB (2002) and Cavelty
(2014) for more details on the pillars.
The tasks of MELANI are, based on Rytz and Römer (2003):
◾◾ Reporting office for technical events (e.g., incidents) in Switzerland that affect
networks and computer systems. Such tasks are typically handled by CERTs
(i.e., it requires the operation of a national CERT).
◾◾ Reporting office for the impact of business disruptions in information and com-
munication technologies. Examples include traffic systems, mobile networks,
or other ICT-related infrastructure.
◾◾ Cybersecurity center. The incoming incident reports and the activities of the
CERT will be brought together to establish situational awareness.
◾◾ Notification of public authorities and relevant offices such as SONIA, a special
task force on information assurance.
◾◾ Communication and distribution of information has to be performed depend-
ing on the target audience (SONIA, public authorities, industry, citizens).
◾◾ Prevention: Lessons learned and best practices are documented and added as
recommendations or strategies that can be used for industry, public authori-
ties, or citizens.
MELANI generates reports every half year in order to assess the current situation
of information assurance in Switzerland and internationally.
6.3.3.3 United Kingdom
As part of Government Communications Headquarters (GCHQ), a British intel-
ligence and security organization, the National Cyber Security Center (NCSC) is
United Kingdom’s authority on cybersecurity. Starting in October 2016, it brings
together the Information Security arm of GCHQ—the Center for the Protection
of National Infrastructure, CERT-UK, and the Center for Cyber Assessment.
According to HM Government (2016), the NCSC handles national cyber inci-
dents, provides an authoritative voice and center of expertise on cybersecurity, and
delivers mitigation strategies and advice to government and industry. It will be a
center for incident management and detection, analysis and evaluation of threats,
and the addressing of systemic vulnerabilities.
environment. The concept had its origins in the military domain. For example, pilots
have to be aware of their current situations, assess and evaluate ongoing events, and
predict future developments. In their ongoing situation assessments, they have to
include and value different parameters (e.g., their location, flight direction, mission
plan, and fuel consumption) and entities (e.g., opponents or civilians). In this context,
several definitions were specified and are summarized in Table 6.3.
1988 “Where, what, when, and who. Where refers to spatial Harwood
awareness, what characterizes identity awareness, et al. (1988)
who is associated with responsibility or automation
awareness, and when signifies temporal awareness.”
(Continued)
Situational Awareness for Strategic Decision ◾ 247
1998 “SA is ‘the pilot’s internal model of the world around Endsley (1998)
him at any point in time.’ It is derived from the
aircraft instrumentation, the out-the-window view,
and his or her senses. Individual capabilities,
training, experience, objectives, and the ability to
respond to task workload moderate the quality of
the operator’s SA.”
Of all of these definitions above, only that of Endsley (1995) has been widely
adopted in literature and research (see Section 6.4.1.1). In particular, research and
development have adopted the notion of cyber situational awareness (CSA), i.e.,
how to be aware of the current situation in cyberspace. Furthermore, being aware of
the cyber domain (such as the ongoing situation in computer networks and services)
is a challenging and complex task. Methods, tools, and algorithms will be developed
248 ◾ Collaborative Cyber Threat Intelligence
to understand and evaluate the current situation within the systems, for example,
to understand current network traffic or sensor interaction in a system of systems.
In the following, cognitive as well as technical models for situational awareness
are assessed. Both classes of models can be relevant for today’s situational aware-
ness depending on the application scenario. While cognitive models try to assess
and model the cognitive processing of situation assessments, technical models try
to realize the cognitive models with technological means; i.e., they try to enrich or
enhance the cognitive processes of the operators (e.g., the pilots) with technology.
• System capabillity
• Interface design
• Stress and workload
• Complexity
• Automation
Task/system factors
State of the Feedback
environment
Situation awareness
Performance
Perception Comprehension Projection Decision of actions
level 1 level 2 level 3
Individual factors
Information processing
• Goals and objectives mechanism
• Preconceptions
(expectations) Long term
Automaticity
memory stores
• Abilities
• Experience
• Training
Observation
Action Orientation
Decision
Figure 6.4 displays the four major stages of the OODA Loop (see Brehmer, 2005):
The SAM and the OODA Loop describe the cognitive processes of decision mak-
ing in complex environments. These models are often used as the basis for SA gain-
ing and application (e.g., decision making) in literature.
Process improvement
Sensor management
Templates,
signatures
The result of these data processing levels serves as a basis for gaining accurate and
present SA such as in CSCs. Inaccurately designed data processing steps could lead
to incorrect situational awareness and possibly to wrong decisions.
All of these functions are essential in CSCs to foresee emerging threats and be able
to prevent future attacks.
Network
awareness
Effective
Operational cyber Threat
awareness situational awareness
awareness
Predicition
and data
fusion
ECSA aims at providing better intelligence about the status of the network than
regular CSA.
The ECSA is CSA that improves decision making, collaboration, and resource
management (Evancich et al., 2014). Moving from CSA to ECSA requires that the
CSA created by the system allow the analysts to acquire knowledge about the status
of the network. Therefore, the ECSA model provides actionable intelligence on the
current situation within a network.
Figure 6.8 proposes a preventive CSA model for National Cyber Security Centers
(CSA NCSC) that addresses several requirements:
◾◾ CSA for NCSCs is a versatile, dynamic, and complex process that should
consider different stakeholders (national and international). The CSA model
should have a collaborative approach based on data correlation and informa-
tion sharing by providing suitable interfaces, i.e., Reporting Interface.
◾◾ The complete CSA model should focus on prevention, i.e., implementing an
early-warning system that can prevent and detect national incidents.
◾◾ The CSA model should be flexible and open to future threats and Threat Actors.
◾◾ The CSA model should provide capabilities for cognitive and technical SA
Gaining and Application.
Figure 6.8 shows the general SA gaining and application processes in NCSCs based
on Pahi et al. (2017). The model contains CSA in three different levels with differ-
ent information sources: organizations, the National Cyber Security Center, and the
level of the decision makers. The gained CSA at the organization level serves as a
basis for creating an accurate and holistic picture of the status of critical infrastruc-
tures in the national scope (see the SA Gaining Information Flow in Figure 6.8).
The participating organizations and their reporting activity through the Reporting
Interface are important information sources for the SA gaining processes, such as
Perception, Comprehension, and Projection, in the NCSC. CSA is applied at every
level; it is presented in the figure only on the decision makers level because of
the high relevance for national (cyber) security. The organizations and the NCSC
make decisions and perform actions on a daily basis. Actions relevant for national
security are for instance the reporting of noticed cyber incidents and the measures
undertaken to protect their own systems. The SA information flow, the decisions,
Decisions
Technical
Situation pictures
infrastructure
SA of the decision
makers
SA of the
SA of the NCSC
C
organizations
Legend
External source
SA gaining information flow
SA application flow
and the actions of the decision makers have an influence on the other levels (see SA
Application Information Flow in the figure). A decision from the political level could
have serious consequences in a large-scale espionage campaign, such as releasing
documents containing sensitive information (for instance the analysis of the espio-
nage at RUAG, see GovCERT.ch, 2016). One piece of legislation could entirely
shape the cyber capability of the state, such as introducing mandatory reporting of
cyber incidents, for instance, in the United States or Estonia.
Figure 6.8 displays the stakeholders and entities that are involved in the SA gain-
ing and application processes in the NCSCs. As the government and the NCSC
play an essential role in establishing and maintaining cybersecurity at the national
level, the model must include the private sector, especially the providers of the critical
infrastructures (CI). The governments and the private sectors need to establish formal
partnerships, because the technical information from the CI domains serve as pri-
mary information source for the NCSCs. These centers are often formed as CERTs
or CSIRTs. The stakeholders are the following in our simplified model: high-level
decision makers, the NCSC, and participating public and private organizations. The
decision makers include the government and other relevant private or public stake-
holders. The NCSC focuses on collecting, interpreting, and evaluating cybersecurity
relevant information at the national level. This is required for translating the cyber
incidents within the CI domains into strategic and tactical actions at the national
level. A NCSC can consist of National Incident Response Teams (NIRTs), i.e., the
expert team of the NCSC. The NCSC supports decision making by creating various
situation pictures and gaining SA at their level. SA is current and predictive knowl-
edge of the environment, as well as all factors, activities, and events (Conti et al.,
2013). Therefore, CSA includes the holistic and current knowledge about the CI at
the national level. The situational pictures, also known as common operating pictures
(COPs), support the stakeholders and decision makers to have an appropriate CSA
about the current situation. The main tasks of these centers are information gathering
from the CI domains and external sources (see external sources in Figure 6.8, such
as national CERTs and open source information, information processing, and shar-
ing among the participating organizations about cyber incidents. The experts of the
NCSCs generate situation pictures with various focal points. These situation pictures
establish the decision maker’s CSA about the status of the national CI.
The organizations include all participating public or private CI (or CII) service
providers (see Section 6.3.1). The key approach to CI protection is the identification
and modeling of the relevant activities, resources, and services in each organization.
These activities form the basis for the analysis and assessment to determine current
impacts of assets and missions and to derive plausible future trends and their future
impacts or effects on assets and missions (Tadda and Salerno, 2010).
The CSA model for NCSCs includes proactive cyber capabilities in order to
prevent cyber attacks through information sharing and multilevel monitoring
related to cyber attacks. This modern CSA model helps to close the gap between
the capabilities of the public and private sector related to cybersecurity.
256 ◾ Collaborative Cyber Threat Intelligence
6.4.3.1 Focus
To define the focus and the scope of each relevant model for gaining and applying
SA, the models are compared to the components of the most cited SA model (see
the description of the model in Section 6.4.1.1). Establishing SA is a major, complex
task. Therefore, two main processes, SA gaining and SA application, are required.
Figure 6.9 illustrates the phases of SA gaining (Perception, Comprehension, and
Projection) and SA application (Decisions, Performance of actions, Feedback).
SA gaining SA application
The SA gaining phase contains the three levels based on the SAM: Perception,
Comprehension, and Projection. Based on the early models, SA is useful present
knowledge about, and understanding of, the environment. This process is covered
in all models. See the Perception and Comprehension Level in the SA model or
the Observe and Orient Stage in the OODA Loop. In the remaining models are
sensors and algorithms responsible for the perception and comprehension of the
environment. The component projection is essential in models, because SA is typi-
cally forecasting, projecting what is plausible to happen in order to inform effective
decision processes (Kaber and Endsley, 2004).
SA application contains the Decision, Performance of actions, and Feedback
phases. Figure 6.9 identifies the models that incorporate and respond to decision
making by providing a performance of actions, i.e., the SAM, OODA, ECSA, and
CSA NCSC. The OODA Loop describes the steps for decision making in detail,
while the ECSA provides technical features for decision making by predicting pos-
sible scenarios. The models provide assistance by creating SA or additionally by
providing options for action for the decision maker. Ideally, the SA gaining process
contains a feedback cycle between the environment and the decision maker. For
example, the Feedback component by the SAM is complemented with a process
refinement function. The operator can have for instance the possibility of verifying
or modifying the SA gaining processes or even their results. The feedback loops
could vary enormously depending on the application area. Therefore, this compo-
nent is not a focus in most of the models.
6.4.3.2 Operators
The operator aspect analyzes how SA is established by humans or machines (e.g.,
programs) in the SA models. The early definitions and models, such as the SAM
and the OODA Loop, include the human aspect in crisis situations. They describe
SA as cognitive knowledge that can be enriched by experience. In the 1980s and
1990s, the operator was mainly a human, e.g., a pilot or a soldier. Then, technical
sensors and data complemented human perception; see, for instance the JDL Data
Fusion Model. This approach defines the need for human and machine informa-
tion processes in SA gaining and application. Each presented CSA model tries to
reproduce and improve the cognitive SA gaining processes with the integration
of technical solutions. The CSAM proposed to be an automated data processing
system to sense the environment. Other models, such as the ECSA Model and the
CSA for NCSCs, have different approaches. They integrate the human operator in
the SA creating processes with a verifier and improver role, while the SA gaining
processes are totally automated. All these approaches need to be integrated into the
CSA model to combine the advantages of the different models in order to enhance
the cyber defense capability at the national level.
These results indicate that appropriate awareness could be developed with both
the cognitive data comprehension capability and technical solutions, such as data
258 ◾ Collaborative Cyber Threat Intelligence
Core
information Tactics,
techniques and Exploit Courses of
Observables Indicators Incidents Threat Actors Campaigns
procedures (TTPs) Targets Actions
Contextual
information Critical Organizational Domain and Current state Public incident
infrastructure assets and Dependencies industry and political Incident reports documentation
providers information knowledge environment and technical
reports
This classification is not exhaustive and may be extended or adapted for the intended
purpose. It can be used as a starting point to add, extend, or remove information for
CCOPs. In the following, both categories are described.
(Continued)
262 ◾ Collaborative Cyber Threat Intelligence
critical infrastructure providers, to information about what services they have and
what impact a shutdown would have. It can be assumed that the exchange with
relevant organizations and the organizations themselves are essential information
sources for contextual information for CCOPs. Provided information can be static
or dynamic and has to be updated (if possible) regularly. In the following list, the
contextual information for CCOPs is summarized; this list is not exhaustive or
sorted; it can be adapted to the CCOP’s needs and requirements.
In the case of ENISA, only assets that are in the scope of ICT that provide (elec-
tronic) communication networks and services are analyzed. Three ways to classify
assets are suggested in Dekker and Karsberg (2015):
◾◾ Asset type: An asset type describes a class of assets. Examples of classes include
subscriber equipment, switches and routers, mobile user and location registers,
mobile base stations and controllers, power supplies, and cooling systems.
◾◾ Asset group: Asset groups can be used to describe which role and functional-
ity the assets have within the provider’s networks. For example, assets can be
classified by their location within a provider’s network.
◾◾ Asset component: Asset components classify assets by their type of compos-
ing parts. For example, assets can be categorized into a software layer (i.e.,
software assets), hardware layer (i.e., hardware assets), or supplies layer (i.e.,
supplies such as power supply).
264 ◾ Collaborative Cyber Threat Intelligence
6.5.1.2.3 Dependencies
Information about dependencies between organizations and domains of CI can
be relevant for CCOPs. However, this task is very complex and challenging and
requires for example a fundamental understanding and knowledge of the national
economy. Intra-organizational and inter-organizational research is still working
to define and evaluate models that can cope with this complexity and structural
dynamics (Fombrun, 1986).
company is examined and evaluated. The processes and measures used within the
case can be useful to similar organizations or managers (e.g., CISOs) to handle sim-
ilar APT cases. In addition, white papers and technical reports can be used to assess
current trends in cybersecurity and other related topics such as damage control.
Sources
By accessibility By information By ownership
modeling
Non-public International
sources Mailings Incident reports organizations
Private
Search engines organizations
Individuals
Unknown or
anonymous
owners
6.5.2.2.1 Databases
Databases are a collection of structured data. Databases typically contain tables,
queries, schemas, reports, and views that can be searched and retrieved. Cyber
threat information can be collected in databases. Currently, there are two groups of
databases that can be found on the Internet:
6.5.2.2.2 Mailings
Mailings are sent from one sender to one or more receivers and share messages.
◾◾ Mailing lists can contain public as well as confidential information. They are
often used to quickly distribute information of threats (such as vulnerabili-
ties, phishing, or scamming cases) before they are actually registered in one of
the previously named databases. Typical mailing lists are for example CERT
mailing lists or phishing mailing lists (e.g., http://www.antiphishing.org/, a
mailing list to discuss phishing and cybercrime issues).
268 ◾ Collaborative Cyber Threat Intelligence
6.5.2.2.4 Sensors
Sensors may collect data that can be used to analyze and detect changes in their
environment. For example, sensors in ICT networks such as SCADA can be used
to monitor and control the production processes and support operators with infor-
mation on latency or other meta-information for a healthy network. In addition,
sensors can be used to gather information for CCOPs in CSCs. For example, the
use of sensors in critical infrastructures can be used to directly provide live feeds of
information (e.g., the power distribution, Internet connections).
6.6 Conclusion
CSA is about assessing and understanding a dynamic situation in cyberspace with
technical means such as methods and tools. National governments face many chal-
lenges when establishing CSA at the national level. Governments typically estab-
lish cybersecurity policies and aim at achieving a close collaboration with different
stakeholders (e.g., critical infrastructure, national CSIRTs/CERTs, or international
partners) to maintain and ensure a certain level of security and running operations.
In addition, they often initiate NCSCs to handle critical incidents with a high
impact on the economic system. This is important for maintaining a stable national
security, health, or economy.
This chapter analyzed how national governments and decision makers can
establish CSA at the national level and which tools and practices they commonly
share. Therefore, cybersecurity strategies of national governments and international
organizations were examined in Section 6.2. While cyber policies in international
organizations often focus on information sharing and exchange of related threat
information, national governments focus on establishing cybersecurity centers and
units, processes, and structures that manage and facilitate an information exchange
at the national level.
Furthermore, national cybersecurity centers and their typical responsibilities
were described in Section 6.3. These centers often incorporate or closely work with
national CSIRTs or CERTs and focus on the close collaboration to facilitate inci-
dent information exchange (that has a high impact on society, national security,
health, or the economy, for example) between national stakeholders.
270 ◾ Collaborative Cyber Threat Intelligence
List of Abbreviations
APT Advanced persistent threats
BSA Business Software Alliance
BSI (German) Bundesamt für Sicherheit und Informationstechnik
CCD CoE Cooperative Cyber Defence Centre of Excellence
CCOP Cyber common operating picture
CDC Cyber Defence Committee
CDMB Cyber Defence Management Board
CDRA Cyber Defence Research Agenda
CEO Chief executive officer
Situational Awareness for Strategic Decision ◾ 271
References
Barnum, S. 2014. Standardizing cyber threat intelligence information with the Structured
Threat Information eXpression (STIX). Version 1.1, Revision 1. http://www.standard-
scoordination.org/sites/default/files/docs/STIX_Whitepaper_v1.1.pdf.
Billings, C. E. 1995. Situation awareness measurement and analysis: A commentary. In Proceedings
of the International Conference on Experimental Analysis and Measurement of Situation
Awareness (Vol. 1). Daytona Beach, FL: Embry-Riddle Aeronautical University Press.
Boyd, J. R. 1995. The Essence of Winning and Losing. Unpublished lecture notes. June 28,
1995, http://danford.net/boyd/essence.htm.
Brehmer, B. 2005. The dynamic OODA loop: Amalgamating Boyd’s OODA loop and the cyber-
netic approach to command and control. In Proceedings of the 10th International Command
and Control Research Technology Symposium, McLean, VA, June 13–16, 2005, 365–368.
Brunner, E. M. and Manuel, S. 2008. International CIIP Handbook 2008/2009. Zurich:
Center for Security Studies, ETH Zurich. http://www.css.ethz.ch/content/dam/ethz/
special-interest/gess/cis/center-for-securities-studies/pdfs/CIIP-HB-08-09.pdf.
BSA. 2015. EU Cybersecurity dashboard. http://cybersecurity.bsa.org/assets/PDFs/
study_eucybersecurity_en.pdf.
Carroll, L. A. 1992. Desperately seeking SA. TAC Attack (TAC SP 127-1), 32(3), 5–6.
Cavelty, M. D. 2014. Reporting and analysis center for information assurance (MELANI)
(phase 2: 2004–2010). Cybersecurity in Switzerland, Myriam Dunn Cavelty (ed.)
39–55. SpringerBriefs in Cybersecurity. Springer International Publishing, Cham,
Switzerland. doi:10.1007/978-3-319-10620-5_4.
Conti, G., Nelson, J., and Raymond, D. 2013. Towards a cyber common operating picture.
In 2013 5th International Conference on Cyber Conflict (CyCon), 1–17. IEEE, Tallinn,
Estonia, May 26–29, 2015.
Council of the European Union. 2014. EU Cyber Defence Policy Framework. 15585/14.
Brussels. www.europarl.europa.eu/meetdocs/2014_2019/documents/sede/dv/sede160315
eucyberdefencepolicyframework_/sede160315eucyberdefencepolicyframework_en.pdf.
Dekker, M. and Christoffer, K. 2015. Guideline on threats and assets—Technical guidance
on threats and assets in article 13a. V1.1, March 2015. ENISA. https://resilience.enisa.
europa.eu/article-13/guideline_on_threats_and_assets/Guideline_on_Threats_and_
Assets_v_1_1.pdf.
Situational Awareness for Strategic Decision ◾ 273
Department of Defense. 2015. The DoD Cyber Strategy. Washington, DC: Department
of Defense. https://www.defense.gov/Portals/1/features/2015/0415_cyber-strategy/
Final_2015_DoD_CYBER_STRATEGY_for_web.pdf.
Eidgenössisches Departement für Verteidigung, Bevölkerungsschutz and Sport VBS. 2012.
National Strategy for Switzerland’s Protection against Cyber Risks. Schweizerische
Eidgenossenschaft. https://www.melani.admin.ch/dam/melani/en/dokumente/2013/
05/nationale_strategiezumschutzderschweizvorcyber-risiken.pdf.download.pdf/
national_strategyforswitzerlandsprotectionagainstcyberrisks.pdf.
Endsley, M. R. 1988a. Design and evaluation for situation awareness enhancement.
Proceedings of the Human Factors and Ergonomics Society Annual Meeting 32(2): 97–101.
doi:10.1177/154193128803200221.
Endsley, M. R. 1988b. Situation awareness global assessment technique (SAGAT). In
Aerospace and Electronics Conference, 1988. NAECON 1988, Proceedings of the IEEE
1988 National (pp. 789–795). IEEE, Dayton, OH, May 23–27, 1988.
Endsley, M. R. 1995. Toward a theory of situation awareness in dynamic systems. Human
Factors: The Journal of the Human Factors and Ergonomics Society 37(1): 32–64.
ENISA. 2014. An Evaluation Framework for National Cyber Security Strategies. Heraklion,
Greece: European Union Agency for Network and Information Security. https://www.
enisa.europa.eu/publications/an-evaluation-framework-for-cyber-security-strategies.
European Commission. 2015. The European Agenda on Security. Communication from the
Commission to the European Parliament, the Council, the European Economic and Social
Committee and the Committee of the Regions, COM(2015) 185 Final. Strasbourg:
European Commission. https://ec.europa.eu/home-affairs/sites/homeaffairs/files/e-library/
documents/basic-documents/docs/eu_agenda_on_security_en.pdf.
European Commission and High Representative of the European Union for Foreign Affairs
and Security Policy. 2013. Cybersecurity Strategy of the European Union: An Open, Safe
and Secure Cyberspace. Joint Communication to the European Parliament, the Council, the
European Economic and Social Committee and the Committee of the Regions JOIN(2013)
1 Final. Brussels: European Commission. http://ec.europa.eu/newsroom/dae/docu-
ment.cfm?doc_id=1667.
European Union. 2016. Directive (EU) 2016/1148 of the European Parliament and of the
Council of 6 July 2016 concerning measures for a high common level of security of
network and information systems across the Union, OJ L 194. http://data.europa.eu/
eli/dir/2016/1148/oj.
Evancich, N., Zhuo L., Jason L., Yi C., Joshua T., and Peng X. 2014. Network-wide aware-
ness. In Cyber Defense and Situational Awareness, edited by Kott, A., Wang, C., and
Erbacher, R. F. 63–91. Advances in Information Security 62. Springer International
Publishing, Cham, Switzerland. doi:10.1007/978-3-319-11391-3_5.
Federal Department of Finance FDF, Federal IT Steering Unit FITSU, and MELANI. 2015.
NCS Factsheet 2014. The national strategy for the protection of Switzerland against
cyber risks (NCS). MELANI. https://www.isb.admin.ch/dam/isb/en/dokumente/themen/
NCS/Factsheet%20NCS%202014.pdf.download.pdf/Factsheet_NCS-2014-ENGL.pdf.
Federal Ministry of the Interior. 2011. Cyber Security Strategy for Germany. Berlin:
Federal Ministry of the Interior. https://www.bsi.bund.de/SharedDocs/Downloads/
EN/BSI/Publications/CyberSecurity/Cyber_Security_Strategy_for_Germany.
pdf?__blob=publicationFile.
Fombrun, C. J. 1986. Structural dynamics within and between organizations. Administrative
Science Quarterly 31(3): 403–421. doi:10.2307/2392830.
274 ◾ Collaborative Cyber Threat Intelligence
Pahi, T., Leitner, M., and Skopik, F. 2017. Analysis and assessment of situational aware-
ness models for national cyber security centers. In Proceedings of the 3rd International
Conference on Information Systems Security and Privacy (ICISSP). SCITEPRESS, Porto,
Portugal, February 19–21, 2017.
Praktiknjo, A. J., Hähnel, A., and Erdmann, G. 2011. Assessing energy supply security:
Outage costs in private households. Energy Policy, Clean Cooking Fuels and Technologies
in Developing Economies, 39(12): 7825–7833. doi:10.1016/j.enpol.2011.09.028.
Raulerson, E. L. 2013. Modeling cyber situational awareness through data fusion (No. AFIT-
ENG-13-M-41). AIR FORCE INST OF TECH WRIGHT-PATTERSON AFB OH
GRADUATE SCHOOL OF ENGINEERING AND MANAGEMENT. March
2013, Masters Thesis, http://www.dtic.mil/docs/citations/ADA576193, last accessed
on 31-07-2017.
Rytz, R. and Römer, J. 2003. MELANI-Ein Lagezentrum Zum Schutz Kritischer
Infrastrukturen Im Informationszeitalter. In GI Jahrestagung (Schwerpunkt Sicherheit-
Schutz Und Zuverlässigkeit), 57–65.
Smith, K. and Hancock, P. A. 1995. The risk space representation of commercial airspace. In
Proceedings of the 8th International Symposium on Aviation Psychology, Columbus, OH,
April 24–27, 1995.
Skopik, F., Bleier, T., and Fiedler, R. 2012. Information management and sharing for national
cyber situational awareness. In ISSE 2012 Securing Electronic Business Processes, edited
by Reimer, H., Pohlmann, N., and Schneider, W. 217–227. Wiesbaden: Springer
Fachmedien Wiesbaden. doi:10.1007/978-3-658-00333-3_21.
Skopik, F., Leitner, M., and Pahi, T. 2016. CISA: Establishing national cyber situational
awareness to counter new threats. ERCIM News, Special Theme: Cyber Security, no.
106: 52–53.
Steinberg, A. N., Bowman, C. L., and White, F. E. 1998. Revisions to the JDL model. In
Joint NATO/IRIS Conference Proceedings, Quebec, Canada, October.
Tadda, G. P. and Salerno, J. S. 2010. Overview of cyber situation awareness. In Cyber Situational
Awareness, edited by Jajodia, S., Liu, P., Swarup, V., and Wang, C. 15–35. Advances
in Information Security 46. Springer, New York. doi:10.1007/978-1-4419-0140-8_2.
National Cybersecurity and Communications Integration Center (NCCIC). 2013. Resources
and Capabilities Guide. Department of Homeland Security. https://info.publicintel-
ligence.net/NCCIC-CapabilitiesGuide.pdf.
White House. 2009. Cyberspace policy review. https://www.whitehouse.gov/assets/docu-
ments/Cyberspace_Policy_Review_final.pdf.
White House. 2011. International strategy for cyberspace. https://www.whitehouse.gov/
sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf.
White House. 2013. Improving critical infrastructure cybersecurity. Executive Order.
https://www.whitehouse.gov/the-press-office/2013/02/12/executive-order-improving-
critical-infrastructure-cybersecurity.
United Nations. 2015. Implementing WSIS outcomes: A ten-year review. UNCTAD/DTL/
STICT/2015/3. United Nations Conference onTrade and Development. Geneva, Switzerland,
April 2015. http://unctad.org/en/PublicationsLibrary/dtlstict2015d3_en.pdf.
Wickens, C. D. 1992. Workload and situation awareness: An analogy of history and implica-
tions. Insight: The Visual Performance Technical Group Newsletter 14(4), 1–3.
White, F. E. 1988. A model for data fusion. In Proceedings of the First National Symposium on
Sensor Fusion, Orlando, FL, April 5–8, 1988.
Chapter 7
Legal Implications of
Information Sharing
Jessica Schroers and Damian Clifford
Katholieke Universiteit Leuven
Contents
7.1 Introduction..............................................................................................278
7.2 Mapping the EU Cybersecurity Legal Framework....................................279
7.2.1 Plotting the Moves toward a More Coordinated EU
Cybersecurity Strategy����������������������������������������������������������������� 280
7.2.2 Scoping the Applicable Framework................................................281
7.3 Information Sharing: Breaches, Threats, and Best Practices..................... 286
7.3.1 Breach Notification Obligations and Damage
Limitations................................................................................... 286
7.3.2 P roactive Information Sharing.......................................................291
7.4 Legal Certainty, Information Sharing, and Potential Legal Barriers
to Data Transfer........................................................................................294
7.4.1 R ecognizing National Security and Private Economic
Interests.........................................................................................295
7.4.1.1 I ntellectual Property, Trade Secrets, and
Confidentiality................................................................295
7.4.1.2 C lassified Information and the Public–Private
Overlap............................................................................297
7.4.2 Individual Rights, Data Protection and Fair Balancing
Protections������������������������������������������������������������������������������������299
277
278 ◾ Collaborative Cyber Threat Intelligence
7.1 Introduction
The sharing of information can help the operators of critical infrastructures increase
security and identify threats and attacks more effectively. Shared information helps
governments to gain an overview of risks at a national level and evaluate potential
threat scenarios. Such insights are therefore necessary for developing and adjust-
ing strategies, policies, legislation, and the allocation of resources (ENISA, 2016a,
p. 33). Information can be shared between entities. For instance, critical infrastruc-
ture (CI) operators can share information with each other or indeed with national
competent authorities [computer emergency response teams/computer security
incident response teams (CERTs/CSIRTs), law enforcement, etc.]. Such informa-
tion can also be exchanged between similar authorities in other Member States,
with the EU Commission, and with international organizations such as Interpol.
As has been explained in previous chapters, there has been significant tech-
nological development to improve information sharing. Nevertheless, numerous
legal issues and regulatory constraints must be considered when setting up infor-
mation sharing structures at both the national and international levels. Countries
take very different approaches regarding critical information infrastructure protec-
tion, which often result in different legislative outcomes.1 Accordingly, the national
approaches and the applicable legislation can vary extensively. It is not feasible to
provide an examination of all applicable legislation, as this depends on the country,
1 A 2016 ENISA study identified three different Critical Information Infrastructure Protection
(CIIP) governance profiles: a decentralized approach, a centralized approach, and co-regu-
lation with the private sector. The decentralized approach follows the principle of subsidiar-
ity, and therefore generally speaking sector-specific legislation exists. Examples are Sweden,
Austria, and Ireland (ENISA, 2016a, p. 29). The centralized approach includes a comprehen-
sive legislative framework including obligations and requirements for all operators of critical
information infrastructure and often a central authority. The main example of this approach
is France, but the Czech Republic and Germany are mentioned in the ENISA report (p. 30).
Finally, the coregulatory approach with the private sector often takes the form of public private
partnerships, generally based on contractual agreements. An example of this approach can be
found in the Netherlands (p. 32).
Legal Implications of Information Sharing ◾ 279
stakeholders in the public and private sector and providing advice and recom-
mendations vis-à-vis best practices (Christou, 2016, p. 120). As a response to
terrorism, the European Council called for the preparation of an overall strategy
to protect critical infrastructures in 2004. The European Programme for Critical
Infrastructure Protection (EPCIP) (COM, 2006) and the establishment of a
Critical Infrastructure Warning Information Network (CIWIN)4 were subse-
quently endorsed.
In 2005, the Commission’s Green Paper on EPCIP provided policy options
on how the Commission could establish EPCIP and CIWIN, and in 2006 the
Communication from the Commission on EPCIP was provided (COM, 2006). As
outlined in Chapter 6 of this book, trust and security are specifically mentioned
as important in the Digital Single Market Strategy, and the European Agenda on
Security calls for more cooperation and information sharing in different areas. In
2013, the Commission released the Cybersecurity Strategy of the EU (“An open,
Safe and Secure Cyberspace”) (JOIN, 2013). Almost every strategic priority of the
2013 Cybersecurity Strategy highlights the importance of sharing cybersecurity
information (ENISA, 2015a, p. 10).
4 See https://ec.europa.eu/home-affairs/what-we-do/networks/critical_infrastructure_warning_
information_network_en and https://europa.eu/sinapse/sinapse/index.cfm?fuseaction=login.
red i rec t& red i rec t= cmt y re st r ic ted.home& C M T Y_ I D =A0F55C 70 - 0E9E -32D9 -
E5A7822B96D84471&request=1 [last accessed on 28.2.2017]
282 ◾ Collaborative Cyber Threat Intelligence
5 Directive 2013/40/EU of the European Parliament and of the Council of August 12, 2013 on
attacks against information systems and replacing Council Framework Decision 2005/222/
JHA, OJ L 218, 14.8.2013.
6 Council Directive 2008/114/EC of December 8, 2008 on the identification and designation of
ECI and the assessment of the need to improve their protection, OJ L345/75, 23.12.2008.
7 Directive (EU) 2016/1148 of the European Parliament and of the Council of July 6, 2016
concerning measures for a high common level of security of network and information systems
across the Union, OJ L 194, 19.7.2016.
8 However, already in the recitals it is stated that the directive should be reviewed with a view
to assessing the need to include other sectors, specially mentioning the information and com-
munication technology sector.
Legal Implications of Information Sharing ◾ 283
and energy sector. ECIs are critical infrastructures located in Member States that,
if disrupted or damaged, have a significant impact on at least two Member States
(Art. 2(b) Council Directive 2008/114/EC). The principle of subsidiarity is thus
clearly visible in the scope of this Directive.
In addition, the Directive states that the ultimate responsibility to manage
arrangements for the protection of critical infrastructures within the respective
national borders falls within the competence of the relevant Member State (recital
4 Directive 2008/114/EC). The Member States are rather cautious regarding the
delegation of activities in the field of security as they have a legitimate interest in
keeping national security under their direct control (Lazari, 2014, p. 53). Therefore,
the requirements introduced by the Directive have been fulfilled in 28 different
ways, with varying interpretations of the definitions and cross-cutting and sectoral
criteria (Lazari, 2014, p. 53).
In relation to information sharing, the Directive requires each ECI to have a
Security Liaison Officer and each Member State to implement an appropriate com-
munication mechanism between the relevant national authority and the Security
Liaison Officer so as to facilitate the exchange of relevant information concerning
identified risks and threats (Art. 6(4) Directive 2008/114/EC). Furthermore, the
Directive also requires each Member State to appoint a European critical infra-
structure contact point (ECIP) to coordinate European critical infrastructure pro-
tection issues within the Member State, with other Member States, and with the
Commission (Art. 10 Directive, 2008/114/EC).
The issue of varying interpretations and the necessity to have a common frame-
work with comparable terminology in order to exchange information was one
of the driving forces behind the Cybercrime Directive. The European Council
adopted the Directive on attacks against information systems in July 2013 in
order to harmonize domestic approaches in national criminal laws. The Directive
entirely replaces the provisions of Council Framework Decision 2005/222/JHA
of February 24, 2005, and aims to allow for the consistent penalization of illegal
access and system and data interference, thereby reinforcing the protection of criti-
cal infrastructures.
The “Directive establishes minimum rules concerning the definition of crimi-
nal offences and sanctions in the area of attacks against information systems. It
also aims to facilitate the prevention of such offences and to improve cooperation
between judicial and other competent authorities” (Art. 1 Cybercrime Directive,
2013). The Directive aims at harmonizing minimum standards by ensuring that
these types of crimes are punishable by effective, proportionate, and dissuasive
criminal penalties. Art. 5(4)(c) states that attacks against critical infrastructures
should be punishable by a term of imprisonment of at least 5 years. Furthermore,
the Directive also aims to improve the cooperation among the competent authori-
ties, agencies, and bodies (such as national authorities), Eurojust, Europol (and its
European Cybercrime Centre), and ENISA.
284 ◾ Collaborative Cyber Threat Intelligence
9 The other problem was the uneven level of capabilities at the national level across the EU,
which hinders the creation of trust among peers.
10 Directive (EU) 2016/1148 was adopted on July 6, 2016, and it entered into force in August
2016.
Legal Implications of Information Sharing ◾ 285
an incident, the importance of the entity for maintaining a sufficient level of the
essential service and/or the availability of alternative means for the provision of
that service, into account (Art. 6 NIS Directive 2016). In many countries, it is
likely that there will be an overlap between identified operators of essential services
and nationally defined critical infrastructure providers. However, Member States
are only required to send a list of the identified operators to the Commission with
the nationally defined critical infrastructure providers (by remaining outside of the
Directive’s scope) considered a matter for national security (i.e., unless they are also
classified as ECIs, thereby coming within the scope of Directive 2008/114/EC as
discussed above).
The NIS Directive specifies some obligations for identified operators of essential
services, namely, that they must take appropriate and proportionate technical and
organizational measures for risk management and to prevent and minimize the
impact of incidents (Art. 14 NIS Directive 2016). Similar obligations are intro-
duced for digital service providers (providers of online marketplaces, online search
engines, and cloud computing services) to ensure the security of their network and
information systems (Art. 16 NIS Directive 2016).
286 ◾ Collaborative Cyber Threat Intelligence
7.3.1 B
reach Notification Obligations
and Damage Limitations
A general problem associated with information sharing is that private companies
are often reluctant to participate given the perceived threat to reputation and thus
profit. Since 2009, obligations to send notifications of incidents have been increas-
ingly enshrined in legislation in order to counteract this hesitancy. This move
toward obligatory information sharing began in the telecommunication sector.
Directive 2009/140/EC11 (which amended the Framework Directive 2002)12 intro-
duced Articles 13a and 13b containing inter alia the obligation to notify the com-
petent national regulatory authority where a “breach of security or loss of integrity”
results in “a significant impact on the operation of networks or services.”
Following this notification, the competent regulatory authority could then (if
necessary) inform the relevant national regulatory authorities in other Member
States, ENISA, and the public if deemed in the public interest. Information is also
collected and exchanged in summary documents resulting in reports compiled by
ENISA, which include analysis and recommendations and anonymized national
reports that are made available to the national authorities. National reports are
also shared with the operators who agree to provide incident information (ENISA,
2015b).
Generally speaking, in transposing the Directive, Member States included
the provisions in their national telecommunications legislation (e.g., Germany:
§109 (5) German telecommunications act; the Netherlands: Art. 11a2
Dutch Telecommunications Act; and Belgium: Art. 114 Belgian Electronic
Communications Act). The national legislation is often further specified by second-
ary legislation (e.g., in the Netherlands “Besluit continuïteit openbare elektronische
communicatienetwerken en—diensten”).
Of particular importance in the adoption of such secondary legislation were
ENISA recommendations. For example, in Belgium in Art. 114/1, §2 Electronic
11 Directive 2009/140/EC of the European Parliament and of the Council of November 25,
2009 amending Directives 2002/21/EC on a common regulatory framework for electronic
communications networks and services, 2002/19/EC on access to, and interconnection
of, electronic communications networks and associated facilities, and 2002/20/EC on the
authorisation of electronic communications networks and services.
12 Directive 2002/21/EC (Framework Directive).
Legal Implications of Information Sharing ◾ 287
13 Decision of the BIPT council of April 1, 2014, laying down the circumstances in which
the operators have to notify BIPT of a security incident and the terms and conditions of
this notification, available at http://www.bipt.be/en/operators/telecommunication/security/
network-security/decision-of-the-bipt-council-of-1-april-2014-laying-down-the-circum-
stances-in-which-the-operators-have-to-notify-bipt-of-a-security-incident-and-the-terms-
and-conditions-of-this-notification (last accessed 20.3.2017).
14 Regulation (EU) No 910/2014 of the European Parliament and of the Council of July 23,
2014 on electronic identification and trust services for electronic transactions in the internal
market and repealing Directive 1999/93/EC.
15 Directive (EU) 2015/2366 of the European Parliament and of the Council of November
25, 2015 on payment services in the internal market, amending Directives 2002/65/EC,
2009/110/EC and 2013/36/EU and Regulation (EU) No 1093/2010, and repealing Directive
2007/64/EC.
288 ◾ Collaborative Cyber Threat Intelligence
also the NIS Directive specifies notification obligations for operators of essential
services and for digital service providers. If an incident has a significant/substan-
tial impact on their service, such providers are required to notify the competent
authority appointed by the Member State or the CSIRT without undue delay. The
NIS Directive explicitly excludes service providers falling within the more targeted
scope of the notification provisions contained in the Framework Directive and the
eIDAS Regulation from its requirements. In addition, the Directive provides an
exception for the operators of essential services and providers of digital services in
cases where a sector specific Union legal act (such as PSD II) already establishes
obligations to notify that are at least equivalent to the NIS Directive (Art. 1(7) NIS
Directive 2016).
Furthermore, it should be noted that there are specific notification obligations
for personal data breaches. While the frameworks analyzed in the previous para-
graphs provide obligations focused on the nature of the service being provided, the
personal data breach notification mechanism hinges on the scope of the definition
of personal data: any information relating to an “identified or identifiable natural
person” (Art. 4(1) General Data Protection Regulation (GDPR)). The term “identi-
fiable” here refers to natural person who can be directly or indirectly be identified.
To assess whether a person is identifiable all the reasonable means that may be
used, either by the controller or a third party, need to be taken into account (recital
26 GDPR). Importantly, “identified” is not limited to an individual’s name and
instead refers to “singling out” through the use of an identifier (Art. 4(1) GDPR)
with pseudonymous data still classified as coming within the scope of the personal
data definition (see Art. 4(5) GDPR). Therefore, personal data may include for
example a name, an identification number, location data, an online identifier, or
one or more factors specific to the physical, physiological, genetic, mental, eco-
nomic, cultural, or social identity of that natural person.
An important point of analysis in this regard is the status of IP addresses, which
in some countries were considered personal data while in others not.16 Indeed,
although the CJEU previously found that IP addresses were personal data,17 some
uncertainty remained given that the previous case law only referred to static and not
dynamic IP addresses. In the 2016 Breyer Case the Court of Justice of the European
Union (CJEU) decided on the status of dynamic IP addresses (albeit by limiting
this somewhat to the facts in the case).18 The background of the case involved the
operation of websites by the Federal Republic of Germany and more specifically the
storing of the dynamic IP addresses of visitors. Patrick Breyer wanted the Federal
Republic of Germany to refrain from collecting IP addresses when not technically
16 Also mentioned as a point of concern for information sharing between CERTs in ENISA
2013b, p. 8.
17 For example, the CJEU Judgement Case C-70/10, November 24, 2011 (Scarlet SABAM),
ECLI:EU:C:2011:771.
18 CJEU Judgement Case C-582/14 October 19, 2016 (Breyer), ECLI: EU:C:2016:779.
Legal Implications of Information Sharing ◾ 289
necessary in terms of functionality. Following two lower court hearings, the case
ended up in front of the German Federal Court of Justice, the Bundesgerichtshof
(BGH). On October 28, 2014, the Bundesgerichtshof referred questions to the Court
of Justice of the European Union (CJEU) for a preliminary ruling.
Importantly for our current analysis, the first question related to whether the
classification of IP addresses as personal data extends to dynamic IP addresses in
situations where the website operator who processes the IP addresses does not have
the identifying information necessary to link them to individual users. In such
cases, the identifying information is instead held by a third party (i.e., the ISP) and
is therefore beyond the reach of the website operator without direct cooperation
between the parties.19
In responding to this question, the CJEU considered that the possibility of
combining a dynamic IP address with additional data held by the Internet service
provider could constitute a means “likely reasonably” to be used to identify the
data subject given that (as in the case of Germany) legal channels exist to obtain
such information. The Advocate General in his opinion pointed out that a dynamic
IP address would not be considered personal data if the identification of the data
subject was prohibited by law or practically impossible due to its requiring a dis-
proportionate effort in terms of time, cost, and man-power, thereby resulting in an
insignificant risk of identification.
Consequently, given that ISPs keep a record of the persons to whom dynamic
IP addresses have been assigned, and as legal means to access the information exist,
dynamic IP addresses in such circumstances are considered personal data.20 The
reasoning of the court regarding the “likely reasonably” means can also be applied
in relation to information other than dynamic IP addresses.
From the previous few paragraphs, it is clear that the definition of personal
data is broad, and this obviously renders the notification obligations for per-
sonal data breaches significantly important. This notification obligation applies to
both data controllers and data processors. Consequently, this requirement applies
to a broader audience and can coincide with notification obligations aimed at spe-
cific services as long as personal data is processed. This is provided for by also
obliging notification to other relevant bodies and highlighting the need for close
cooperation (e.g., Art. 19 eIDAS Regulation 2014, Art. 15(4) NIS Directive 2016).
The telecommunication sector introduced specific obligations in 2009 as part of
the Telecommunications reform package via an amendment to Art. 4 of Directive
19 It is important to note that this is more significant in the context of dynamic IP addresses
given that they change, for static IP addresses as they remain fixed such additional informa-
tion becomes less important.
20 Article 29 Working Party, Opinion 4/2007 on the concept of personal data, WP 136, June
20, 2007; WP 37: Privacy on the Internet—An integrated EU Approach to On-line Data
Protection—adopted on 21.11.2000; CJEU Judgement Case C-582/14 October 19, 2016
(Breyer).
290 ◾ Collaborative Cyber Threat Intelligence
1. The nature and content of the personal data concerned, in particular where
the data concerns financial information, special categories of data, as well
as location data, Internet log files, web browsing histories, e-mail data, and
itemized call lists;
2. The likely consequences of the personal data breach for the subscriber or indi-
vidual concerned, in particular where the breach could result in identity theft
or fraud, physical harm, psychological distress, humiliation, or damage to
reputation; and
3. The circumstances of the personal data breach, in particular where the data
has been stolen or when the provider knows that the data are in the possession
of an unauthorized third party (Art. 3(2) Regulation 611/2013).
The Data Protection Directive 95/46/EC did not include a specific data breach
notification obligation. However, obligations of this kind were often included in
national law or the Data Protection Authorities recommended it, by inferring good
practice standards to notify from other provisions of the Directive.23 In contrast,
21 Directive 2002/58/EC of the European Parliament and of the Council of July 12, 2002
concerning the processing of personal data and the protection of privacy in the electronic
communications sector (Directive on privacy and electronic communications) OJ L 201,
31/07/2002 pp. 37–47.
22 Commission Regulation (EU) No 611/2013 of June 24, 2013 on the measures applicable
to the notification of personal data breaches under Directive 2002/58/EC of the European
Parliament and of the Council on privacy and electronic communications, 26.6.2013, OJ L
173/5.
23 For example, in Germany and the Netherlands a notification obligation was enshrined in law;
in Belgium and Italy the DPAs deduced an obligation to notify from the principles of security
or fairness.
Legal Implications of Information Sharing ◾ 291
the new GDPR 24 does include a notification obligation in case of a personal data
breach in Art. 33 GDPR. The controller is required to provide notification of the
personal data breach without undue delay and, where feasible, no later than 72
hours after having become aware of it (if the notification is made later, reasons for
the delay must be given). Where a data processor becomes aware of a personal data
breach, this entity is obligated to notify the controller without undue delay who in
turn must notify the supervisory authority. As distinct from the other notification
obligations, the data protection provision does not focus on the impact of the ser-
vice to trigger a notification obligation. Instead, breaches must notified in general
with the exception of a personal data breach that is unlikely to result in a risk to the
rights and freedoms of natural persons. In situations where the personal data breach
is likely to result in a high risk to the rights and freedoms of natural persons, the
controller is required to inform not only the supervisory authority but also the data
subject without undue delay.
In contrast with Art. 13a Frameworks Directive, the data protection authorities
are not required to report the received notifications to the European Commission
or ENISA on an annual basis. Art. 59 GDPR requires data protection authorities to
draw up an annual report on its activities, which must be transmitted to different
authorities and made available to the public, the European Commission, and the
European Data Protection Board. The Article does not specifically mention that
the DPAs should also include the received notifications.
It should be noted, however, that, given that much of the EU framework has
been adopted in the form of directives, one is required to examine the specific
national implementations for a more specific analysis of each Member State’s legal
framework. In addition, in areas that are not legislated at the EU level (or areas in
which Member States have the competence to enact diverging substantive rules due
to a minimum harmonization legislative approach), some Member States may have
specific legislation of relevance. For example France [French Military Programming
Law (LPM)] and Germany (German IT Security) both oblige specific operators to
report cybersecurity incidents, implement technical and organizational security
measures, and undergo cybersecurity audits (ENISA, 2016a, p. 18f).
24 Regulation (EU) 2016/679 of the European Parliament and of the Council of April 27, 2016
on the protection of natural persons with regard to the processing of personal data and on
the free movement of such data, and repealing Directive 95/46/EC (General Data Protection
Regulation), OJ L 119, 4.5.2016, pp. 1–88.
Table 7.1 Overview of Different Notification Provisions
Who has Undertakings providing Qualified and Payment service Controller Operators of
to notify? public communications nonqualified trust providers essential
networks or publicly service providers services +
available electronic digital service
communications services providers
What? A breach of security or Any breach of security or Major Personal data breach Incidents
loss of integrity that has loss of integrity that has operational or that results in a risk having a
had a significant impact a significant impact on security for the right and significant
on the operation of the trust service incident freedom of impact on the
networks or services provided or on the individuals continuity of
personal data the essential
maintained therein service
When? [not specified in the Without undue delay but Without undue Without undue delay Without undue
Directive] in any event within 24 delay [possibly and, where feasible, delay [possibly
hours of having become specified in not later than 72 specified in
aware of it national hours of having national
legislation] become aware of it legislation]
To whom? Competent national The supervisory body and, Competent Competent Competent
regulatory authority where applicable, other authority in the supervisory authority/
relevant bodies, such as home Member authority [in case of CSIRT
the competent national State of the high risk for rights appointed by
body for information payment and freedoms of Member
security or the data service provider individuals also to State
protection authority the data subject]
Legal Implications of Information Sharing ◾ 293
careful with notifications due to reputational worries or fear of liability (see infra
Section 7.5). To achieve resilience, a broader, proactive exchange of information is
also important.
However, proactive information sharing is a matter closely protected by the
Member States. Even in the context of public sector information, EU Member
States have guarded their authority over Freedom of Information and access tightly
and essentially decide which data sets become public. The area of freedom of infor-
mation legislation focuses on the public sector bodies’ rights and obligations in
relation to making “public information” available upon request (but also encourag-
ing proactive release) to the general public in order to support accountability and
transparency. Although there is an EU-level legal framework on the reuse of public
sector data in the form of Directive 2003/98/EC (PSI Directive, 2003)25 designed
to stimulate the European information services market, the release of this informa-
tion remains a determination in the sole competence of the Member States, thus
facilitating clear disparities.26
As noted by the ENISA report on encouraging information sharing between
CERTs:
ENISA, 2011
Moreover, in our current analysis it is also important to again emphasize that this
Directive only applies to public sector information. Therefore, given that many of
the CI operators are private entities, the Directive would remain largely inappli-
cable to the information held by such operators (the consequences/fear of sharing
this information with public sector bodies and its potential subsequent release will
be dealt with in Section 7.5).
25 Directive 2003/98 of November 17, 2003 on the re-use of public sector information [2003] OJ
L 345/90, amended in 2013 by Directive 2013/37/EU of June 26, 2013 amending Directive
2003/98/EC on the re-use of public sector information [2013] OJ L 175/1.
26 For more see: http://journalism.cmpf.eui.eu/maps/freedom-of-information/.
294 ◾ Collaborative Cyber Threat Intelligence
As such, for a more accurate overview of hard law requiring proactive informa-
tion sharing, one must refer to the national level. That being said, many different
soft law initiatives exist to improve information sharing. ENISA has worked on and
provided many recommendations for information sharing among different stake-
holders. Examples of different information sharing communities and networks are
given in Chapters 4 and 5. As explained there, information sharing communities
have the benefit of increasing trust and therefore stimulating openness in infor-
mation sharing. Additionally, they also provide meaningful vetting and leverage
expert capabilities.
The NIS Directive not only introduces new entities in order to increase the
national level of network and information security, but it also includes some
approaches to increase and improve information sharing. The Cooperation Group
and the CSIRTs network are two such groups established by the NIS Directive,
which should increase the exchange of information. The Cooperation Group is
composed of representatives of the Member States, the European Commission, and
ENISA and has a more strategic role, focusing on exchanging information regard-
ing best practice (e.g., on the exchange of information related to incident notifica-
tion). On the other hand, the CSIRT network consists of representatives of the
Member States’ CSIRTs and CSIRT-EU. The aim of the network is to exchange
information on CSIRTs’ services, operations and cooperation capabilities and dis-
cuss noncommercially sensitive information (at the request of a representative of a
CSIRT), and voluntarily make available nonconfidential information concerning
individual incidents.
As becomes visible from the restrictions, the sharing is purely voluntary.
It is further provided that Member State CSIRTs may refuse to contribute to
discussions if there is a risk of prejudice to the investigation of an incident.
Moreover, the sharing only involves nonconfidential and noncommercially sensi-
tive information.
27 This is based on the assumption that the insights that would be shared would be unlikely to
constitute anything other than information to be processed by a computer program. However
for absolute certainty, regard must be had for all relevant IP rights.
28 Other EU legislation includes: Directive 2006/115/EC of the European Parliament and of the
Council of December 12, 2006 on rental right and lending right and on certain rights related
to copyright in the field of intellectual property, OJ L 376, pp. 28–35; Directive 2009/24/EC
of the European Parliament and of the Council of April 23, 2009 on the legal protection of
computer programs, OJ L 111, pp. 16–22; Council Directive 87/54/EC of December 16, 1986
on the legal protection of topographies of semiconductor products, OJ L24, 36; Directive
2004/48/EC of the European Parliament and of the Council of April 29, 2004 on the enforce-
ment of intellectual property rights, OJ L 195, pp. 16–25; Council Directive 93/83/EEC of
September 27, 1993 on the coordination of certain rules concerning copyright and rights
related to copyright applicable to satellite broadcasting and cable retransmission, OJ L 248,
pp. 15–21.
29 Directive 2001/29/EC of the European Parliament and of the Council of May 22, 2001 on
the harmonization of certain aspects of copyright and related rights in the information society
(OJ 2001 L 167, p. 10).
30 Directive 96/9/EC of the European Parliament and of the Council of March 11, 1996, on the
The scope of application of these rights can be very broad, with the line
between protection and unprotected information being particularly blurred
in the case of copyrights… and sui generis database rights… as these do not
require any prior registration.
ENISA, 2011
Importantly, however, there are certain exceptions to IP rights, for example for
purely temporal reproduction, lawful users, or public security.31
Building on the above, complementary to IP rights is the protection of trade
secrets. Trade secrets are pieces of information of an economic value (despite not
granting exclusivity of rights) that are not publically known and are treated as con-
fidential within a company (SWD, 2013). As part of the 2011 IPR strategy on June
8, 2016, Directive 2016/94332 on trade secrets was adopted (Tradesecrets Directive,
2016). This Directive aims to harmonize the national laws in EU countries against
the unlawful acquisition, disclosure, and use of trade secrets. In order for infor-
mation to be considered a trade secret, the key requirement is that the person in
31 As provided for by Article 5(3)(e) the Information Society Directive and Articles 6(1)(c) and
9(1)(c) of the Database Directive. Member States such as Germany (Section 45, 2, German
Copyright Law) and the UK (Sections 45–50 UK Copyright) have implemented such an excep-
tion in contrast to Belgium and Ireland. However, in their review of the current implementa-
tion in Ireland the Copyright Review Committee recommended such a provision (Modernising
Copyright A Report prepared by the Copyright Review Committee for the Department of
Jobs, Enterprise and Innovation www.enterprise.gov.ie/en/Publications/CRC-Report.pdf).
32 Directive (EU) 2016/943 of the European Parliament and of the Council of June 8, 2016, on
the protection of undisclosed know-how and business information (trade secrets) against their
unlawful acquisition, use, and disclosure. OJ L 157, 15.6.2016, pp. 1–18.
Legal Implications of Information Sharing ◾ 297
c ontrol of the information take reasonable steps to keep it secret. At a business level,
it should be noted that there might also be confidentiality obligations toward third
parties, which may have a restricting impact on the sharing of information. For
example, a third party may make its voluntary cooperation subject to a confidenti-
ality agreement in the form of a nondisclosure agreement.
7.4.1.2 C
lassified Information and the Public–Private Overlap
It is clear that information relating to critical infrastructures can potentially be
security sensitive. Given the importance of critical infrastructures however, such
information may also be classified as secret at a national level thereby blurring
the public–private dividing lines. There is a large degree of disparity between the
Member States in this regard. For example, in Ireland no framework currently
exists for the classification of data. However, the Official Secrets Act 1963 does
stipulate the definition for an official secret. This contrasts sharply with the situa-
tion in many other countries.
For instance in Germany, national security secrets are defined in § 93 of the
German Criminal Code (StGB), while the Safety Assessment Act (SÜG)33 reg-
ulates the requirements for people who do security relevant tasks, including the
accessing of classified information. § 4 SÜG defines four levels of classification for
information or items considered necessary to be kept secret in the public interest.
Similar classification systems are evident in the UK, Italy, Belgium, and France.34
The key issue however, relates to the fact that the precise criteria and oversight of
such classifications are not always apparent.
The EU itself does not have specific legislation on the classification of secu-
rity information. As described supra, this is due to the fact that the EU has no
competence as national security, according to Art. 4 TEU, is “the sole responsibil-
ity of each Member State” (Galloway, 2014). Nevertheless, as the Maastricht and
Amsterdam treaties included the development of a common foreign and security
policy and the commitment to take action to prevent and combat crime as an
objective, security classification rules were seen as a necessary prerequisite for the
EU to cooperate in a meaningful way with third-country states and international
organizations (Galloway, 2014).
Accordingly, in order to develop a regulatory framework for security classifica-
tion the EU’s institutions have taken a procedural approach largely based on inter-
nal rules.35 In 2001, the Council adopted a decision detailing comprehensive security
33 Gesetz über die Voraussetzungen und das Verfahren von Sicherheitsüberprüfungen des
Bundes (Sicherheitsüberprüfungsgesetz—SÜG).
34 See: http://cybersecurity.bsa.org/countries.html.
35 Galloway (2014). This approach has been criticized by some authors, e.g., Deirdre Curtin,
“Overseeing Secrets in the EU: A Democratic Perspective: Overseeing Secrets in the EU,”
JCMS: Journal of Common Market Studies 52, no. 3 (May 2014): 684–700, doi:10.1111/
jcms.12123.
298 ◾ Collaborative Cyber Threat Intelligence
FURTHER INFORMATION
The Council and the Commission define EUCI as “any information or material
designated by an EU security classification, the unauthorised disclosure of which
could cause varying degrees of prejudice to the interests of the European Union
or of one or more of the Member States.”39 EUCI is separated into four levels
distinguished on the basis of the effect an unauthorized disclosure could have on
the interests of the European Union or one or more of the Member States:
Aside from the fact that revealing classified information is punishable in many
Member States, the necessary technical and organizational requirements coming
36 Council of the European Union (2001), ‘Council Decision of 19 March 2001 adopting the
Council’s security regulations’, 2001/264/EC, OJ L 101, April 11, 2001.
37 Commission Decision 2001/844/EC,ECSC,Euratom of November 29, 2001, amending its
internal Rules of Procedure, OJ L 317, December 3, 2001. After its first decision in 2001,
the Council updated its internal rules with Council Decision 2001/264/EC of March 19,
2001 adopting the Council’s security regulations (OJ L 101), Council Decision 2011/292/
EU of March 31, 2011 on the security rules for protecting EU classified information (OJ L
14)1 and Decision 2013/488/EU, which was amended by Council Decision 2014/233/EU
of April 14, 2014, amending Decision 2013/488/EU on the security rules for protecting EU
classified information. Furthermore, there are internal guidelines [Council of the European
Union, Handling of documents internal to the Council, 1136/11 (9.6.2011) and 10384/13
(31.5.2013)] and the Commission also updated their Commission Decision (EU, Euratom)
2015/444 of March 13, 2015, on the security rules for protecting EU classified information,
OJ L72/53, March 17, 2015.
38 European Parliament (2011), “Decision of the Bureau of the European Parliament concerning
the rules governing the treatment of confidential information by the European Parliament,”
OJ C 190, June 20, 2011.
39 Art. 3 Commission decision, Art. 2 Council decision.
Legal Implications of Information Sharing ◾ 299
along with the handling of classified information can provide a barrier for informa-
tion sharing. For example, the Council Directive 2008/114 requires that any person
handling classified information (also in case of nonwritten information exchanged
during meetings at which sensitive subjects are discussed) must have gone through
an appropriate level of security vetting (Art. 9, recital 18 Directive 2008/114).
The NIS Directive also includes exceptions regarding confidential information
in Art. 1(5) and (6). These provide that confidential information based on Union or
national rules (including rules on business confidentiality) shall only be exchanged
with the European Commission and other relevant authorities if the exchange is
necessary for the application of the Directive. Such information must be kept confi-
dential, used to protect the interest of the operators of essential services, and be lim-
ited to what is relevant and proportionate to achieve the purpose of the exchange.
The Directive does not however, require the disclosure of information Member
States consider contrary to their national security interests.
40 Directive 95/46/EC of the European Parliament and of the Council of October 24, 1995 on
the protection of individuals with regard to the processing of personal data and on the free
movement of such data, OJ L 281, 23.11.1995, pp. 31–50.
300 ◾ Collaborative Cyber Threat Intelligence
DEFINITION: PROCESSING
Processing: according to Art. 4(2) GDPR “processing” means any operation
or set of operations performed on personal data or on sets of personal data,
whether or not by automated means, such as collection, recording, organiza-
tion, structuring, storage, adaption or alteration, retrieval, consultation, use,
disclosure by transmission, dissemination or otherwise making available,
alignment or combination, restriction, reassure or destruction.
The GDPR outlines certain basic principles relating to the processing of personal
data in Art. 5 GDPR. These include, inter alia the requirement that personal data
must be processed fairly, lawfully, and in a transparent manner, only be collected
for specified, explicit, and legitimate purposes, and not further processed in a way
incompatible with that purpose (i.e., network and information security or possible
even more specified, e.g., enforcing access restrictions, mitigating DDoS attacks);
that personal data processing should be limited to what is adequate, relevant, and
not excessive in relation to the purposes of the processing (data minimization); and
that personal data must be processed in a secure manner through the use of appro-
priate technical or organizational measures. Furthermore, the data should be accu-
rate and kept up to date and only be stored as long as is necessary for the purpose.
This means that it might be necessary to provide deletion timeframes and that it is
therefore unacceptable to keep personal data for an undefined timeframe just in case.
Data subjects (i.e., those to whom the personal data relate) are also awarded
certain rights such as the right to information; the right to access, rectify, and
erase personal data; the right to data portability; the right to restrict a processing
operation; the right to object to such processing and the right not to be subject to
41 Directive (EU) 2016/680 of the European Parliament and of the Council of April 27, 2016,
on the protection of natural persons with regard to the processing of personal data by com-
petent authorities for the purposes of the prevention, investigation, detection, or prosecution
of criminal offences or the execution of criminal penalties and on the free movement of such
data and repealing Council Framework Decision 2008/977/JHA.
Legal Implications of Information Sharing ◾ 301
Art. 6(1)(a)—the data subject has given consent to the processing of his or her
personal data for one or more specific purposes;
Art. 6(1)(b)—processing is necessary for the performance of a contract to
which the data subject is party or in order to take steps at the request of the
data subject prior to entering into a contract;
Art. 6(1)(c)—processing is necessary for compliance with a legal obligation to
which the controller is subject;
Art. 6(1)(d)—processing is necessary in order to protect the vital interests of
the data subject or of another natural person;
Art. 6(1)(e)—processing is necessary for the performance of a task carried out in
the public interest or in the exercise of official authority vested in the controller;
Art. 6(1)(f)—processing is necessary for the purposes of the legitimate inter-
ests pursued by the controller or by a third party, except where such interests
are overridden by the interests or fundamental rights and freedoms of the
data subject that require protection of personal data, in particular where the
data subject is a child.
Of particular relevance for our current purposes are that the processing is nec-
essary for compliance with a legal obligation to which the controller must adhere;
302 ◾ Collaborative Cyber Threat Intelligence
that it is necessary for the performance of a task carried out in the public interest
or in the exercise of official authority vested in the controller; or finally, that the
processing is necessary for the purposes of the legitimate interests pursued by the
controller or by a third party.
More specifically in relation to legitimate interests as lawful grounds, the GDPR
clarifies that the processing of personal data necessary to ensure network and infor-
mation security by public authorities, CERTs, CSIRTs, providers of electronic
communications networks and services, and providers of security technologies and
services constitutes a legitimate interest of the controller (recital 49 GDPR).42 When
relying on legitimate interests as lawful grounds, however, one is required to satisfy
the fair balancing test imbued in this provision. Indeed, Art. 6(1)(f) requires that
the processing must be necessary and proportionate vis-à-vis the purposes of the
legitimate interests pursued by the controller (i.e., ensuring network and informa-
tion security). Therefore, this means that the lawfulness of such processing must be
balanced and, as such, respect the fairness principle contained in Art. 5(1)(a) GDPR.
Furthermore, it should also be noted that although CI operators (as data con-
trollers)43 can avail themselves of legitimate interests as lawful grounds vis-à-vis the
collection of NIS information of their own systems, public entities cannot gener-
ally rely on Art. 6(1)(f) GDPR if the processing is carried out in performance of
their task. This appears to contradict recital 49 GDPR, which, as mentioned supra,
provides that the processing of personal data for network and information security
constitutes a legitimate interest and then explicitly mentions public authorities as a
type of controller that can avail themselves of the lawful grounds. It is probable that
the overlap here will depend on whether the processing for network and informa-
tion security purposes lies within the specific task of the public authority. In such
circumstances, the authority will not be able to avail itself of Art. 6(1)(f) GDPR.44
In such situations, alternative lawful grounds are required. In particular Art.
6(1)(c) (processing is necessary for either the compliance with a legal obligation)
or Art. 6(1)(e) GDPR (processing is necessary for the performance of a task car-
ried out in the public interest or in the exercise of official authority vested in the
controller). For processing based on a legal obligation or performance of a task in
42 Network and information security is considered “i.e., the ability of a network or an informa-
tion system to resist, at a given level of confidence, accidental events or unlawful or malicious
actions that compromise the availability, authenticity, integrity and confidentiality of stored
or transmitted personal data, and the security of the related services offered by, or acces-
sible via, those networks and systems, by public authorities, by computer emergency response
teams (CERTs), computer security incident response teams (CSIRTs), by providers of elec-
tronic communications networks and services and by providers of security technologies and
services” Recital 49 GDPR.
43 The one who determines the purposes and means of the processing of personal data [Art. 4 (7)
GDPR] and who is responsible to comply with the data protection obligations.
44 This appears to be similar to the distinction made between consent and contract as respective
lawful grounds.
Legal Implications of Information Sharing ◾ 303
the public interest, the Member States may maintain or introduce more specific
provisions by determining particular obligations. The basis for the processing to
which the controller is subject must be laid down by Union or Member State law,
which must meet a public interest objective and be proportionate to the legitimate
purpose pursued. The legal basis should determine the purpose of the processing,
or the purpose must be necessary for the performance of the task.
In contrast to the above, where the network and information security purpose is
not within the scope of the task of the public authority, it may be possible for the pub-
lic authority to rely upon legitimate interests of the controller as lawful grounds. The
type of network and information system security measure and the reason for enact-
ing it can provide clues in this regard. While it might be debatable whether a public
authority should provide a website if it is not in the scope of its task and whether
retaining IP addresses is the right security measure, it is reasonable for example that
public authorities can rely upon the legal interest of the controller to keep their inter-
nal computer systems secure and process different types of data in order to do this (of
course keeping in mind the balancing exercise in Art. 6(1)(f) GDPR).
In this context, one can refer to the recent CJEU judgement in the Breyer Case
as discussed above (see Section 7.3.1). Although the case primarily dealt with the
definition of personal data in relation of dynamic IPs, the second question referred
to the CJEU inquired as to whether §15 of the German Telemedia Act, which
requires data subject consent for the collection and other processing of personal
data by online media service providers and restricts this information processing to
that which is necessary to ensure functionality, is legitimate in light of Directive
95/46/EC and hence whether the grounds for processing contained in Art. 7(f)
Directive 95/46/EC could be relied upon in lieu of consent for the processing of
such personal data (in this case IP addresses). In its judgement, the CJEU found
the § 15 of the German Telemedia Act was too restrictive and therefore found that
legitimate interests could act as lawful grounds in such circumstances.
Consequently, it appears that the division made above vis-à-vis the lawful
grounds for processing is reflected in the Breyer judgment. It should be noted
however, that the Breyer Case referred to Directive 95/46/EC and not the GDPR.
Nevertheless, given that the lawful grounds for processing have remained unal-
tered in the GDPR, this interpretation seems directly transferable. Building on
the above, in situations where the personal data have originally been collected for
a purpose other than one related to network and information security, any further
processing for such purposes must be based on lawful grounds. Although it is clear
that Articles 6(1)(c) and 6(1)(e) may be applicable here as lawful grounds, this is
potentially significant where they are not.
In such situations, therefore, it must be assessed whether the processing for
NIS is compatible with the purpose for which the personal data was originally
collected.45 In such circumstances, any link between the original purpose and the
new purpose, the context in which the data was originally collected and the nature
or the personal data should be considered. This is especially important in case of
special categories of data (data relating to racial or ethnic origin, political opinions,
religious or philosophical beliefs, or trade union membership, and the processing of
genetic data, biometric data for the purpose of uniquely identifying a natural per-
son, data concerning health or data concerning a natural person’s sex life or sexual
orientation) and data related to criminal convictions and offences.
In addition to the above, it should also be noted that such considerations may
be applicable in relation to the transfer of personal data as such an action would
also be clearly classified as processing. Therefore, if the transfer of information was
not included within the original purpose, the above discussion relating to the deter-
mination of lawful grounds for secondary purposes is also potentially relevant (also
again where Articles 6(1)(c) and 6(1)(e) do not cover such processing).
More generally, in relation to information transfer is it important to take into
account whether the recipient is located within the EU or in a third country/interna-
tional organization. In situations where the recipient is located outside the EU, specific
requirements apply to such transfers.46 In circumstances where the recipient is located
within the EU, the data protection legislation applies directly, and therefore the recipi-
ent (a processor or controller) is required to respect the requirements in the GDPR.
The GDPR specifically aims at facilitating the “free flow of personal data” in the EU.
In determining whether the recipient of the personal data is a processor or con-
troller, one is required to analyze the factual circumstances in light of the respective
definitions contained in the GDPR. Hence, where the recipient merely receives and
processes the data in line with the original controller’s instruction (e.g., the control-
ler instructed the recipient but the results are for the controller, and the recipient will
not process the personal data for its own purposes), the recipient will be considered a
processor. As mentioned supra, in such circumstances this must be reflected in a con-
tractual agreement as defined in the GDPR. In contrast, in circumstances where the
recipient of the personal data processes (also) for its own purposes (i.e., it determines
the purposes), the recipient will be considered a data controller. The controllers could
then be categorized as joint controllers or indeed separate controllers. Joint control
arises “when different parties determine with regard to specific processing operations
either the purpose or those essential elements of the means which characterize a
controller” (Art.29WP, 2010, p. 18). On the other hand the sharing of data between
two controllers without mutual purposes or means in a common set of operations is
considered only as transfer of data between separate controllers (Art.29WP 2010).
It should be noted that the assessment of the status is based upon a factual
assessment, depending on who determines the purposes and means, contractual
arrangements can only provide an indication and always need to be checked against
46 For example, if the Commission gave an adequacy decision for the third country or if the
transfer is subject to appropriate safeguards, for example in the form of binding corporate
rules, standard data protection clauses or an approved certification mechanism.
Legal Implications of Information Sharing ◾ 305
the sharing of personal data and its impact on privacy and data protection as dis-
cussed in Section 7.4.1.2 (ENISA, 2013b, p. 8). However, this argumentation can
be extended to other areas of law. Examples of these are competition law and free-
dom of information legislation.
For instance, specifically in the context of freedom of information the fear that
shared data might become public under national information access legislation has
been mooted as a deterrent for critical infrastructure operator information sharing
with public bodies. The extent to which these legal provisions are indeed perceived
as barriers to information sharing is not clear and might depend on each country
individually. For example, experiences in the Netherlands have shown that they
are indeed perceived as barriers (see NDN pilot in Chapter 5), while in an ENISA
survey of 2010 it was found that the respondents of the survey ranked this as of
relatively low importance (ENISA, 2010, p. 35).
Similarly, for the fear of breaching competition law, which is sometimes men-
tioned in the literature (and in particular the US literature), no empirical evidence was
found, and it was even ranked last in the ENISA survey; it was not reported as being
a problem in the interviews (ENISA, 2010, p. 37). That being said although such
frameworks in themselves do not restrict the sharing of information, they can some-
times discourage critical infrastructure operators from participating in such sharing.
47 Entity means any private entity, nonfederal government agency or department, or state, tribal,
or local government (including a political subdivision, department, or component thereof).
48 https://w w w.us-cert.gov/sites/default/f iles/ais_f iles/Privacy_and_Civil_Liberties_
Guidelines_(Sec%20105(b)).pdf.
308 ◾ Collaborative Cyber Threat Intelligence
capability, which enables the exchange of cyber-threat indicators between the Federal
Government and the private sector and must refer to the Guidance49 provided there
and can find further information in the Privacy Impact Assessment.50 Federal enti-
ties must comply with the guidelines as provided by the Attorney General.
But are the above US experiences directly transferable to the EU? In short, they
are in part and with some considerable difficulty. As has been alluded to through-
out the analysis in this chapter, EU policy making in this context is based on, at
best, joint and sometimes coordinating competence. This reflects the fact that secu-
rity and policing remain matters closely guarded by the Member State. As such, a
very practical obstacle in adopting legislation similar to the US approach would be
simply the complex construction that is the EU and hence the potential political
objections that would inevitably come from such broad-level reform.
It should therefore be recognized that these potential political objections and
the more disjointed nature of the EU are indicative of just that, a union or collec-
tion of Member States, with diverging (yet comparable) concerns. However, any
such developments would need to not only find a compromise across the Member
States but also reflect the potentially different concerns experienced in the EU (i.e.,
where it seems that data protection rather than competition law or the disclosure of
information appears to be the most prominent concern).
Aside from this more practical concern, one must realize that although simply
affording proprietary rights in information shared by CI operators may seem like a
simple solution, in an EU context this would potentially present extremely complex
legal issues. More specifically, if one accepts that the information shared will at least
in principle contain personal data, affording such information a proprietary nature
would appear to contradict the fundamental rights framework and thus arguably
dilute the status of data protection as a fundamental right in Art. 8 of the Charter
of Fundamental Rights of the EU.
7.6 Conclusion
Therefore, in conclusion this chapter has outlined the legal implication of informa-
tion sharing in the context of network and information security. By doing so, the
chapter has laid the groundwork for Chapter 8, which aims to assess the operation
of this framework in practice. However, through the discussion of the framework
the analysis has also aimed to provide some insights into the limitations of a reli-
ance on reactive breach notification-orientated information sharing, outlined the
barriers to more proactive sharing, and made a short attempt at highlighting some
normative insights into the move towards a more proactive, coordinated, and effec-
tive information sharing ecosystem.
49 https://w w w.us-cert.gov/sites/default/files/ais_files/Non-Federal_Entity_ Sharing_
Guidance_%28Sec%20105%28a%29%29.pdf.
50 https://www.us-cert.gov/sites/default/files/ais_files/PIA_NPPD-AIS.pdf.
Legal Implications of Information Sharing ◾ 309
List of Abbreviations
AIS Automatic Indicator Sharing
BGH Bundesgerichtshof
BIPT Belgisch Instituut voor Postdiensten en Telecommunicatie
CISA Cyber Information Sharing Act
CIWIN Critical Infrastructure Warning Information Network
CJEU Court of Justice of the European Union
CSIRT Cybersecurity Incident Response Team
DDoS Distributed denial of service (attack)
DHS Department of Homeland Security
DNS Domain name service
ECI European critical infrastructure
ECIP ECI contact point
ENISA European Network and Information Security Agency
EPCIP European Programme for Critical Infrastructure Protection
EUCI EU classified information
GDPR General data protection regulation
IPR Intellectual property rights
ISP Internet service provider
LPM French Military Programming Law
NDN (Dutch) National Detection Network
NIS The (European) Directive on security of network and informa-
tion systems
PSD Payment service directive
PSI Public sector information
SÜG Sicherheitsüberprüfungsgesetz
TEU Treaty on European Union
TLD Top level domain
Bibliography
Books
Christou, G. 2016. Cybersecurity in the European Union, Basingstoke, UK: Palgrave
MacMillan.
Lazari, A. 2014. European Critical Infrastructure Protection, Cham, Switzerland: Springer.
Journals
Curtin, D. 2014. Overseeing secrets in the EU: A democratic perspective: overseeing secrets
in the EU. Journal of Common Market Studies 52, no. 3 (2014): 684–700, doi:10.1111/
jcms.12123.
310 ◾ Collaborative Cyber Threat Intelligence
Galloway, D. 2014. Classifying secrets in the EU. Journal of Common Market Studies 52, no.
3 (2014): 670, doi:10.1111/jcms.12122.
McKeown, E. and E. Storm-Smith. 2016. New legislation strengthens legal protection for
cybersecurity information-sharing. Intellectual Property & Technology Law Journal 28,
no. 5 (2016): 17–19.
Reports/Studies
Korff, D. 2002. EC study on implementation of data protection directive, Cambridge UK,
September 2002.
ENISA
ENISA 2010: Robinson, N. and E. Disley. Challenges and barriers to information sharing,
September 8, 2010.
ENISA 2011: Portesi, S., N. Robinson, and H. Graux. A flair for information sharing-
encouraging information exchange between CERTs, November 2011.
ENISA 2013a: ENISA, M. Dekker, and C. Karsberg. Technical guidance on the incident
reporting in Article 13a. Version 2.0, January 2013.
ENISA 2013b: Bourgue, R., J. Budd, H. Homola, M. Wladenko, and D. Kulawik. Detect,
SHARE, protect: Solutions for improving threat data exchange among CERTs,
October 2013.
ENISA 2015a: Bedrijfsrevisoren, D., J. De Muynck, and S. Portesi. Cyber security informa-
tion sharing: An overview of regulatory and non-regulatory approaches, final, v1.0,
December 2015.
ENISA 2015b: Moulinos, K., C. Karsberg, and M.A.C. Dekker. Proposal for Article 19
incident reporting-proposal for an incident reporting framework for eIDAS Article
19, 2015.
ENISA 2016a: Anna, S. and M. Konstantinos. Stocktaking, analysis and recommendations
on the protection of CIIs, January 2016.
ENISA 2016b: Tofan, D., K. Moulinos, and C. Karsberg. ENISA impact evaluation on the
implementation of Article 13a incident reporting scheme within EU, March 18, 2016, 5.
EU Documents
Communication from the Commission: A strategy for a Secure Information Society:
Dialogue, partnership and empowerment, COM (2006) 251 Final, May 31, 2006.
COM2006: Communication from the Commission on a European Programme for Critical
Infrastructure Protection, COM (2006) 786 Final, Brussels, December 12, 2006.
COM2013: Commission Staff Working Document, Executive summary of the impact
assessment, Strasbourg, SWD (2013) 31 Final, February 7, 2013.
European Commission, Creating a Safer Information Society by Improving the Security of
Infrastructures and Combating Computer-Related Crime, COM (2000) 890 Final,
January 26, 2001.
European Commission Communication from the Commission to the Council, the European
Parliament, the European Economic and Social Committee and the Committee of
the Regions on Network and Information Security: Proposal for A European Policy
Approach, Brussels, COM (2001) 298 Final, June 6, 2001.
Legal Implications of Information Sharing ◾ 311
JOIN2013: Joint Communication to the European Parliament, the Council, The European
Economic and Social Committee and the Committee of the Regions, ‘Cybersecurity
Strategy of the European Union: An Open, Safe and Secure Cyberspace’, Brussels,
JOIN (2013) 1 Final, February 7, 2013.
SWD2013: Commission Staff Working Document Impact Assessment accompanying the
document proposal for a Directive of the European Parliament and of the Council
on the protection of undisclosed know-how and business information (trade secrets)
against their unlawful acquisition, use and disclosure Brussels, SWD (2013) 471 Final,
November 28, 2013.
Art. 29 WP
Article 29 Working Party, Working Document Privacy on the Internet: An integrated EU
Approach to On-line Data Protection, WP 37, adopted on November 21, 2000.
Article 29 Working Party, Opinion 4/2007 on the concept of personal data, WP 136, June
20, 2007.
Article 29 Working Party, Opinion 1/2010 on the concepts of “controller” and “processor”,
00264/10/EN WP 169, February 16, 2010.
Regulation
Commission Regulation (EU) No 611/2013 of June 24, 2013 on the measures applica-
ble to the notification of personal data breaches under Directive 2002/58/EC of the
European Parliament and of the Council on privacy and electronic communications.
OJ L 173/5, June 26, 2013.
Council Directive 2008/114/EC of December 8, 2008 on the identification and designation
of European critical infrastructures and the assessment of the need to improve their
protection. OJ L 345/75, December 23, 2008.
Council of Europe, European Treaty Series-No. 185, Budapest, November 23, 2001,
Convention on Cybercrime/Budapest convention.
Directive 95/46/EC of the European Parliament and of the Council of October 24, 1995 on
the protection of individuals with regard to the processing of personal data and on the
free movement of such data. OJ L 281, November 23, 1995, pp. 31–50.
Directive 96/9/EC of the European Parliament and of the Council of March 11, 1996 on the
legal protection of databases.
Directive 2001/29/EC of the European Parliament and of the Council of May 22, 2001 on
the harmonisation of certain aspects of copyright and related rights in the information
society. OJ L 167, 2001, p. 10.
Directive 2002/21/EC of the European Parliament and of the Council of March 7, 2002
on a common regulatory framework for electronic communications networks and ser-
vices. OJ L 108, April 24, 2002, pp. 33–50.
Directive 2002/58/EC of the European Parliament and of the Council of July 12, 2002 con-
cerning the processing of personal data and the protection of privacy in the electronic
communications sector (Directive on privacy and electronic communications) OJ L
201, July 31, 2002 pp. 37–47.
Directive 2003/98 of November 17, 2003 on the re-use of public sector information [2003]
OJ L 345/90, amended in 2013 by Directive 2013/37/EU of June 26, 2013 amending
Directive 2003/98/EC on the re-use of public sector information [2013] OJ L 175/1.
312 ◾ Collaborative Cyber Threat Intelligence
Directive 2009/140/EC of the European Parliament and of the Council of November 25,
2009 amending Directives 2002/21/EC on a common regulatory framework for elec-
tronic communications networks and services, 2002/19/EC on access to, and intercon-
nection of, electronic communications networks and associated facilities, and 2002/20/
EC on the authorisation of electronic communications networks and services.
Directive 2013/40/EU of the European Parliament and of the Council of August 12, 2013
on attacks against information systems and replacing Council Framework Decision
2005/222/JHA. OJ L 218, August 14, 2013.
Directive (EU) 2015/2366 of the European Parliament and of the Council of November 25,
2015 on payment services in the internal market, amending Directives 2002/65/EC,
2009/110/EC and 2013/36/EU and Regulation (EU) No 1093/2010, and repealing
Directive 2007/64/EC.
Directive (EU) 2016/680 of the European Parliament and of the Council of April 27, 2016
on the protection of natural persons with regard to the processing of personal data by
competent authorities for the purposes of the prevention, investigation, detection or
prosecution of criminal offences or the execution of criminal penalties, and on the free
movement of such data, and repealing Council Framework Decision 2008/977/JHA.
Directive (EU) 2016/943 of the European Parliament and of the Council of June 8, 2016
on the protection of undisclosed know-how and business information (trade secrets)
against their unlawful acquisition, use and disclosure. OJ L 157, June 15, 2016, pp.
1–18.
Directive (EU) 2016/1148 of the European Parliament and of the Council of July 6, 2016
concerning measures for a high common level of security of network and information
systems across the Union. OJ L 194, July 19, 2016.
Regulation (EU) No 910/2014 of the European Parliament and of the Council of July 23,
2014 on electronic identification and trust services for electronic transactions in the
internal market and repealing Directive 1999/93/EC.
Case Law
CJEU Judgement Case C-70/10, November 24, 2011 (Scarlet SABAM),
ECLI:EU:C:2011:771.
CJEU Judgement Case C-582/14, October 19, 2016 (Breyer), ECLI:EU:C:2016:779.
Chapter 8
Implementation Issues
and Obstacles from
a Legal Perspective
Erich Schweighofer and Vinzenz Heussler
University of Vienna
Walter Hötzendorfer
Research Institute – Digital Human Rights Center
Contents
8.1 Introduction.............................................................................................. 314
8.2 Case Study 1: Distribution of Security-Relevant Information
Containing Personal Data and Anonymization......................................... 315
8.2.1 Case Description............................................................................ 315
8.2.2 I ntroduction.................................................................................. 315
8.2.3 L egal Analysis—Data Protection Law........................................... 315
8.2.4 L egal Analysis—Information Duties.............................................320
8.2.4.1 G eneral Data Protection Regulation................................320
8.2.4.2 T elecommunication Framework Directive.......................321
8.2.4.3 eIDAS Regulation...........................................................322
8.2.4.4 N IS Directive..................................................................322
8.2.4.5 O ther Reporting Obligations...........................................323
8.2.5 C onclusion.....................................................................................323
8.3 Case Study 2: Harm to Reputation of Third Parties..................................324
8.3.1 Case Description............................................................................324
313
314 ◾ Collaborative Cyber Threat Intelligence
8.3.2 Introduction..................................................................................324
8.3.3 Legal Analysis—Criminal Law......................................................325
8.3.4 Legal Analysis—Civil Law............................................................325
8.3.5 Conclusion.....................................................................................327
8.4 Case Study 3: Information Leakage of Threat Intelligence,
Incident Data, and Status Data.................................................................328
8.4.1 Case Description............................................................................328
8.4.2 Introduction..................................................................................328
8.4.3 Legal Analysis—IP Address Leakage.............................................328
8.4.4 Legal Analysis—Product Vulnerability Leakage............................334
8.4.5 Conclusion.....................................................................................336
8.5 Case Study 4: Harm due to Disproportionate Mitigation Measures..........337
8.5.1 Case Description............................................................................337
8.5.2 Introduction..................................................................................337
8.5.3 Legal Analysis—Network and Information Security
Legislation����������������������������������������������������������������������������������� 340
8.5.4 Legal Analysis—Self-Defense....................................................... 343
8.5.5 Conclusion.................................................................................... 344
8.6 Case Study 5: Legal Implications of the Involvement of Service
Providers.............................................................................................345
8.6.1 Case Description............................................................................345
8.6.2 Introduction..................................................................................345
8.6.3 Legal Analysis—Trade Secret Legislation......................................347
8.6.4 Legal Analysis—Notification Duty...............................................349
8.6.5 Conclusion.....................................................................................350
List of Abbreviations.......................................................................................... 351
References.......................................................................................................... 351
8.1 Introduction
The role of criminal justice in fighting cybercrime remains insufficient, and preven-
tion and mitigation have always been effective means to counteract crime. In particu-
lar, as already discussed in Chapter 4, the sharing of information regarding critical
information infrastructure and potential cyber threats (CT) remains an essential part
of a successful strategy. Operators must be supported in increasing cybersecurity.
Collecting information about potential cyber threats helps authorities gain
critical information about the national risk situation and potential threat scenarios.
Whereas cyber threat intelligence information should be free and available to all, in
practice, many restrictions make sharing of information difficult (refer to the descrip-
tion of legal and indirect barriers in Chapter 7). While information not containing
personal data, trade secrets, copyrighted materials, or restricted information can be
shared with everybody, such as news distributed worldwide, it is obvious that infor-
mation about fighting against cyber threats rarely fits into this category. Information
Implementation Issues and Obstacles from a Legal Perspective ◾ 315
about the existence of a threat may be shared but not its details. Strategies against
cyber threats and information security may be restricted information or contain trade
secrets. Thus, the balancing between needs of sharing for avoiding danger—in partic-
ular for third parties—and keeping confidentiality requires high sensibility and care.
8.2.2 Introduction
The first question regarding this case study is whether the IP address exchanged
is personal data under data protection law, which would entail that the provisions
of data protection law would apply to the exchange of the IP address. Notice that
applying anonymization or pseudonymization of the IP address is not an option in
this case study because the IP address is only useful if it is shared in plain numbers
(Cormack, 2016, p. 281). The value of the information lies in knowing the specific
IP address of the command and control server (C&C server) in order to be able to
detect incoming or outgoing traffic with this server and/or to block it, etc.
1 Directive 95/46/EC of the European Parliament and of the Council of October 24, 1995 on
the protection of individuals with regard to the processing of personal data and on the free
movement of such data, OJ L 281, 23.11.1995, pp. 31–50.
316 ◾ Collaborative Cyber Threat Intelligence
In its recent case Breyer 2 (refer to Chapter 7 for a more extensive description
of the case), the European Court of Justice (ECJ) had to decide on the question
“whether Article 2(a) of Directive 95/46 must be interpreted as meaning that a
dynamic IP address registered by an online media services provider when a person
accesses a website that that provider makes accessible to the public constitutes,
with regard to that service provider, personal data within the meaning of that
provision.”3 The court came to the conclusion that the dynamic IP address consti-
tutes personal data in relation to that provider, “where the latter has the legal means
which enable it to identify the data subject with additional data which the internet
service provider (ISP) has about that person.”4
This means that, first, for answering the question whether a piece of informa-
tion is personal data, a subjective view has to be taken, i.e., the view of the data
holder, and that the answer can be different for different data holders. Second, data
is personal data for a data holder not only if information enabling the identification
of the data subject is in the hands of the data holder, but also if the data holder can
obtain that information with the assistance of other persons.
From this it can be concluded that, generally, an IP address can constitute personal
data. Does this apply also to the particular IP address in this case study? This would
require a relation of the IP address to a particular natural person and that the entities in
question that share the IP address do have legal means enabling them to identify this
person. One important difference in the Breyer case is that the IP address is not that
of a client but of a server. The obvious relation of the IP address of a server to a natural
person is the relation to the server’s owner or operator. In general, a means to iden-
tify this natural person would be a Domain Name System (DNS) reverse lookup to
determine the domain name associated with that IP address—if any—and to use the
WHOIS protocol to determine the owner of that domain. If this led to an identified
natural person, the particular IP address in question would constitute personal data.
The same is true if another lawful way to establish a relation between the IP address
of the server in question and the owner or operator of the server can be found. In this
case, the question is whether data protection law allows the sharing of the IP address,
considering the right to data protection of the operator of a command and control
server on the one hand and the safety of potential victims of a malicious botnet oper-
ated by that command and control server or of the public on the other hand.
However, regarding a command and control server of a botnet, the server opera-
tor has strong motivation to prevent the establishment of a link between him or
her and the IP address of the server. Either the IP address would simply not be
associated with a domain name so that the relation cannot be established as it was
described above or the operator would misuse the server of a third entity to run the
command and control server software.
Hence, besides the case described previously where a relation between the IP
address and the operator of the command and control server can be established, we
have to distinguish two more cases: one in which practically no relation between the
IP address and a natural person can be established and the other in which a relation
between the IP address and a third person can be established who is him-or herself
a victim as being the owner or operator of the server that is misused by the attacker.
Consequently, in the following, we distinguish the following three cases:
1. Relation between the IP address and the malicious operator of the server
2. Practically no relation between the IP address and a natural person
3. Relation between the IP address and a third person
In contrast to the first case outlined previously, where a relation between an IP address
and an attacker can be established, in the second case, it is, by any means reasonably
likely to be used (cf. recital 26 of the General Data Protection Regulation (GDPR)5),
not possible to establish a relation between the IP address and a natural person, and
therefore the particular IP address would not constitute personal data. The important
issue here is that in practice it is not immediately clear whether, by any means reason-
ably likely to be used, such a relation between the IP address and a natural person can
be established or not. The entity willing to share the IP address would have to try and
find such a relation. If it fails to do so this does not necessarily mean that it is impos-
sible. In that sense, the burden of proof that the shared IP address does not constitute
personal data practically lies upon the entity that shares the address.
In the third case, where a relation between the IP address in question and a third per-
son can be established, the IP address clearly constitutes personal data. Here, unlike in the
first case, the interests of potential victims of the command and control server have to be
balanced with the interests of a third person who is in the position of a victim (Figure 8.3).
Let us consider the first case (Figure 8.1), where a relation between the IP address
and the operator of the command and control server can be established. Here, the
sharing of the IP address constitutes processing of personal data of the operator of
the server. For doing so, a legal basis is required, which can be laid down in EU law
or in Member State law (Art. 6 Sec. 3 GDPR). Such a statutory legal basis can be
found particularly in reporting obligations, which will be discussed below. First,
the general situation is considered, where such an explicit statutory legal basis for
the processing by the specific data controller in question does not exist.
Pursuant to Art. 6 Sec. 1 (f) GDPR, processing is lawful if it is necessary for
the purposes of the legitimate interests pursued by the controller, except where such
5 Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016
on the protection of natural persons with regard to the processing of personal data and on
the free movement of such data and repealing Directive 95/46/EC (General Data Protection
Regulation), OJ L 119, 4.5.2016, pp. 1–88. For an overview on GDPR see Paal and Pauly
(2017) and Knyrim (2016).
318 ◾ Collaborative Cyber Threat Intelligence
Malicious
operator
“Warning: C&C server
IP 131.130.1.xyz”
Private Private
entity entity
(e.g., CSIRT A) (e.g., CSIRT B)
C&C server
IP 131.130.1.xyz
DDoS
Victim server
Botnet
interests are overridden by the interests or fundamental rights and freedoms of the
data subject (Art29WP 2014). Hence, a balancing test of these interests has to be
conducted (Cormack, 2016, p. 271).
According to recital 49 GDPR the “processing of personal data to the extent
strictly necessary and proportionate for the purposes of ensuring network and infor-
mation security, i.e. the ability of a network or an information system to resist, at
a given level of confidence, accidental events or unlawful or malicious actions that
compromise the availability, authenticity, integrity and confidentiality of stored
or transmitted personal data, and the security of the related services offered by,
or accessible via, those networks and systems, by public authorities, by Computer
Security Incident Response Teams (CSIRTs), also known as Computer Emergency
Response Teams (CERTs), by providers of electronic communications networks
and services and by providers of security technologies and services,” constitutes
such a legitimate interest of the data controller concerned.
It can be argued that the interests of the operator of a command and control
server that would potentially harm the parties exchanging the IP address cannot
override their legitimate interests to share this information in order to protect them-
selves. Therefore, in this case, the exchange of the IP address is lawful under Art.
6 Sec. 1 (f) GDPR. However, this is restricted to the transfer of data to recipi-
ents located within the EU. As explained in Chapter 7, according to Art. 44 et
seq. GDPR for the transfer of personal data to recipients located outside the EU
Implementation Issues and Obstacles from a Legal Perspective ◾ 319
Private Private
entity entity
(e.g., CSIRT A) (e.g., CSIRT B)
C&C server
IP 131.130.1.xyz
DDoS
Victim server
Botnet
Private Private
entity entity
(e.g., CSIRT A) (e.g., CSIRT B)
C&C server
IP 131.130.1.xyz
DDoS
Victim server
Botnet
controller pursuant to Art. 6 Sec. 1 (f) GDPR. However, in this case it is much
more difficult to answer whether these interests of the controller are outweighed by
the interests or fundamental rights and freedoms of the data subject. But still, it can
be argued that the IP address of a server on the Internet is a piece of information
deserving a relatively low level of protection whereas the exchange of the IP address
in order to mitigate the risk stemming from the command and control server is an
important interest (cf. recital 49 GDPR); hence, the interests of the data subject do
not outweigh the interests of the processor in this case.
risk to the rights and freedoms of natural persons. Risk assessment shall take into
account physical, material, and nonmaterial damage such as loss of control over
their personal data or limitation of their rights, discrimination, identity theft or
fraud, financial loss, unauthorized reversal of pseudonymization, damage to repu-
tation, loss of confidentiality of data protected by professional secrecy, any or other
significant economic or social disadvantage to the natural person concerned (see
recital 85 GDPR).
In the event of such a personal data breach the controller has to notify the
supervisory authority (Data Protection Authority) without undue delay. When the
personal data breach is likely to result in a high risk to the rights and freedoms of
natural persons, the controller shall also communicate the personal data breach to
the data subject without undue delay (Art. 34 GDPR). However, it seems unlikely
that the exchange of an IP address of the command and control server of a botnet
would be related to a personal data breach. In addition, the minimum content of a
notification under these obligations is laid down in Art. 33 Sec. 3 and Art. 34 Sec.
3 GDPR and does not include information on the cause of the data breach such as
information on the attacker (if applicable), on the modus operandi, on a possible
vulnerability that was exploited, etc. Therefore, it can be concluded that there is
no overlap between the scenario in this case study and the data breach notification
obligations laid down in the GDPR. The obligation under this regime would not
encompass the exchange of an IP address or other personal data of third parties.
6 Directive 2009/140/EC of the European Parliament and of the Council of November 25, 2009
amending Directives 2002/21/EC on a common regulatory framework for electronic commu-
nications networks and services, 2002/19/EC on access to, and interconnection of, electronic
communications networks and associated facilities, and 2002/20/EC on the authorization of
electronic communications networks and services, OJ L 337, 18.12.2009, pp. 37–69.
7 Directive 2002/21/EC of the European Parliament and of the Council of March 7, 2002
8 Regulation (EU) No 910/2014 of the European Parliament and of the Council of July 23, 2014
on electronic identification and trust services for electronic transactions in the internal market
and repealing Directive 1999/93/EC, OJ L 257, 28.8.2014, pp. 73–114.
9 Directive (EU) 2016/1148 of the European Parliament and of the Council of July 6, 2016
concerning measures for a high common level of security of network and information systems
across the Union, OJ L 194, 19.7.2016, pp. 1–30.
Implementation Issues and Obstacles from a Legal Perspective ◾ 323
handling of the notification. Such information may be, e.g., information that could
be useful for the effective management of the security incident.
The competent authority or the CSIRT may also inform the public of individ-
ual security incidents. However, this information is dependent on a concrete added
value for the public. The competent authority or the CSIRT may only inform the
public if it is necessary to raise awareness on the prevention of incidents or to deal
with the current incident. The reporting operator must be consulted.
The regulation does not stipulate the content of a notification under this regime.
It is upon the national legislators to define that more specifically in the national
legislation which is going to be enacted in the ongoing process of the transposition
of the NIS Directive into national law. It would be very important for effective
cybersecurity that national legislators add reasonable legal bases for the exchange of
threat information including, if necessary for the specific purpose, personal data,
to this new legislation. This should cover both the notification of threat informa-
tion to the competent authorities and the exchange of threat information between
(potentially) affected private parties as in this case study.
8.2.5 Conclusion
Coming back to the scenario of the case study, to conclude, it can easily be the case
that the IP address has to be considered personal data to which data protection law
10 Directive (EU) 2015/2366 of the European Parliament and of the Council of November
25, 2015 on payment services in the internal market, amending Directives 2002/65/EC,
2009/110/EC and 2013/36/EU and Regulation (EU) No 1093/2010, and repealing Directive
2007/64/EC, OJ L 337, 23.12.2015, pp. 35–127.
324 ◾ Collaborative Cyber Threat Intelligence
applies. In most cases the exchange of the IP address in this scenario will be lawful,
either because in specific instances there exists a reporting obligation or—more
likely when the recipient of the information is a private entity—because carefully
considering the interests of the parties involved leads to the conclusion that the
interest for sharing the information outweighs the interests of the data subject.
However, it should be very clear beforehand on what legal basis a specific exchange
of data is performed as the consequences of a violation of the GDPR can be severe.
In contrast to the current legal situation, a violation of the provisions of the GDPR
results in fines up to 20 million EUR or up to 4% of the annual turnover achieved
by companies, whichever is higher (Art. 83 Sec. 5 GDPR). National penal provi-
sions also apply.
“Warning: product
vulnerability”
Operator,
manufacturer or CSIRT Other entity
developer (or the public)
Product vulnerability
(actually existing)
8.3.2 Introduction
The key characteristic of this case study is that the information concerned is true.
Therefore, as will be described below in more detail, most legal provisions in ques-
tion do not apply because they penalize only situations where knowingly false
information is spread. The relevant problem therefore in this case study is similar
to what is known as responsible disclosure in computer security and hacker ethics.
For example, the policy of the CERT Coordination Center (CERT/CC) states that
vulnerabilities reported to it are forwarded to the affected vendors “as soon as prac-
tical” but are disclosed to the public only 45 days after the initial report (CERT/CC
2017). This gives the vendor time to respond adequately and ideally fix the vulner-
ability before it becomes known to the public. The 45-day period can be shortened
or extended due to “[e]xtenuating circumstances, such as active exploitation, threats
of an especially serious (or trivial) nature, or situations that require changes to an
established standard” (CERT/CC 2017).
This should be kept in mind when reading the following legal analysis. Law is
not the only and oftentimes not the most important factor to determine how to
behave in a certain situation. Nevertheless, this is a chapter on the legal situation.
What follows is a legal analysis on the example of Austrian criminal and civil law.
Since criminal and civil law are not harmonized in the EU it is not possible to
present an analysis that is applicable in all EU Member States. However, the funda-
mental principles discussed in the following will hold for most EU Member States.
reputation can be claimed in two different forms. Sec. 1330 para. 2, like the crimi-
nal provisions described above, is applicable only when false information is spread.
Sec. 1330 para. 1 protects the dignity of a person and applies when a person’s honor
is insulted either by pejorative value judgments or by a factual claim (true fact)
(Welser and Zöchling-Jud, 2015, p. 415). However, the spreading of a legitimate
information of a product vulnerability (true fact) cannot insult a person’s honor in
a way that dignity is affected.
Another field of law that could be applicable to this case study is competi-
tion law, in particular Sec. 7 or Sec. 1 Federal Act against Unfair Competition.
However, neither applies. Sec. 7 does not apply because this provision only
applies when the information in question is not true; Sec. 1 does not apply
because a legitimate disclosure of an existing product vulnerability cannot con-
stitute an unfair business practice. In addition, the entity spreading the vulner-
ability information and the manufacturer of the product concerned are not in
competition with each other, which is another requirement for the applicability
of competition law.
A practical problem in this context should be noted: While in this hypothetical
case study it is known for sure that the information concerned is true, in practice
truth of information can be contested. In some cases, it can be difficult to prove
that particular vulnerability information is true, and under most of the relevant
provisions in this regard the burden of proof lies with the person that spreads the
information. This is another reason that responsible disclosure as described above is
recommendable because by getting in touch with the affected vendor the existence
of the claimed vulnerability can be confirmed or ruled out.
Further legal issues need to be considered when the CSIRT, cyber situation
center, or competent authority that shares the information is a public authority.
Under several constitutional systems—like the Austrian—a legal basis is required
for every act by a public authority that interferes with the rights of a legal entity.
The sharing of a product vulnerability is such an act that interferes with the legally
protected reputational and financial interests of the manufacturer, and therefore a
statutory legal basis is required pursuant to Art. 18 para. 1 of the Austrian Federal
Constitutional Law. This may differ largely from country to country depending
on the particular legal tradition, but in the Austrian example the case would be
unlawful unless a legal provision exists that permits the sharing of the vulnerability
information by the respective authority.
So far the legal analysis assumed that the CSIRT and the company affected
by the product vulnerability have not entered into a contract as this is the situa-
tion found in most cases. Where there is no contract, the affected company must
try to seek indemnification inter alia based on the legal grounds described above.
However, a contract between the CSIRT and the company might exist. According
to the NIS Directive, one of the tasks of CSIRTs is to establish cooperative rela-
tionships with the private sector (Annex I (2) (b) NIS Directive). To facilitate
such cooperation, CSIRTs shall promote the adoption and use of common or
Implementation Issues and Obstacles from a Legal Perspective ◾ 327
8.3.5 Conclusion
As it turns out, the spreading of true information about a third party encounters
only very limited restrictions under general criminal and civil law. This holds at
least under Austrian law when the information is spread by a private entity. The
legal principles described here on the example of Austrian criminal and civil law
will be very similar in other jurisdictions and hence the conclusion will be very
similar in most EU Member States. However, nothing can be said about specific
provisions regulating this scenario in different Member States, in particular when
the CSIRT, cyber situation center, or competent authority that shares the informa-
tion is a public authority as discussed in the last section above.
It should also be noted it was assumed here that the CSIRT, cyber situation
center, or competent authority does not underlie any contractual restrictions,
nondisclosure agreements (NDA) or the like imposed by the entity from which
the information stems. Such restrictions, of course, would override the gen-
eral legal situation described here. See case study 3 for a similar scenario where
an NDA is involved and also case study 5, which deals with vulnerabilities as
trade secrets.
Finally, it should be stressed again, while there are hardly any legal boundar-
ies for spreading correct information, that such information should, nevertheless,
328 ◾ Collaborative Cyber Threat Intelligence
8.4.2 Introduction
First of all, it must be noted that this case study deals with information leakage
whilst case study 2 elaborates on the legal consequences of informing certain enti-
ties or the public as a whole. The act of informing carried out by a CSIRT must be
understood as a “conscious” act that was intentional. In contrast, there is no such
intentional act when it comes to information leakage. An information leakage may
be the result of a cyber attack or the misconduct of a civil servant or employee.
Hence, one should bear in mind that the CSIRT is a victim itself.
When dealing with the legal consequences of an information leakage in general,
certain differentiations must be made first. For instance, the legal consequences
may vary depending on whether the CSIRT is a public or a private entity. Since
the NIS Directive stipulates in Art. 9 Sec. 1 that a CSIRT may be established
within a competent authority, it is up to the national legislator whether a CSIRT
is established as a public or a private entity. To give a comprehensive legal analysis,
information leakage in both public and private CSIRTs will be treated.
“C&C server
“C&C server IP 131.130.1.xyz”
IP 131.130.1.xyz”
ka
Le
Victim CSIRT
C&C server Other entity
IP 131.130.1.xyz (or the public)
IP IP
DDoS
Victim server
Botnet
Apart therefrom, an information leakage may also trigger the notification duty
according to Art. 34 GDPR, obliging the controller to communicate the personal
data breach to the data subject (i.e., the natural person to whom the personal data
relates) without undue delay (see case study 1). The knowledge about the personal
data breach should allow the data subject to take the necessary precautions (recital
86 GDPR). Therefore, the communication should describe the nature of the per-
sonal data breach as well as recommendations for the natural person concerned to
mitigate potential adverse effects (see Art. 34 Sec. 2 GDPR). Here, too, the notifi-
cation duty is only triggered when the personal data breach is likely to result in a
high risk to the rights and freedoms of natural persons. Since this only applies to
natural persons, the leakage of an IP address is unlikely to entail such high risk.
Communication to the affected data subjects should be made as soon as reasonably
feasible and in close cooperation with the supervisory authority, respecting guid-
ance provided by it or by other relevant authorities such as law-enforcement author-
ities. For example, the need to mitigate an immediate risk of damage would call for
prompt communication with data subjects whereas the need to implement appro-
priate measures against continuing or similar personal data breaches may justify
more time for communication (recital 86 GDPR). The supervisory authority will
also have the corrective power to order the controller to communicate a personal
data breach to the data subject (Art. 58 Sec. 2 (e) GDPR). The communication to
the data subject is not required if it would involve disproportionate effort. In such
a case, a public communication or similar measure—whereby the data subjects are
informed in an equally effective manner—is sufficient (Art. 34 Sec. 2 (c) GDPR).
The case of the IP address could trigger this exemption because it could turn out to
be a disproportionate effort to determine the identity of the data subject “behind”
the IP address. However, such an announcement must not itself contain personal
data protected by data protection law. To publicly communicate an IP address that
is part of an ongoing attack would have a more negative impact on the data subject
than the initial breach.
Certain infringements of the GDPR are subject to administrative fines that
may be imposed by the supervisory authority (Art. 58 Sec. 2 (i) and Art. 83 Sec.
1 GDPR). Infringements of the obligation to report a personal data breach to the
supervisory authority (Art. 33 GDPR) as well as of the obligation to communi-
cate a personal data breach to the data subject (Art. 34 GDPR) can be sanctioned
with administrative fines up to 10 million EUR, or in the case of an undertaking,
up to 2% of the total worldwide annual turnover of the preceding financial year,
whichever is higher (Art. 83 Sec. 4 (a) GDPR). The imposition of administrative
fines must in each individual case be effective, proportionate, and dissuasive (Art.
83 Sec. 1 GDPR). When deciding whether to impose an administrative fine and
deciding on the amount of the administrative fine, the supervisory authority must
take due regard of the parameters listed in Art. 83 Sec. 2 GDPR.
The GDPR also stipulates a right to compensation and liability in Art. 82.
Any person who has suffered material or nonmaterial damage as a result of an
Implementation Issues and Obstacles from a Legal Perspective ◾ 331
infringement of the GDPR has the right to receive compensation from the control-
ler (or processor) for the damage suffered (Art. 82 Sec. 1 GDPR). Thereby, any
controller involved in processing is liable for the damage caused by processing that
infringes the GDPR (Art. 82 Sec. 2 GDPR). However, a controller is exempt from
liability if it proves that it is not in any way responsible for the event giving rise to
the damage (Art. 82 Sec. 3 GDPR).
At this point, it is necessary to examine whether it makes a difference in the
legal consequences if the information leakage is caused by a cyber attack or the
misconduct of a civil servant or employee. Information lost due to a cyber attack
puts the question of the CSIRTs’ culpability on the measures (not) taken against
outside intruders, whereas information loss as the consequence of misconduct of a
civil servant or an employee puts the focus on the internal security measures.
Because a CSIRT is dealing with potentially highly sensitive security-rele-
vant information on a daily basis, it should be regarded as an attractive poten-
tial victim of cyber attacks. High-profile cyber attacks (refer to the numerous
scenarios in Chapter 2) are usually performed by “outsiders,” meaning that the
actual delinquents are not active or former employees of the attacked organiza-
tion. Motives, goals, and background of the cyber attacker are not important
for further elaboration. Thus, the attacker in this scenario may act on behalf of
a competing (foreign) company or may just be an ordinary criminal seeking to
blackmail a company. In this example, the cyber attack targets the computer sys-
tems and networks by installing spyware on the PC of an employee of the CSIRT
with the intent to obtain valuable information (refer to Chapter 2 for more
details on data exfiltration). Such malicious acts must be considered illegal in at
least the 52 states11 which ratified or accessed the Convention on Cybercrime of
the Council of Europe (CETS No. 185, see Chapter 7), known as the Budapest
Convention, that was agreed on in 2001. According to the Conventions’ Chapter
II (Measures to be taken at the national level) Sec. 1 (Substantive criminal law)
Title 1 (Offences against the confidentiality, integrity and availability of com-
puter data and systems) Art. 2, the parties must adopt legislative and other
measures to make access to a computer system without right, when commit-
ted intentionally, a criminal offence under its domestic law (“Illegal access”).
In Austria, e.g., Art. 2 was implemented in § 118a Austrian Criminal Code12
and in Belgium in Art. 550bis Strafwetboek. Chapter II Sec. 1 Title 1 Art. 3 of
the Budapest Convention prohibits the interception without right of nonpublic
transmissions of computer data to, from, or within a computer system. Art 3
was implemented in § 119a Austrian Criminal Code and in § 202b German
(2009); for the legal situation in Germany, see Hilgendorf and Valerius (2012).
332 ◾ Collaborative Cyber Threat Intelligence
Criminal Code. Illegal access as well as illegal system and data interference had
to be implemented into national criminal law not only because of the Budapest
Convention but also in regard to the Council Framework Decision 2005/222/
JHA of 24 February 2005 on attacks against information systems13 that was
replaced by the Directive 2013/40/EU14 (Cybercrime Directive 2013/40/EU)
(refer to Chapter 7). Thus, the installer of spyware on the PC of an employee
of a CSIRT with the intent to obtain data is, at least in Europe, committing a
criminal offence. However, the prosecution of such criminal offences will prove
very hard (if not impossible, see Chapter 2). Very often, it is not possible to
attribute the attack to a specific machine and to find the actual perpetrator;
even if it is possible, the perpetrator might be based in a jurisdiction outside the
EU where the enforcement of claims might be very difficult. Hence, a company
negatively affected by a leak from a CSIRT in the course of a cyber attack will
try to seek indemnification from the CSIRT. The CSIRT is itself a victim of
the cyber attack. Consequently, a CSIRT can only be blamed if it didn’t take
adequate security measures with regard to the given risks. As mentioned above,
a CSIRT should be regarded as an attractive victim of cyber attacks because it
is dealing with potentially highly sensitive security-relevant information that is
valuable to the owner of the information and, thus, to blackmailers. The pro-
cessing of information on risks and incidents within a CSIRT and the sharing
thereof with other CSIRTs, authorities, and stakeholders might require the pro-
cessing of personal data. Hence, such processing must comply with data security
requirements imposed by data protection law. The Data Protection Directive
contains provisions concerning the security of processing stipulating that the
controller must implement appropriate technical and organizational measures
to protect personal data against accidental or unlawful destruction or accidental
loss, alteration, and unauthorized disclosure or access, in particular where the
processing involves the transmission of data over a network, and against all
other unlawful forms of processing. Having regard for the state of the art and
the cost of their implementation, such measures must ensure a level of security
appropriate to the risks represented by the processing and nature of the data to
be protected. The GDPR regulates the security of personal data in Art. 32 stat-
ing that the controller and the processor must implement appropriate technical
and organizational measures to ensure a level of security appropriate to the risk,
thereby taking into account the state of the art, the costs of implementation,
and the nature, scope, context and purposes of processing as well as the risk of
varying likelihood and severity for the rights and freedoms of natural persons.
The GDPR further specifies that in assessing the appropriate level of security,
account shall be taken in particular of the risks that are presented by processing,
especially from accidental or unlawful destruction, loss, alteration, unauthor-
ized disclosure of, or access to personal data transmitted, stored, or otherwise
processed (Art. 32 Sec. 2 GDPR). There shall also be a process for regularly
testing, assessing, and evaluating the effectiveness of security measures (Art. 32
Sec.1 (d) GDPR). Summarizing, the data security provisions demand for secu-
rity measures that comprise technical as well as organizational measures, take
the state of the art into account and follow a risk-based approach. The security
measures should ensure an appropriate and not an “absolute” level of security.
If the CSIRT has taken appropriate measures and a data breach occurs none-
theless, the CSIRT cannot be held liable for the breach. Of course, the CSIRT
will have to act accordingly to comply with the duty to mitigate damages. If the
CSIRT fails to take appropriate measures and thereby contributes to the data
breach, it is at risk of being held liable. The nature and details of actions for dam-
ages vary depending on the legal system.
The kind of technical and organizational measures deemed to be appropriate spe-
cifically depends on various factors, as listed above, and must be assessed on a case-to-
case basis following a risk management approach. First of all, not all CTI is personal
data. IP addresses may qualify as personal data, but there is much less severity for
the rights and freedoms of natural persons when an IP address is leaked in contrast
to the leakage of special categories of personal data such as biometric or genetic data
(see Art. 9 GDPR). However, when assessing the likelihood of a security breach in
a CSIRT, special regard should be given to the fact that CSIRTs process potentially
highly sensitive security-relevant information that is valuable to its owner.
The loss of information as a result of misconduct of a civil servant or an employee
is a different form of security breach. Where a cyber attack asks the question of the
CSIRTs’ culpability on the measures (not) taken against outside intruders, infor-
mation loss as the consequence of misconduct of a civil servant or an employee puts
the focus on internal security measures.
The differentiation between a civil servant and an employee is due to the fact
that CSIRTs may be established within authorities (Art. 9 Sec. 1 NIS Directive).
The misconduct of an employee can be the result of various forms of misbehavior.
For instance, an employee may carelessly forget to encrypt sensitive information or
send it to the wrong recipient. On the other hand, an employee may copy sensi-
tive information on his own device and sell it to the best bidder. It is barely pos-
sible to preempt such security breaches because the human error potential can only
be minimized and never fully eliminated. To minimize the human error factor,
appropriate security measures must be taken. The GDPR, e.g., stipulates that the
controller and processor must take steps to ensure that any natural person act-
ing under their authority who has access to personal data does not process them
except on instructions from the controller (Art. 32 Sec. 4 GDPR). Instructing the
employees about their duties according to data protection law and the internal data
protection regulations, including data security regulations, may help to minimize
334 ◾ Collaborative Cyber Threat Intelligence
negligent conduct. Moreover, the right to operate data processing devices should
be specified and every device should be secured against unauthorized operation by
taking precautions.
Product vulnerability
(actually existing)
within an authority, the information leakage may violate the obligation of official
secrecy and, thus, allow for claims arising from possible public liability. In this
context, it is also worth mentioning that a CSIRT might also be established within
a security or military authority. Security or military authorities may deal with clas-
sified information and share classified information with certain nonstate actors.
International law, particularly in relation to NATO,15 and European law16 govern
the security rules of classified information. In particular, national laws implement-
ing such security rules17 may contain special duties of secrecy, information security
provisions, rules about access to and usage, transmission and disclosure of classified
information, and administrative and criminal penalties. It should be noted that a
CSIRT dealing with classified information must comply with such relevant appli-
cable legal provisions.
An employee abusing confidential information that has been entrusted to
or made accessible to him or her solely because of professional reasons will not
only commit an administrative and very likely even a criminal offence but will
also violate his or her employment contract and, if not included in the employ-
ment contract and signed separately, the NDA. A civil servant’s misconduct will
likely constitute criminal offences like abuse of authority or violation of official
secrecy.
The owner of leaked information seeking indemnification can claim dam-
ages from the employee. The nature and details of actions for damages vary
depending on the legal system. Also, there are differences in the type of dam-
age (material vs. immaterial damage; commercial or reputational damage) and
the cause of action. As elaborated above, there are various manifestations of
an employee’s misbehavior causing the information leakage. Depending on
whether the leakage was caused by slight or gross negligent behavior or commit-
ted deliberately, different administrative or criminal offences come into consid-
eration. The degree of fault will also influence the type of damage and the extent
of compensation claims.
Seeking indemnification from the CSIRT instead of the employee is another
possibility because the CSIRT may have to take responsibility for the employee’s
misbehavior depending on various circumstances. The admissibility, concrete
nature, and details of actions for damages vary depending on the legal system.
There will be a difference depending on whether the affected company and the
CSIRT have entered into a contract. For instance, an NDA between the company
and the CSIRT may contain a contractual penalty and a clause according to which
15 Agreement between the Austrian Federal Government and NATO on the protection of infor-
mation, Federal Law Gazette No. 18/1996.
16 For example, Council Decision of September 23, 2013 on the security rules for protecting EU
information (Information Security Act), Federal Law Gazette I No. 23/2002 as amended by
Federal Law Gazette I No. 10/2006.
336 ◾ Collaborative Cyber Threat Intelligence
the CSIRT has to take full responsibility for its employees. It must be considered
though that a CSIRT may inform the public about individual incidents, where
public awareness is necessary in order to prevent an incident or to deal with an
ongoing incident (Art. 14 Sec. 6 NIS Directive). Still, the interest of the public in
being informed about threats must be duly balanced with possible reputational
and commercial damages (recital 59 NIS Directive). Thus, an information leakage
not containing more information than the public was given by the CSIRT in a
balanced act and in accordance with the NIS Directive is unlikely to cause further
legal consequences.
8.4.5 Conclusion
The IP address of a command and control server is reported to a CSIRT. Such an
IP address may qualify as personal data according to data protection law. The leak-
age of personal data must be considered a personal data breach and, consequently,
a violation of data protection law.
An information leakage leading to a personal data breach may trigger the notifi-
cation duty to the supervisory authority (Art. 33 GDPR) as well as the obligation to
communicate the personal data breach to the data subject (Art. 34 GDPR). A viola-
tion thereof can be sanctioned with administrative fines. The GDPR also stipulates
a right to compensation and liability in Art. 82.
There is a difference in the legal consequences if the information leakage
is caused by a cyber attack or the misconduct of a civil servant or employee.
Information lost due to a cyber attack puts the question of the CSIRTs’ culpability
on the measures (not) taken against outside intruders, whereas information loss as
the consequence of misconduct of a civil servant or an employee puts the focus on
the internal security measure. A CSIRT can be held liable if it fails to take appro-
priate measures as required by data protection law and thereby contributes to the
personal data breach. The nature and details of actions for damages vary depend-
ing on the jurisdiction. An employee abusing confidential information that has
been entrusted to or made accessible to him or her solely for professional reasons
will not only commit an administrative and very likely even a criminal offence but
will also violate his or her employment contract and NDA. A civil servant’s mis-
conduct will likely constitute a criminal offence like abuse of authority or violation
of official secrecy. The owner of leaked information seeking indemnification can
claim damages from the employee. The nature and details of actions for damages
vary depending on the legal system. Seeking indemnification from the CSIRT
may also be a possibility as the CSIRT may have to take the responsibility for
the employee’s misbehavior depending on various circumstances. Here too, the
concrete nature and details of actions for damages vary depending on the jurisdic-
tion. There will also be a difference depending on whether the affected company
and the CSIRT have entered a contract containing specific rules or a contractual
penalty.
Implementation Issues and Obstacles from a Legal Perspective ◾ 337
8.5.2 Introduction
To deal with this case study properly, it must be asked first who is taking the
mitigation measure. The reason for posing this question lies in the legal basis and
consequences of the mitigation measure. Mitigation measures taken by military
entities may qualify as military defense measures with very different legal conse-
quences compared to the situation where “ordinary” civil enterprises take mitiga-
tion measures.
That being said, it must be determined on what legal basis mitigation measures
can or have to be taken. In this scenario, an IP address is blocked as a reaction to
a DDoS attack.
In the course of a denial-of-service (DoS) attack (refer to Chapter 2 for more
details on such attacks), an attacker attempts to prevent legitimate users from
DDoS
Botnet within
131.130.1.xyz Webserver
accessing information or services. In the most common and obvious type of DoS
attack, the attacker overloads the server with requests to such an extent that the
server can no longer process the legitimate users’ requests. In a distributed denial-
of-service (DDoS) attack, the attack is “distributed” because the attacker is using
multiple computers, usually from multiple exploited owners, to launch the denial-
of-service attack (McDowell, 2009). A company’s computers that have been
infected by a botnet become part of such a botnet.
In the case of a DDoS attack, there are two possible ways of being a victim. The
attacker uses the exploited companies’ computers to attack victim computers by
forcing the exploited companies’ computers to send huge amounts of requests to a
victim website or send spam to particular email addresses. This makes the company
who owns the exploited machines, taken over by a botnet for instance, a victim.
However, in this scenario, a company is a victim of a DDoS attack in the sense
that its computers or network connections are targeted by mentioned botnet clients
so that its services are inaccessible, making the company the actual victim of the
DDoS attack. In the course of a DDoS attack, the attacker uses multiple computers
to launch the DDoS attack. This distribution of the attack thus forces the victim
company to deal with numerous, usually thousands of, IP addresses. In such a case,
this victim company may block the IP addresses of the exploited companies (where
the requests that amount to an attack come from) as mitigation to encounter the
information overload. The victim company may also request that ISPs block the IP
addresses on its behalf.
Notice, as outlined here, that in a DDoS attack the IP addresses are not
the attacker’s IP addresses. They are rather the address of exploited companies
or individuals who are also victims of this very same botnet operator—just
Implementation Issues and Obstacles from a Legal Perspective ◾ 339
in another role. By blocking their IP addresses, they are excluded from the
services provided by the victim company as a consequence of this particular
mitigation measure. It should also be noted that company clients usually share
IP addresses, which means that there are hundreds of computers that appear as
one IP address. If this particular IP address gets cut off or blocked, all of the
computers sharing this IP address get cut off or blocked too. By introducing
“rate limits,” the company will not be cut off but the quality of service may be
impaired.
In this regard, it must be considered that the legal consequences mainly
depend on the relationship between the providing company and the consumer of
the service as well as on the kind of service provided by the company. For instance,
if the service only consists of providing information about the company on a web-
site, the unavailability of this information due to exclusion does not infringe on
anyone’s right because there is no duty to provide information to anyone online
in general. However, if a company runs an online shop, certain information must
be provided directly and be permanently accessible according to Art. 5 Directive
2000/31/EC (Directive on Electronic Commerce 2000)18 (Zankl, 2016, p. 71).
Also, the Directive 2011/83/EU (Consumer Rights Directive, 2011)19 requires
that traders provide the consumer with certain information for distance contracts
(Hall et al., 2012, p. 142). When excluding particular IP addresses and, thereby,
consumers from accessing this information, the information is still permanently
accessible for the general public. Only those whose computers are part of a DDoS
attack are excluded. If the attacked company does not take any action to stop
DDoS attacks on their servers, the website will go down and no information can
be provided to anyone. Excluding certain IP addresses and, thereby, a certain
amount of (potential) consumers ensures that the information is available to the
general public. Most individual users have dynamic IP addresses, an excluded
individual user to whom a new IP address is allocated will, however, not neces-
sarily be able to access the website again because his or her computer is still part
of the botnet leading to the blocking of the newly allocated IP address. Still, if a
company is violating legal provisions or infringing someone’s rights by excluding
IP addresses, the company will be justified under the legal mechanism of self-
defense (see below).
As noted above, the legal consequences depend on the relationship between
the company that provides a service and the consumer. For example, a company
may provide cloud services to the consumer. In this case, the legal relationship
18 Directive 2000/31/EC of the European Parliament and of the Council of June 8, 2000 on certain
legal aspects of information society services, in particular electronic commerce, in the Internal Market
(Directive on electronic commerce), OJ L 178, 17.7.2000, pp. 1–16.
19 Directive 2011/83/EU of the European Parliament and of the Council of October 25, 2011 on consumer
rights, amending Council Directive 93/13/EEC and Directive 1999/44/EC of the European Parliament
and of the Council and repealing Council Directive 85/577/EEC and Directive 97/7/EC of the European
Parliament and of the Council, OJ L 304, 22.11.2011, pp. 64–88.
340 ◾ Collaborative Cyber Threat Intelligence
between the service provider and the service user is primarily defined by a con-
tract. Certain aspects of the service, including quality, availability, and responsi-
bilities are typically part of a service-level agreement (SLA). An SLA may define
the terms of mean time between failures (MTBF) and mean time to repair or
mean time to recovery (MTTR). If a DDoS attack on a cloud service is carried
out via a cloud user’s IP address, the cloud provider’s reaction must take into
account the contract and the SLA.
Getting back to the case where a company is victim of a DDoS attack, one of
the primary defense measures will be to block the “attacking” IP addresses of the
exploited companies. The question is if there is a legal basis to do so and if such
mitigation measures are proportionate.
apply to undertakings that are subject to the requirements of Art. 13a and 13b of
Directive 2002/21/EC (Framework).
related services offered by, or accessible via, those networks and systems) consti-
tutes a legitimate interest for providers of electronic communications networks and
services and providers of security technologies and services. This explicitly includes
stopping DoS attacks. Thus, ISPs as providers of electronic communications net-
works and services have a legitimate interest in processing “attacking” IP addresses
under (future) data protection law.
It must also be asked how long it is allowed to block IP addresses. Recital 49
GDPR states that the processing of personal data—here the IP addresses—consti-
tutes a legitimate interest to the extent strictly necessary and proportionate for the
purposes of ensuring network and information security. Hence, when it is no longer
necessary to process personal data in order to resist a DoS attack, there is no longer
a legitimate interest in doing so. An entry containing the “attacking” IP addresses
must be cleared when the network and information security can be ensured again.
When a company’s defense measure against a DDoS attack is to block the “attack-
ing” IP addresses, the company must after a reasonable amount of time—probably
a couple of hours—delist the blocked IP addresses to evaluate whether the attack
is still carried out and poses a threat to the network and information security. It
should also be taken into account that many IP addresses are dynamically assigned,
which is why “old” entries of once-attacking IP addresses should be cleared on a
regular basis.
Companies other than the entities listed in recital 49 GDPR cannot rely on
recital 49. According to Art. 6 Sec. 1 (f) GDPR, the processing of data is lawful
when the processing is necessary for the purposes of the legitimate interests pur-
sued by the controller or by a third party, except where such interests are overrid-
den by the interests or fundamental rights and freedoms of the data subject that
require protection of personal data, in particular where the data subject is a child.
Processing IP addresses to encounter a DDoS attack is necessary for the purposes
of the legitimate interest to ensure data, network, and information security, and
this interest is unlikely to be overridden by the interests or fundamental rights and
freedoms of the data subject.
8.5.5 Conclusion
In case of a cyber attack, various mitigation measures may be taken to react thereto.
The question arises as to what happens if mitigation measures do not only affect the
attacker. In the course of a DDoS attack, the botnet clients are usually owned not
by the attacker but by third parties. As a mitigation measure an attacked company
might block “attacking” IP addresses. Processing IP addresses therefore constitutes
a legitimate reason under data protection law. Also, data protection law requires
data security measures against DDoS attacks in particular to ensure the availability
and accessibility of personal data. Providers of essential services and digital service
providers under the NIS Directive must also take appropriate and proportionate
technical and organizational measures to protect the security of their network and
information systems and must prevent and minimize the impact of incidents affect-
ing the security of the network and information systems with a view to ensuring the
continuity of those services.
ISPs must take appropriate technical and organizational measures to appro-
priately manage the risks posed to security of networks and services according to
21 For further details see Momsen and Savic in Heintschel-Heinegg (2016), § 32.
22 For further details see Dennhardt in Bamberger and Roth (2016), § 227.
Implementation Issues and Obstacles from a Legal Perspective ◾ 345
the Framework Directive. Measures have to be taken to prevent and minimize the
impact of security incidents on users and interconnected networks. ISPs must also
take all appropriate steps to guarantee the integrity of their networks and thus
ensure the continuity of supply of services provided over those networks. ISPs that
block IP addresses on behalf of attacked companies or introduce “rate limits” or fil-
ter botnet traffic and traffic between botnet clients and the C&C server are obliged
to take such measures and act in accordance with the Framework Directive if the
measures are appropriate to the risk posed. It must not be forgotten that using the
networks of an ISP for the purpose of a DDoS attack constitutes a misuse of these
networks and, thus, undermines the integrity thereof and might threaten the con-
tinuity of supply of services provided over those networks.
In conclusion, the network and information security legislation requires in
particular providers of critical services and ISPs to take measures against cyber
attacks that pose a threat to their networks and information systems as well as
services provided using networks and information systems. Taking such mea-
sures will be justified under the network and information security legislation if
they are appropriate to the risks posed. Apart therefrom, mitigation measures
taken against cyber attacks such as DDoS attacks will be justified under self-
defense. Consequently, damages as a result of these mitigation measures cannot
be claimed.
8.6.2 Introduction
It is common that a company’s IT is run or maintained by an IT service provider.
The service provider becomes aware of incidents in customer’s IT infrastructure
sooner due to specialized knowledge and gained experience. It is indubitable that
the service provider must by contract mitigate risks and take action where necessary
to protect the customer’s IT. For that purpose, the service provider must assess risks
346 ◾ Collaborative Cyber Threat Intelligence
“Warning: Botnet
IP 131.130.1.xyz”
Service provider
Customer A Customer B
DDoS
Webserver
Victim server
Servers of Servers of
Customer A with IP customer B
131.130.1.xyz
based on knowledge about vulnerabilities. However, the scope and the details of
the service provider’s duties are the object of negotiation and may differ by what is
agreed on in a contract and particularly in the SLA. Still, it must be assumed that
as soon as a service provider has knowledge of a severe vulnerability, it is obliged to
mitigate the risk for its customer. Otherwise the service provider would not be tak-
ing actions to protect one of its customers despite better knowledge, which would
most likely lead to the service provider’s liability due to breach of contract.
The relevant question is what the service provider has to do or rather is allowed
to do when the knowledge about a vulnerability comes from the domain of another
customer. In this case, the service provider finds itself in the peculiar situation to
potentially breach one of the contracts, regardless of whether it decides to take
action or to refrain therefrom. For example, in the course of providing services to
customer A, the service provider becomes aware of IP addresses of botnet members
or spamming mail servers within the domain of customer A. Is it lawful to share
this information with customer B to mitigate risks for customer B?
Before sharing the information, the service provider should take any action
necessary to eliminate customer A’s vulnerability to avoid the conflict of interests
in the first place. If that’s not possible or feasible, the service provider must evaluate
what information cannot be shared because of legal barriers (refer to Chapter 7 for
more details on such legal barriers). In this case study, the information concerned
comprises IP addresses of botnet members.
As elaborated above, IP addresses may qualify as personal data protected by
data protection law (refer to case study 1 for more details). Thus, the service pro-
vider would need to make sure it is complying with data protection law when shar-
ing the IP addresses.
Although it is not illegal to unknowingly be part of a botnet—in fact the com-
pany is a victim itself—being part of a botnet is harmful to the reputation of a
company. Reporting thereof as an individual citizen would in most cases not have
any legal consequences because there are no false accusations made (refer to case
study 2 for more details). However, the service provider only became aware thereof
in the course of providing services to the customer and, therefore, the information
has not yet become public knowledge. When the service provider is not obliged
to confidentiality by contract, it might, depending on a nation’s contract law, be
obliged to confidentiality as a consequence of an accessory contractual obligation.
Another reason to keep such information confidential may lie in trade secret law.
1.
be secret in the sense that it is not generally known among or readily acces-
sible to persons within the circles that normally deal with the kind of infor-
mation in question,
23 For the Austrian legal situation with an excursion to the legal situation in the US, see
Schramböck (2002); for Germany, see Wolff (1997).
348 ◾ Collaborative Cyber Threat Intelligence
2.
have commercial value because it is secret, and
3.
have been subject to reasonable steps under the circumstances, by the person
lawfully in control of the information, to keep it secret.
24 Programs to reward security researchers for discovering vulnerabilities are run, e.g., by
Google (https://bughunter.withgoogle.com/; accessed March 23, 2017), Microsoft (https://
technet.microsoft.com/en-us/library/dn425036.aspx; accessed March 23, 2017) or Zerodium
(https://www.zerodium.com/program.html; accessed March 23, 2017).
Implementation Issues and Obstacles from a Legal Perspective ◾ 349
will avoid sharing any information that could be interpreted as revealing (parts of)
the trade secret or not keeping it reasonably secure. As a result, the service provider
and customer B would need to enter into a confidentiality agreement to keep the
vulnerability a trade secret and to achieve the consent of customer A.
when service providers notify incidents on behalf of their clients, meaning that the
Directives don’t inhibit notifications by service providers. Nevertheless, national
laws implementing the directives must provide the opportunity to do so. As there
is no Austrian national law implementing the NIS Directive yet,25 it is not clear
whether service providers will be able to notify incidents on behalf of their clients.
Regarding the notification duty of digital service providers, it must be considered
that Art. 16 Sec. 10 NIS Directive prohibits Member States to impose any further
security or notification requirements on digital service providers. Moreover, the
Commission may adopt implementing acts laying down the formats and proce-
dures applicable to notification requirements (Art. 16 Sec. 9).
Assuming that the national laws implementing the NIS Directive do not pre-
vent the transfer of the notification duty to service providers, it must be borne
in mind that the ultimate responsibility to notify the competent authority or the
CSIRT stays with the operators of essential services and the digital service provid-
ers. If the service provider fails the duty to notify, the penalties laid down pursuant
Art. 22 will be against the operators of essential services and the digital service
providers. If the company and the service provider agree by contract that the ser-
vice provider notifies the competent authority or the CSIRT in case of incidents,
the service provider is liable to indemnify the company. In any event, it is advisable
and most likely imperative that the company and its service provider cooperate in
incident situations and that they have proper and trained notification processes.
8.6.5 Conclusion
Generally, a service provider is obliged to mitigate the risks for its customers.
However, when the knowledge about a vulnerability in the IT comes from the
domain of another customer, a conflict of interest may arise. On the one hand, the
service provider must mitigate the risks for customer B who might be exposed to
the risk of a vulnerability in the domain of customer A, while on the other hand
this must not result in inadequate reputational harm for customer A. The service
provider might be obliged to confidentiality by contract. In the absence of a confi-
dentiality agreement, a legal obligation to confidentiality or not to harm customer
A in its reputation can arise as a consequence of an accessory contractual obligation
that, in detail, depends on domestic contract law. Furthermore, vulnerabilities may
qualify as trade secrets according to the Directive 2016/943 (Trade Secret Directive)
according to which the disclosure of a trade secret is unlawful when disclosed in
breach of a confidentiality agreement or any other duty not to disclose the trade
secret. In conclusion, customer A must consent to the disclosure of the trade secret.
In regard to the question of whether service providers can notify security inci-
dents to the competent authority or the CSIRT under the NIS Directive on behalf
of their clients, it must be noted that the plain text of the NIS Directive suggests
List of Abbreviations
Art. Article
C&C server Command and control server
CERT Computer Emergency Response Team
CERT/CC CERT Coordination Center
CJEU Court of Justice of the European Union
CSIRT Computer Security Incident Response Team
CT Cyber threat
CTI Cyber threat intelligence
DNS Domain Name System
ECJ European Court of Justice
EEA European Economic Area
EU European Union
GDPR General Data Protection Regulation
GRUR Gewerblicher Rechtsschutz und Urheberrecht
MMR MultiMedia und Recht
NJW Neue Juristische Wochenschrift
para. Paragraph
IoT Internet of Things
IP Internet Protocol
ISP Internet service provider
IT Information technology
SLA Service-level agreement
TFEU Treaty on the Functioning of the European Union
U.S. United States
References
Article 29 Data Protection Working Party
Article 29 Data Protection Working Party (Art29WP). 2014. Opinion 06/2014 on the
notion of legitimate interests of the data controller under Article 7 of Directive
95/46/EC, WP 217. http://ec.europa.eu/justice/data-protection/article-29/docu-
mentation/opinion-recommendation/files/2014/wp217_en.pdf (accessed March
11, 2017).
352 ◾ Collaborative Cyber Threat Intelligence
Books
Eisentraut, P. and A. Wirt. 2005. Mit Open Source-Tools Spam & Viren bekämpfen. Cologne,
Germany: O’Reilly. https://www.oreilly.de/german/freebooks/spamvirger/pdf/313-
318.pdf (accessed March 24, 2017), Beijing, Cambridge, Farnham, Köln, Paris,
Sebastopol, Taipei, Tokyo.
Hilgendorf, E. and B. Valerius. 2012. Computer-und Internetstrafrecht, 2nd edition. Berlin
and Heidelberg: Springer.
Knyrim, R. (ed.). 2016. Datenschutz-Grundverordnung. Vienna, Austria: Manz.
Paal, B. and D. Pauly. 2017. Datenschutz-Grundverordnung. Munich, Germany: Beck.
Reindl-Krauskopf, S. 2009. Computerstrafrecht im Überblick, 2nd edition. Vienna, Austria:
Facultas.
Schramböck, M. 2002. Der Schutz von Geschäfts-und Betriebsgeheimnissen mit Exkurs zur
Rechtslage in den USA. Vienna, Austria: Manz.
Welser, R. and B. Zöchling-Jud. 2015. Bürgerliches Recht. Band II: Schuldrecht Allgemeiner
Teil, Schuldrecht Besonderer Teil, Erbrecht, 14th edition. Vienna, Austria: Manz.
Zankl, W. 2016. E-Commerce-Gesetz. Vienna, Austria: Verlag Österreich.
Commentaries
Bamberger, H. and H. Roth. 2016. Beck’scher Online-Kommentar BGB, 41st edition (status
November 1, 2016). Munich, Germany: C.H. Beck.
Heintschel-Heinegg, B. 2016. Beck’scher Online Kommentar StGB, 33rd edition (status
December 1, 2016). Munich, Germany: C.H. Beck.
Höpfel, F. and E. Ratz. 2016. Wiener Kommentar zum StGB, 2nd edition (status October 1,
2016, rdb.at). Munich, Germany: C.H. Beck.
Journals
Cormack, A. 2016. Incident response: Protecting individual rights under the general data pro-
tection regulation. SCRIPTed, vol. 13 no. 3, 258–282, doi:10.2966/scrip.130316.258
(accessed March 11, 2017).
Hall E., G. Howells and J. Watson. 2012. The Consumer Rights Directive—An Assessment
of Its Contribution to the Development of European Consumer Contract Law.
European Review of Contract Law, vol. 8 no. 2, 139–166.
Kalbfus, B. 2016. Die EU-Geschäftsgeheimnis-Richtlinie. Welcher Umsetzungsbedarf
besteht in Deutschland? GRUR 2016, 1009.
Wendlandt, B. 2004. Europäische, deutsche und amerikanische Regelungen von E-Mail-
Werbung—Überlegungen zum Nutzen des CAN-SPAM Act. MMR 2004/06, 365–369.
Wolff, H. 1997. Der verfassungsrechtliche Schutz der Betriebs-und Geschäftsgeheimnisse.
NJW 1997, 98–101.
Reports/Studies/Websites/Miscellaneous
Banholzer, F., E.-M. Herring and H. Obex. 2010. Rechtliche Zulässigkeit von Blacklisting. Expert
Opinion. Münster. https://www.dfn.de/fileadmin/3Beratung/Recht/Stellungnahmen/
Final_Rechtliche_Zulaessigkeit_von_Blacklisting.pdf (accessed March 22, 2017).
Implementation Issues and Obstacles from a Legal Perspective ◾ 353
European Regulation
Council Decision of September 23, 2013 on the security rules for protecting EU classified
information (2013/488/EU). OJ L 274, October 15, 2013, pp. 1–50.
Council Directive 2008/114/EC of December 8, 2008 on the identification and designation
of European critical infrastructures and the assessment of the need to improve their
protection. OJ L 345, December 23, 2008, pp. 75–82.
Council of Europe, European Treaty Series-No. 185, Budapest, November 23, 2001,
Convention on Cybercrime/Budapest convention.
Council Framework Decision 2005/222/JHA of February 24, 2005 on attacks against infor-
mation systems. OJ L 69, March 16, 2005, pp. 67–71.
Directive 95/46/EC of the European Parliament and of the Council of October 24, 1995 on
the protection of individuals with regard to the processing of personal data and on the
free movement of such data. OJ L 281, November 23, 1995, pp. 31–50.
Directive 2000/31/EC of the European Parliament and of the Council of June 8, 2000 on cer-
tain legal aspects of information society services, in particular electronic commerce, in the
Internal Market (Directive on Electronic Commerce). OJ L 178, July 17, 2000, pp. 1–16.
Directive 2002/21/EC of the European Parliament and of the Council of March 7, 2002
on a common regulatory framework for electronic communications networks and ser-
vices. OJ L 108, April 24, 2002, pp. 33–50.
Directive 2009/140/EC of the European Parliament and of the Council of 25 November
2009 amending Directives 2002/21/EC on a common regulatory framework for elec-
tronic communications networks and services, 2002/19/EC on access to, and intercon-
nection of, electronic communications networks and associated facilities, and 2002/20/
EC on the authorisation of electronic communications networks and services. OJ L
337, December 18, 2009, pp. 37–69.
Directive 2011/83/EU of the European Parliament and of the Council of October 25, 2011
on consumer rights, amending Council Directive 93/13/EEC and Directive 1999/44/
EC of the European Parliament and of the Council and repealing Council Directive
85/577/EEC and Directive 97/7/EC of the European Parliament and of the Council.
OJ L 304, November 22, 2011, pp. 64–88.
Directive 2013/40/EU of the European Parliament and of the Council of August 12, 2013
on attacks against information systems and replacing Council Framework Decision
2005/222/JHA. OJ L 218, August 14, 2013, pp. 8–14.
354 ◾ Collaborative Cyber Threat Intelligence
Directive (EU) 2015/2366 of the European Parliament and of the Council of November 25,
2015 on payment services in the internal market, amending Directives 2002/65/EC,
2009/110/EC and 2013/36/EU and Regulation (EU) No 1093/2010, and repealing
Directive 2007/64/EC. OJ L 337, December 23, 2015, pp. 35–127.
Directive (EU) 2016/943 of the European Parliament and of the Council of June 8, 2016 on
the protection of undisclosed know-how and business information (trade secrets) against
their unlawful acquisition, use and disclosure. OJ L 157, June 15, 2016, pp. 1–18.
Directive (EU) 2016/1148 of the European Parliament and of the Council of July 6, 2016
concerning measures for a high common level of security of network and information
systems across the Union. OJ L 194, July 19, 2016, pp. 1–30.
Regulation (EU) No 910/2014 of the European Parliament and of the Council of July 23, 2014
on electronic identification and trust services for electronic transactions in the internal
market and repealing Directive 1999/93/EC. OJ L 257, August 28, 2014, pp. 73–114.
Regulation (EU) 2016/679 of the European Parliament and of the Council of April 27, 2016
on the protection of natural persons with regard to the processing of personal data and
on the free movement of such data, and repealing Directive 95/46/EC (General Data
Protection Regulation). OJ L 119, May 4, 2016, pp. 1–88.
National Regulation
Agreement between the Austrian Federal Government and NATO on the protection of infor-
mation, Federal Law Gazette No. 18/1996.
(Austrian) Criminal Code (Strafgesetzbuch, abbreviated StGB), Federal Law Gazette No.
60/1974, as amended.
(Austrian) Federal Act Against Unfair Competition (Bundesgesetz gegen den unlauteren
Wettbewerb, abbreviated UWG), Federal Law Gazette No. 448/1984, as amended.
(Austrian) Federal Law on the implementation of international obligations for the safe use of
information (Information Security Act), Federal Law Gazette I No. 23/2002.
(Austrian) Federal Constitutional Law (Bundes-Verfassungsgesetz, abbreviated B-VG), in the
version promulgated in 1930 (Federal Law Gazette No. 1/1930), last amended Federal
Law Gazette I No. 106/2016.
Belgium Penal Code (Wetboek van Strafrecht) of 8 June 1867, as amended.
Civil Code of Germany (Bürgerliches Gesetzbuch, abbreviated BGB) of August 18, 1896 in
the version promulgated on January 2, 2002, Federal Law Gazette I p. 42, 2909; 2003
I p. 738, as amended.
General Civil Code of Austria (Allgemeines Bürgerliches Gesetzbuch, abbreviated ABGB) of
January 1, 1812, last amended Federal Law Gazette I No. 43/2016.
German Criminal Code (Strafgesetzbuch, abbreviated StGB), in the version promulgated on
November 13, 1998, Federal Law Gazette I p. 3322, as amended.
Case Law
CJEU Judgement Case C-582/14, October 19, 2016 (Breyer), ECLI:EU:C:2016:779.
LG Lüneburg, September 27, 2007, 7 O 80/07: Wettbewerbswidrigkeit von IP-Blacklisting,
MMR 2008, 61 (with remarks by Heidrich).
Chapter 9
Real-World
Implementation of an
Information Sharing
Network: Lessons
Learned from the Large-
Scale European Research
Project ECOSSIAN
Giuseppe Settanni and Timea Pahi
Austrian Institute of Technology
Contents
9.1 Introduction..............................................................................................356
9.2 Overall Architecture and Technologies to Implement a National TI
Framework................................................................................................358
9.2.1 System Requirements.....................................................................359
9.2.1.1 S ystem and Architecture Requirements...........................359
9.2.1.2 Functional Requirements.................................................362
9.2.2 System Architecture...................................................................... 366
355
356 ◾ Collaborative Cyber Threat Intelligence
9.1 Introduction
In order to efficiently detect and counter modern targeted multistage cyber threats,
organizations must cooperatively exchange security-relevant information with each
other and the competent national authorities. By doing this, they can obtain broader
knowledge on the current cyber threat landscape and subsequently derive new secu-
rity insights regarding their infrastructures, hence be able to timely react if necessary.
National authorities responsible for the security of Network and Information
Systems (NIS), as set forth by the European NIS directive (European Commission,
2016), are to be established to collect cyber incident reports issued by Critical
Infrastructure (CI) providers. Such reports, describing critical security issues
Real-World Implementation of an Information Sharing Network ◾ 357
E-SOC
O-SOCAT_1 O-SOCAT_3
Energie AG ÖBB
O-SOCAT_2
Wien
Energie
revealed in the CI networks (cf. Chapter 5), have to be analyzed and correlated
by the responsible national NIS authority to establish national cyber-situational
awareness (cf. Chapter 6) to eventually provide coordinated support and mitigation
strategies to the affected organizations.
The ECOSSIAN1 research project proposes a pan-European three-layered
approach (Kaufmann et al., 2015), to protect CIs by detecting cyber incidents and
in a timely manner generating and distributing early warnings to the potentially
affected infrastructures. As depicted in Figure 9.1, the ECOSSIAN ecosystem
foresees three types of Security Operation Centers: Organization SOC (O-SOC),
National SOC (N-SOC), and European SOC (E-SOC).
At O-SOC-level organizations deploy multiple sensors and tools for intrusion
and threat detection and report to N-SOCs about incidents that might have cross-
organizational relevance. There are several different types of information O-SOCs
share with their respective N-SOC. Security-relevant information (such as incidents,
vulnerabilities, and observations) obtained by analyzing locally detected anomalies
is manually reported to the N-SOC by O-SOC operators; structured data automati-
cally generated by sensors at O-SOC level is first reviewed by O-SOC operators and
then, if feasible, forwarded to the N-SOC. Additionally, O-SOCs, especially those
operating in the same sector, may also share security data in a peer-to-peer fashion.
N-SOCs are deployed by European Member States joining the ECOSSIAN net-
work; they are responsible for gaining cyber-situational awareness on the network
of national critical infrastructures. Here cyber intelligence is acquired by analyzing
information gathered from different data sources such as reporting O-SOCs, feder-
ated N-SOCs, and publicly available sources. Cyber incident information aggrega-
tion, correlation, classification, and analysis are the main functionalities provided at
this level. Once the evaluation of analysis results is concluded, mitigation steps, advi-
sories, or early warnings are sent back to the reporting and other involved O-SOCs.
At the highest level the E-SOC performs analysis of strategic information
shared by the different N-SOCs and distributes advisories to targeted lower level
SOCs. The E-SOC identifies supranational attack campaigns and provides a pan-
European view on the security situation to the Member States and to the connected
European bodies of relevance (e.g., Europol, ENISA, CERTs, etc.).
Based on the experience gained in the ECOSSIAN project, this chapter stud-
ies how the building blocks discussed in this book can be harmonized into a
cross-national cybersecurity information sharing network. Moreover, this chapter
analyzes the processes necessary to efficiently manage such a network and the tech-
nologies required to implement it.
Section 9.2 presents the technical requirements and the overall architecture
designed for the ECOSSIAN ecosystem. The main technical components employed
on each level of such a hierarchical cross-national incident analysis network are also
outlined here. Considering the presented architecture, Section 9.3 introduces the
CIC framework for cyber intelligence sharing, which defines roles and responsibili-
ties of the actors involved in a national sharing network. The applicability of such
a framework to the ECOSSIAN system is discussed in this section. Section 9.4
illustrates three different application scenarios, demonstrated in the ECOSSIAN
project, highlighting the benefits of adopting the proposed approach in different
domains. Finally, Section 9.5 discusses the lessons learned in the ECOSSIAN proj-
ect and provides relevant recommendations for a large-scale rollout.
9.2.1 S
ystem Requirements
The requirements examined in the following are grouped in two main categories:
architectural requirements and functional requirements. Architecture requirements
are established by looking at the system from inside and understanding how it
should be built in order to successfully achieve functional requirements. These
requirements define how the system should be supported and maintained and
which resources should be available (Viktoriya Degeler et al., 2015).
Functional requirements are obtained by answering basic questions such as
“What is the system supposed to do?” and “Which features should the system pro-
vide in order to successfully solve its tasks?” Functional requirements are the most
user-centric, as they are directly derived from the expected usage of the final system.
Non-functional requirements were also defined for the ECOSSSIAN system.
They specify the criteria that can be used to judge the operation of the system,
rather than specific behavior. Non-functional requirements are not reported in this
section for the sake of brevity.
is responsible for reliable and secure data sharing based on the sharing require-
ments, and must have a Situational Awareness component, which allows decision
makers to assess complex situations from a high-level perspective. Moreover, the
ECOSSIAN system must have a collaboration component that allows all actors
participating in the system to communicate in an efficient way.
The system must be distributed across the partners and also across the different
nations collaborating together operating at different geographical locations.
As depicted in Figure 9.2, four main aspects are analyzed when deriving sys-
tem and architecture requirements; each of them is discussed in more detailed in
Sections 9.2.1.1.1 through 9.2.1.1.4.
9.2.1.1.3 Forensics
The ECOSSIAN system should support its operators when conducting threat/
incident response activities like forensic investigations. At different layers of the
ECOSSIAN system, the response capabilities will be very different. While at the
O-SOC layer the support offered by the ECOSSIAN system will deal with clas-
sical incident response (data collection, forensics, containment), at higher levels of
ECOSSIAN, the threat response module will support nation-states to deal with
cyber crises and the coordination of responses against large-scale targeted attacks
including physical effects on real infrastructures. At the N-SOC layer, the response
capabilities will also include interfaces to first responders in order to deal with
severe attacks that have physical effects.
362 ◾ Collaborative Cyber Threat Intelligence
Functional requirements
Threat
Risk analysis
Organization monitoring, Cooperation
and
and indication, users — Response
impact
concept detection and organizations
assessment
early warning
Contaninment
Detection and eradication Post-incident
Preparation analysis and recovery activity
9.2.2 System Architecture
The ECOSSIAN architecture was defined using the modularization paradigm,
where each type of function and each type of operation can be represented by a
functional block. These functional blocks define how the system was designed; in
order to implement the system architecture, the functional and the non-functional
requirements presented in Section 9.2.1 need to be followed (Giuseppe Settanni
et al., 2016).
The first part of this section presents the global architecture of the different
SOC levels (O-SOC to E-SOC), the interconnections, and the hierarchical infor-
mation flows. The basic architecture has been defined to be generic and valid for
every SOC level. Each SOC level can, in turn, implement the different functional
blocks for specific operations.
Due to the different domains addressed and the distributed nature of critical
infrastructures, the ECOSSIAN system is distributed through a large number of
geographical locations, in a highly heterogeneous way. Moreover, national informa-
tion is aggregated by each country, further shared and aggregated at the European
level. To achieve these objectives, a decentralized multilayer architecture with clear
definition of the components’ interfaces was designed.
Real-World Implementation of an Information Sharing Network ◾ 367
FURTHER INFORMATION
However, as discussed in Chapters 7 and 8, numerous regulatory and legal
issues need to be considered when establishing such interconnections across
different Member States, complying with diverse legislation.
Due to the inherent distributed nature at the level of the N-SOC, and even more
at the level of the E-SOC, the provision of a central physical installation of each
SOC is not viable. In many cases, this argument applies to the level of the O-SOC,
because the underlying infrastructure has a highly distributed nature (e.g., power
transmission networks, oil and gas infrastructures, or transport and logistics).
368 ◾ Collaborative Cyber Threat Intelligence
Incident/observation Incident/observation
O-SOC
N-SOC
E-SOC
Mitigation reports Mitigation reports
X-SOC
Inter-
connection
Transversal functions
Management Visualization Logging Collaboration
Impact
analysis
Legacy interface
Processing Analysis
Legacy
Mitigation
procedures
Continuity
planning
blocks. Data accessible and sharable through the interconnection block is indicated
by the dashed box.
Differentiation can be noticed when deriving concrete implementations
(e.g., data acquired at different SOC levels will be of different nature, syntax,
semantics, etc.). For example, raw data acquired at the O-SOC level is usually very
detailed, closely related to the specific application or process implemented by the
single CI. At the N-SOC or E-SOC level, the collected information is preprocessed
and does not require further elaboration to be analyzed; interpretation of the col-
lected information in terms of the impact on the national (or European) level can
be directly performed; event-based procedures are used here for data acquisition.
ECOSSIAN FBs are technology independent and can be implemented within
different software and hardware tools; they communicate with one another using
different service paradigms (like polling, publish/subscribe, etc.) and are exposed
by different interfaces and supported by diverse protocols.
Each tool, implemented at a given SOC level, can host an individual set of FB
instances. If several FBs are implemented within a single host, local interfaces may
exist not being accessible individually from outside the hosting tool.
Within the “Processing” FB, data is transformed into a format that can be treated by the ECOSSIAN system
Aggregation The FB “Aggregation” collects data from different sources, such as
• The “Processing” FB or
• The “Logging” FB
combines and possibly processes this data set according to specific rules and transfers it
• To the “Analysis” FB or
• To the “Logging” FB
(Continued)
Table 9.1 (Continued) Description of Functional Blocks
• Automated analysis
• Semiautomated analysis
• Review by the human operator on duty
• Review by the SOC expert team
Evaluation The “Evaluation” FB consists of identifying abnormal situations, such as system degradations in terms of
quality, performance, availability, or cyber attacks, with special focus on industrial automation and control
systems and classifying information security incidents.
The output of the “Evaluation” FB is sent to the “Impact Analysis” FB to assess direct and indirect adverse
impacts on the operations
Logging The “Logging” FB fulfils the task of
• Storing data in a data storage over time and in relation to the data source (any other ECOSSIAN
functional block).
• Logging workflow.
• Logging activities of operators.
Information may be logged/stored in centralized or distributed databases. ECOSSIAN defines certain
attributes (meta-data) attached to the data as required for fulfilling data analysis tasks. There are several
services applicable for retrieving data from the storage
(Continued)
372 ◾ Collaborative Cyber Threat Intelligence
Table 9.1 (Continued) Description of Functional Blocks
Functional Block General Description
Reporting The “Reporting” FB provides the capability to improve alert information and enable a more accurate view of
the vulnerabilities. It consists in
Reporting information, security vulnerabilities, events, and incidents must ensure, when required,
anonymity
Impact analysis The main task of the “Impact Analysis” FB is to identify the potential impact of an emerging threat. Impact
analysis may be done in advance to be prepared in case a threat is detected, or “on-line” in case of an
unforeseeable threat.
Impact analysis is based on the characterization of a specific incident as well as of a CI-specific process and
technical equipment knowledge. It is mainly performed by SOC expert teams
Mitigation The “Mitigation Procedures” FB receives data from the “Impact Analysis” FB in the case of attacks discovered
procedure by O-SOCs. Additionally, it can receive data from external SOCs through the “Inter-Connection” FB.
There are two main functions for mitigation actions: The first function is for rapid mitigation actions
based on incident information. This function lets the SOC expert team create preventive actions, based
on standard operating procedures, as soon as possible, based on the received information. The second
function stores information about incidents and derives new mitigation actions based on this stored
information
(Continued)
Real-World Implementation of an Information Sharing Network ◾ 373
Table 9.1 (Continued) Description of Functional Blocks
Functional Block General Description
Continuity Continuity planning function implements an appropriate process around the ECOSSIAN framework and its
planning associated O-SOC, N-SOC, and E-SOC stakeholders, applying an appropriate management system with
human, process, and technology controls. This underpins the ability of ECOSSIAN operations to continue in
the event of a significant disruption. This function has visibility of all components that comprise ECOSSIAN.
This will include configurations, operating systems (OS), applications, and network devices
Visualization The “Visualization” FB represents all means of interaction between the ECOSSIAN system and the operators
at the respective SOC levels. Depending on the SOC level, different types of interfaces and presentation
styles are used. Mobile visualization is dedicated to operators in the field at the O-SOC level. Here local
operators work as a long arm of the O-SOC operator. A local operator is enabled to process ECOSSIAN data.
This requires the visualization of local domain-specific data related to security incidents on the one hand
and on the other hand the top-down notification from E-SOC and N-SOC levels
Interconnection The “Interconnection” FB represents an interface supporting the information exchange between different
SOCs of an ECOSSIAN system. As an elementary function, it provides the means for security
(authentication, integrity check, or anonymization where applicable) and control depending on a security
policy
Management The “Management” FB has the tasks of monitoring and controlling the proper operation of the ECOSSIAN
infrastructure at the respective SOC level
Collaboration The “Collaboration” FB represents functionalities dedicated to inter-SOC collaboration, or with other related
entities, information exchange for management, problem solving, training, or simply information exchange
purposes
374 ◾ Collaborative Cyber Threat Intelligence
2 https://www.ietf.org/rfc/rfc5070.txt.
3 https://cve.mitre.org/.
N-SOC mitigation
O-SOC&N-SOC
N-SOC threat
Issue (incident/
N-SOC
O-SOC
N-SOC Interconnection (O-N interface) Collaboration
Visualization Reports
Secure GW National
Mobile visualization Hypervisor:Cymerius collaborative
Sending report platform N-SOC
after human analysis
Attribute-based en/decryption
Operator manages
and filters alerts
SIEM:OSSIM Send OSSIM relevant Reports Logging
Aggregation
Processing
Event reports Store Events
Interconnection
(with legacy) Adaptor:
message converter
Event reports Raw Datas
Monitored systems
(It includes network and equipment)
X-SOC operator
communication
communication
O-SOC threat
issue (incident/
observation)
reports
reports
E-SOC
N/E-SOC
Logging Colaboration Interconnection outputs
National Secure GW
colaborative
platform N-SOC
N-SOC
Evaluation security manager
BaseLine interface
CCOP Mitigation
Situational awareness
Mitigation component
Interconnection inputs
Review by human operator
Attribute-based encryption
Impact analysis
reports
4 https://technet.microsoft.com/en-us/security/bulletins.aspx.
5 https://www.us-cert.gov/ncas/bulletins.
6 http://caesair.ait.ac.at.
378 ◾ Collaborative Cyber Threat Intelligence
theoretical framework described here presents one possible way without implying
any obligations.
9.3.1 T
he CIC Framework
The framework describes the potential functionality of a CIC and gives guidance
on cross-domain cooperation between private or public organizations and the CIC
at the national level. The CIC and its frameworks need to be flexible and adaptable
to allow governments to opportunely address the necessary steps to implement their
NCSSs. The presented CIC Framework provides an approach to enhance cyber-
situational awareness at the national level and to protect critical infrastructures.
The following section offers guidance to nation-states in enhancing cyber resilience
at the national level and in developing CICs.
The general goals, based on the wide range of existing NCSS, and on the
evaluation of the European Union Agency for Network and Information Security
(ENISA, 2014), are the following:
In accordance with the objectives set in the NCSSs, the CIC Framework presents
the following principal purposes:
for cooperation and efficient collaboration among all relevant public and private
stakeholders and building on existing initiatives to avoid duplicating efforts and
promote cybersecurity. This presented concept reconsiders security around five
focal points:
The implemented design approach for the CIC Framework aims to be derived from
a risk-based assessment that considers the assets and services that are essential to the
state in the delivery of its national strategic goals. Risk-based means to assess risks
by identifying threats, vulnerabilities, and consequences and then manage the risks
through mitigations, controls and similar measures (CTO, 2015). Implementing
this risk-based design approach helps to put the preventive and mitigating measures
into practice.
Every stakeholder has his own obligations and liabilities as integral part of
the multilateral process of securing cyberspace. The CIC Framework focuses on
the connection between the international security community and the National
Security Council through international negotiations (see Figure 9.9). An example
for the international negotiations is the EU NIS Directive (European Commission,
2016) relating to enhancing cybersecurity (cf. Chapter 7).
The framework divides the national scope into two levels, into strategic and
tactical level. The relevant stakeholders within the national scope are the National
Security Council (NSC) and the CIC. The NSC belongs to the strategic level; the
CIC belongs to the tactical level of the national scope. The NSC is usually the main
forum for coordinating national security issues and high-level decision-making on
matters related to homeland security, including the protection of essential critical
infrastructures using ICT. The NSC should be steered by experts from the most rel-
evant domains, such as senior members and government authorities, sector-specific
agencies, legislative authorities, law enforcement agencies, and the CI providers of
the public and private sector related to cybersecurity. In order to gain a holistic pic-
ture of the cyber situation and the state of the CIs, the CIC develops CCOPs with
different aspects and statistics for increasing the CSA and enhancing appropriate
decision-making at the strategic level.
The Cyber Intelligence Centre (CIC) provides a centralized platform for cyber
experts to collaborate with the relevant stakeholders in a trusted environment.
International security community
scope
International
Strategic level
National security council
National scope
CSA through CSP political decisions
Cyber intelligence center
Tactical level
High-level Cyber situation
political pictures Data collection
High-level information
interface
WG
WG
WG
decisions
X
1
2
Assistance
interface Data collection
Technical information
interface
PoC reporting
Theoretical and National incident response team
interface
practical
support
Cross-domain communication
PoC PoC
PoC
Organizational scope
Executive level Executive level Executive level
Organization-wide communication
The participating organizations report their incidents through the PoC report-
ing interface to the CIC in order to establish the nationwide CSA.
The organizational scope is not described in detail in this section, since every
organization can have different structures. In the CIC framework the organiza-
tional scope is divided into three different stages: executive, business, and imple-
mentation. Handling cybersecurity incidents in the organizational scope has a
considerably higher maturity level than in the national scope. Stakeholders of the
executive level are able to understand the effects of the vulnerable elements in the
infrastructure in the organization. They are in charge of strategic (investment) deci-
sions and future implementations in the company.
The business level receives notifications about a critical incident that could not be
solved by the technical team at the implementation level or that might have a larger
impact. Their tasks cover threat analysis, event classification, and report generation
about cyber incidents. The business level bridges the executive and the implementa-
tion levels. There can be any number of levels, but the business management directly
above the implementation level is responsible for whether a current incident should be
reported to the executive level or the incident is below a critical threshold. The imple-
mentation level is the lowest level in the organizational scope. The main goal at this level
is technical data collection, asset management, infrastructure monitoring, and anom-
aly detection. They are responsible for enabling the uninterrupted operation of the key
technical system and services within an organization. Decisions at this level relate to
the day-to-day tasks of running business infrastructures. The level in the organizational
scope has a strict hierarchy, but flexible communication channels between levels.
These scopes and their stakeholders are the basis for a working CIC Framework
in cyberspace. The roles, responsibilities, and information channels regarding the
national scope are discussed in the following section. These descriptions contain
only recommendations and refer to the CIC Framework.
All stakeholders should have access and familiarity with the plan, particularly
members who play a role in strategic and tactical decisions during a national inci-
dent. The plan may also include regularly conducted exercises to ensure that the
plan is proper and current.
The NSC has both external and internal information sources. The primary internal
information sources are the CCOP (for more information see Chapter 6) created by
the WGs of the NIRT in the CIC.
the NIRT could share open and trusted best practices, lessons learned, or white
papers through the assistance interface (see Figure 9.9) with the affected organiza-
tion. If needed, the NIRT provides additional assistance, such as creating tailored
solutions or providing technical support locally. The victim organization should
record all the steps taken to mitigate damage. This information is essential for
recovering from damages, preventing similar attacks in the future, and crime inves-
tigation. Additionally, periodically the NIRT publishes best practices against the
recent cyber threats and makes them available for reading and downloading for the
participating organizations.
CI domain
O-SOCAT_1 O-SOCAT_3
Energie AG ÖBB
O-SOCAT_2
Wien
Energie
roles and responsibilities of the involved actors, in order to protect CIs by detect-
ing cyber incidents and in a timely manner generate and distribute early warnings
to the potentially affected infrastructures. The CIC framework offers guidance to
nation-states in enhancing cyber resilience at the national level and in developing
their cyber capabilities in accordance with the European NIS Directive (European
Commission, 2016).
9.4.1.1 Context
This demonstration scenario shows how ECOSSIAN enables the early detection of
a complex attack targeting the solvency department of a fictitious financial critical
infrastructure named PIT. The solvency refers to an enterprise’s financial health sta-
tus, to the capacity to meet its long-term financial commitments. That is the reason
the uncontrolled disclosure of the solvency of a company could have severe impacts,
potentially leading to the complete disruption of its business. This scenario has
been designed so that incidents and events match current threats that pose a real
danger to today’s financial institutions.
ECOSSIAN
N-SOC
Internet Attacker PC
ECOSSIAN O-SOC
hosting environment
Perimeter defense
ECOSSIAN
BroLHG
sensor
Subnet «A» - Solvibility dept Subnet «B» - Data center Subnet «C» ECOSSIAN O-SOC
ECOSSIAN
Honeypot
FINANCIAL CI
internal network
9 The BroLHG sensor is one of the threat detection sensor prototypes developed in ECOSSIAN.
It is based on Bro IDS (https://www.bro.org/) and provides network behavioral monitoring
capabilities. It allows determining whether the detected monitored traffic is benign, by com-
paring it with previously observed network traffic patterns. If suspicious communications are
detected, an alert message is sent to the SIEM.
10 The O-SOC operators supervise the security issues of the company’s IT infrastructure.
Adopting the ECOSSIAN solutions, these operators have the ability to get a real-time view
on the cybersecurity state of the controlled network and processes.
11 OSSIM: https://www.alienvault.com/products/ossim (Last accessed on November 2016).
12 Cymerius is a situation awareness solution used within a SOC. Cymerius allows O-SOC opera-
tors to be alerted when a new incident is reported; it proposes an incident view linked with a
business impact evaluation; it provides situational overview and proposes courses of action.
http://www.airbusds-optronics.com/web/guest/1299.html (Last accessed on November 2016).
13 The Honeypot is another detection method developed in ECOSSIAN. It is able to detect
APT attacks in discovery and capture phases. First, it discovers current machines available in
the network segment and identifies for each the operating system and services provided (open
ports). It then randomly generates virtual honeypots using this information in order to simu-
late the same services/operating systems. Finally, when the virtual honeypots are deployed,
the honeypot hypervisor detects any communication attempts (Link layer and above) to those
virtual honeypots and raises an alarm to the O-SOC.
Real-World Implementation of an Information Sharing Network ◾ 395
PIT O-SOC
Encapsulat
or interface (6) Encrypted
(1) Alarms: (2)(4) Aggregated (5) Incident incident Financial
BroLHG unusual network traffic alarms report report O-SOCs
SGW
OSSIM Cymerius
(same
ABE
Honeypot (3) Alarms: country)
data leak attempt
(14) Encrypted
Incident report
updated report
(6) Encrypted
(13) Encrypted
mitigation actions
(13) Encrypted
N-SOC updated report
(15) Encrypted
External (10) OSINT mitigation actions
CAESAIR Encapsulat
feeds
or interface
(8) Incident (7) Incident
(11) Analysis report report
Acquisition
(9) Escalate
SGW
E-SOC
incident
report +
similar module (15) Encrypted
(8) Incident ABE
incidents mitigation actions
report
number 4). The attacker is indeed additionally trying to leak further informa-
tion he believes to be critical, from one of the deployed honeypots, which simu-
lates a database server, and to which the attacker has previously obtained access.
The ECOSSIAN Honeypot probe detects these attempts and warns the O-SOC
operator with alert messages.
While still investigating the alarm triggered by the BroLHG sensor, the O-SOC
operator receives a new series of alerts on the O-SOC console. In the Cymerius’
incident view, an aggregation rule is automatically triggered as many alarms and
updates of the situation are sent by the OSSIM instance. This reproduces a com-
mon situation that SOC operators face every day. In this particular case, the large
number of alarms and the single source of scans strongly indicate that an attack is
currently ongoing.
Figure 9.13 Cymerius dashboard presents to the O-SOC operator the list of
detected incidents. ©Airbus.
The operator uploads the report through the encapsulator interface14 and sends it to
the N-SOC via the SGW15 (arrow number 5 in Figure 9.12).
O-SOC operators select the list of SOCs to receive the incident reports they
export, as well as the security level of the incident by setting its security domain (EU,
IT, DE, etc.), and classification (PUBLIC, RESTRICTED, CONFIDENTIAL,
SECRET, etc.). The O-SOC operator can also use the ABE module16 (Bethencourt
et al., 2007) to enforce the access control on the incident report and ensure that,
in this case, only national CIs belonging to the financial sector may decrypt the
received report (arrow number 6).
The incident report goes through the acquisition module (AM),17 which acts
as means of incident and threat reports collection (arrow number 7). The inci-
dent is then imported into the Cymerius instance deployed at the N-SOC (arrow
number 8). The context here is different from the O-SOC; reports issued by multiple
14 The Encapsulator provides the SOC operator with a graphical interface to customize the trans-
mission of incident data through the SGW to selected recipients. Setting including anony-
mization, classification level, and encryption can be adjusted through this interface.
15 The role of the SGW is to ensure that data flows appropriately between the various SOCs,
sources of relevant information (such as threat feeds), and incident querying by other compo-
nents at N-SOC.
Real-World Implementation of an Information Sharing Network ◾ 397
Again, the operator configures and enables ABE to secure the advisory before
sending it. The Cymerius instance running at PIT’s O-SOC displays the informa-
tion to the security team with updated severity and analysis reports as attached
files (arrow number 13). The operator analyzes the information provided by the
N-SOC, is able to adjust the internal incident management process, to eventually
remove the malware from the infected machines, to restore the normal systems’
operation, and therefore terminate the attack.
During the containment and eradication phase of the APT (cf. Chapter 2),
the analysts collect other useful information that is attached to the original threat
intelligence report. Finally, the O-SOC sends the N-SOC an update about the
incident, containing additional information on threat relevant p atterns and actions
taken to stop the attack, thus enriching the available information on this specific
threat (arrow number 14). This feedback information will then be shared by the
N-SOC with other potentially affected CIs on the national territory, as well as
with the E-SOC (arrow number 15); this step will be further illustrated in the last
demonstration scenario described in Section 9.4.3.
9.4.2.1 Context
As illustrated in Figure 9.14, gas is transmitted cross-country in high-pressure pipe-
lines at approximately 70 bar. The pressure of the gas is reduced at various offtakes
to supply gas to customers at pressures for which their equipment is rated. As most
of the gas network is below ground, any active equipment installations will gener-
ally be located above ground—hence Above Ground Installation (AGI). There are
two types of AGI:
1. Block valves that are remotely controlled and can be shut off if there is ever a
break in the pipeline between two block valves
2. Pressure reduction stations at every offtake branch on the transmission
The instrumentation of each AGI is wired back to a remote terminal unit (RTU).
SCADA servers in gas networks read/write to these RTUs. A grid control operation
room is located in the main data center where operators monitor gas processes 24/7
on SCADA clients.
Real-World Implementation of an Information Sharing Network ◾ 399
To electricity
power station To domestic
19 Bar 4 Bar
distribution distribution
pipeline pipeline
AGI 2
(Pressure
reduction) Pressure
reduction
skid
70 Bar
transmission
pipeline #2
AGI 1
(Block valve)
Remotely
actuated
block valve 70 Bar
transmission
pipeline #1
1.
Network intrusion: By applying the intrusion techniques presented in
Chapter 2 (Section 2.3.3), the attacker penetrates the network and gathers
information regarding the infrastructure, systems and operational routine of
the gas provider. The attacker targets the leased MPLS (Multi-Protocol Label
Switching) lines, used by the SCADA core to interact with the AGIs, through
their service provider, such that he can get remote access into the AGIs’ net-
works. The attacker then manages to get a remote persistent connection to
AGI 1 and AGI 2 networks. He can then conduct an ARP spoofing attack
(Whalen, 2011) against the RTU host and network switch, such that he can
perform a man-in-the-middle attack on the communications between the
RTU and SCADA Master. He can then tamper with the RTU readouts and
inputs, but does not perform a detectable action so far. Within deeper analy-
sis of the AGI 1 network, the attacker also identifies the PROFINET com-
munication and tries to get access to this system.
2.
Suppression of the sensor readouts: The attacker diverts the traffic coming from
the pressure reduction equipment to the SCADA servers and suppresses some
of the readouts of the sensors in order to create the false impression that some
of the sensors are malfunctioning. This step of the attack is triggering an alarm
on the O-SOC console. The attacker suppresses, at random points in time, and
during an extended time period (might be hours, days, and weeks), the readout
of the temperature from AGI 2, after gaining enough information.
3.
False telemetry readings: The attacker starts to report a decrease in both the
pressure and temperature readouts in the RTU from AGI 2, to make the grid
operator believe that there is a leak on the pipe between AGI 1 and AGI 2.
As a response, the grid operator instructs the block valve on AGI 1 to be shut
with an unnecessary close valve request.
to the running attack, indicating network topology changes and business process
anomalies. As a result of the ARP spoofing attack, there is a change on the net-
work topology on the connection line to AGI 2, diverting or eventually suppress-
ing the communication. This suppression is revealed by the ICS-Monitor,19 which
monitors and detects the communication interruption, and it is displayed on the
mobile visualization interface 20 (see arrow number 1 in Figure 9.15); this addresses
a potential threat to functional safety requirements of process automation plants.
The alarm is then forwarded to the supervision console of the O-SOC Cymerius21
(arrow number 2 in Figure 9.15).
BPIDS22 detects that there is a correct sensor readout being sent by the RTU but
that this temperature readout is not reaching the SCADA Master.
As in any SOC infrastructure, a SIEM is deployed to centrally aggregate and
correlate sensor events. Also in this scenario, the SIEM tool used for aggregating
mitigation actions
(19) Encrypted
(16) Encrypted
incident report
(10) Encrypted
(21) Encrypted
mitigation actions
N-SOC
Encapsulat
(13) Incident
report + or interface
Cymerius (12) Incident (11) Incident
correlation
report Report
Interdependency Acquisition SGW
E-SOC
model SEC module (20) Encrypted
(14) Updated ABE
mitigation actions
incident
report (15) Updated critical report
set of messages produced by the RTU and those received at the SCADA server do not match
(i.e., the messages are being suppressed while in transit, since they are seen leaving the RTUs
but never reach the SCADA server).
402 ◾ Collaborative Cyber Threat Intelligence
the alarms raised by the ECOSSIAN probes is OSSIM23 (arrows number 3 and 7).
Here, OSSIM forwards BPIDS and BroIDS alarms to Cymerius (arrows number
4 and 8). Cymerius also collects alarms directly forwarded from the ICS-Monitor
sensor by the mobile visualization (arrows number 2 and 6).
BPIDS also detects that the original messages, being produced by the RTU, are
not equal to those received on the SCADA master side; BPIDS detects that a block
valve request is being issued by the SCADA server even though the temperature
and pressure readouts from AGI 2 are not reaching the cut-off value.
As a result of the ARP spoofing attack, to perform the interception and change
of process data, there is a change on the network topology on the connection line to
AGI 2, the communication diverted or eventually suppressed; this change in topology
is detected by the ICS-Monitor. The incident is displayed on the mobile visualization
interface (arrow number 5). As only process values of valid connections are shown, the
graph of the tampered process values shows no new values, while the packet frequency
is constant, because of the parallel existence of the invalid parallel connections.
The BroIDS24 sensor, analyzing the PROFINET25 protocol, detects certain
changes of the topology because of new IP requests for the second block valve,
which have to be sent between attacker and HMI/motor by using the PROFINET
Discovery and Basic Configuration Protocol (DCP).
available to other O-SOCs in the country. Operators also use the ABE28 module
to enforce the access control on the incident report and ensure that only European
energy-related organizations are able to decrypt this information.
The incident report reaches the AM29 (arrow number 11) at the country’s
N-SOC, which redirects it to the N-SOC Cymerius (arrow number 12). The
N-SOC operator receives therefore a message on the console and starts investigat-
ing the incident using analysis and correlation tools such as Cymerius Portal and the
simple event correlator 30 (SEC) (arrow number 12).
While performing the impact analysis, the N-SOC team finds out that the
attack is relevant for all European gas providers, because of potential cascad-
ing effects that the exploited vulnerability would cause if it became known on a
broader scale. The interdependency model31 shows indeed which parts of other CIs
are affected by the current attack (i.e., insufficient gas provisioning). This infor-
mation is additionally sent to Cymerius and integrated in the incident report for
a comprehensive evaluation of the criticality of the incident (arrow number 14).
The N-SOC analyst does not find any similar attack that previously occurred, but
evaluates that the incident is critical. So, he decides to set the incident severity to
high and to ask for more information from the GNN O-SOC (arrow number 15).
He sends the updated report back to the O-SOC through the SGW and the ABE
(arrow number 16), and Cymerius’ O-SOC instance displays the information to the
respective on-site security engineer with the severity updated and analysis reports as
attached files (arrow number 17). The O-SOC operator updates the incident report
with complementary information on how the incident was detected, analyzed, and
addressed (arrow number 18). The enriched incident report (see Table 9.3) is sent by
the O-SOC operator to the N-SOC (arrow number 19), as explained before, and is
also forwarded by the N-SOC to the E-SOC (arrow number 20) and to other CIs
(arrow number 21).
tifying relations between incident reports by looking at their characteristics, i.e., incident
report time, size, source, etc.
31 Interdependency Model presents all CIs and their location in Europe within this scenario.
After the attack, the model highlights all affected CIs and shows a list of immediately affected
CIs and their availability.
404 ◾ Collaborative Cyber Threat Intelligence
Table 9.3 Fields of an Incident Report
Report Components Report’s Field Description
Duration Duration of the incident (make sense if the incident can be considered as
closed)
Notification category Support requesteda In case the providers of the CI need external support
Confidentiality level In case the report is confidential, possible categories: strictly confidential/
only for the branch/not confidential
Estimated impact Description of the possible impact, such as endangered services, external
subcontractor, estimated damage, etc.
Potential additional targetsb Possible targets (organizations) potentially hit by similar incidents
resulting from the adoption of the same attack vector
Stage of completiona Estimated stage of completion related to the resolution of the incident
(Continued)
406 ◾ Collaborative Cyber Threat Intelligence
Table 9.3 (Continued) Fields of an Incident Report
Report Components Report’s Field Description
Additional Free text Description of other details, such as measures planned or already taken,
information results of analysis, etc.
Responsea Is the first incident report, or just additional reporting, related to an older
incident?
Note: Incident reports include different information depending on the stage of the incident response phase and on the SOC level
they are generated at. This table lists the fields comprised in incident reports exchanged among O-SOCs, N-SOCs, and the
E-SOC.
a Specified only in reports sent by O-SOCs to their respective N-SOC.
b Included only in reports sent by N-SOCs to the E-SOC.
Real-World Implementation of an Information Sharing Network ◾ 407
X; this application case does not focus much on the detection stage, which was
largely demonstrated in the two previous application cases; it rather outlines the
incident response and mitigation procedures put in place by ECOSSIAN, at opera-
tional, national, and European levels.
9.4.3.1 C
ontext
NRRA has deployed a SCADA system for two purposes: the operation of sev-
eral railway systems (i.e., level crossing, tunnel and station management, object
detection on railways, etc.), and the operation of the electric grid (power lines
and substation) that powers the train traction. The SCADA system allows
supervision and control of these railway systems in real-time and in a central-
ized manner. Each has a three-level architecture: acquisition, automation, and
application.
At the acquisition level, the remote terminal unit (RTU) is responsible for the
direct interface with the infrastructure and executes local automation functions.
The information acquired by the RTU is sent toward the automation level to the
programmable logic controller (PLC), which executes broader and more distrib-
uted automation functions. At the application level, the central servers execute the
SCADA functions taking into account all the information gathered by the PLC.
The central system has two UNIX servers to guarantee the redundancy of the data-
bases and SCADA applications, as shown in Figure 9.16.
9.4.3.2 S
cenario Description
In this scenario, the attacker intends to target the NRRA railway system in a way
to generally disrupt railway traffic. In order to achieve his goals, the attacker plans
to gain access to the production railway network, gather technical and operational
information of potentially vulnerable systems, and then use that knowledge to
launch an attack with the purpose of generating a service disruption in the normal
operation of the national railway.
The attack is detected by the ECOSSIAN probes and, thanks to the support of
the national SOC, the SOC operators will be able to stop the intrusion.
The N-SOC of country X will also enable national situational awareness so that
similar critical infrastructure will have the necessary information to face and coun-
teract such attacks. Considering the event of interest for the E-SOC, this N-SOC
shares the incident information with the E-SOC.
With the received information, the E-SOC specialists determine the impact on
other European critical infrastructures. In the meantime, the E-SOC correlates the
incident and reveals that a similar event has occurred in a critical infrastructure
(fictitiously named RailY and belonging to the transportation sector) deployed in a
different Member State (we refer to it as country Y).
408 ◾ Collaborative Cyber Threat Intelligence
OCC #1 OCC #2
Operation Operation
Communications
frontend SCADASVR Communications
(Redundant) frontend
SCADASVR (Redundant)
FW FW
Back office
IP production network
network
FW
FW
Local
terminal
RTU RTU
1 This diagram was presented during the ECOSSIAN final demonstration. The event was orga-
nized by the ECOSSIAN consortium and hosted by Airbus Defence and Space in Èlancourt
(France) on April 26, 2017. External stakeholders including scholars, critical infrastructures
operators, military, regulator, and law enforcement agencies, attended the event.
The entire incident response workflow across the three ECOSSIAN SOC
levels is depicted in Figure 9.18 and is described in detail in Sections 9.4.3.2.1
through 9.4.3.2.5.
9.4.3.2.1 Attack
The attack consists of three phases as depicted in Figure 9.17. In the first phase,
the attacker intrudes on the corporate network through exploiting a maintenance
VPN (social engineering) and applying a discovery process (network scanning); the
attacker gathers information in order to find exploitable vulnerabilities on key net-
work equipment and systems. In the second phase, after gaining access to the oper-
ation infrastructure, the attacker takes control of the PLC from the catenary system
powering the actual trains, as well as of some network equipment. The attacker
proceeds, in the third phase, by forcing off the power supply to the catenary system
Real-World Implementation of an Information Sharing Network ◾ 409
Substation
PLC
RTU
1 This diagram was presented during the ECOSSIAN final demonstration. The event was orga-
nized by the ECOSSIAN consortium and hosted by Airbus Defence and Space in Èlancourt
(France) on April 26, 2017. External stakeholders including scholars, critical infrastructure
operators, military, regulator, and law enforcement agencies attended the event.
9.4.3.2.2 Detection
The detection is achieved by utilizing one of the ECOSSIAN probes (BPIDS32),
which monitors the flow of commands to open and close the energy circuits and
detects that the SCADA commands do not follow the specified process, namely,
that the command executed at the PLC level did not originate from the OCC. This
generates an alert that an inconsistent command was triggered at the PLC level; the
alert is then forwarded as incident report to the O-SOC hypervisor (Cymerius33)
for further investigation (arrows 1 and 2 in Figure 9.18).
NRRA O-SOC
RailY
Encapsulat O-SOCs
or interface (Country Y)
(3) Incident SGW
(1) Alarms: business (2) Aggregated report
process anomalies alarms
(17) ABE
BPIDS OSSIM Cymerius
Transport
(18) Mitigation O-SOCs
actions (Country X)
incident information +
mitigation actions
incident report
(12) Encrypted
(13) Encrypted
mitigation actions
(22) Warning +
mitigation actions
N-SOC (Country X)
External (9) OSINT
feeds CAESAIR Encapsulat
or interface
(6) Incident (5) Incident
(10) Analysis report report
(8) Escalate
Acquisition SGW
incident
report +
similar module
incidents (7) Incident ABE
report
N-SOC
Cymerius (Country Y)
(11) Updated critical report
incident information +
(21) Warning +
mitigation
E-SOC
Encapsulat
(18) Enriched (17) Enriched (16) Enriched or interface
incident Cymerius incident incident
report report report
Interdependency Acquisition SGW
model SEC module
(19) Updated ABE
incident
report
Cymerius portal
(20) Warning
displayed by Cymerius, the O-SOC analysts identify the malicious user’s VPN
connection and the potentially breached workstations. Following the predefined
reaction plan, the O-SOC incident response team shuts down the suspicious VPN
and disables the user account. The O-SOC team notifies the network and SCADA
teams in the field, supplying them with relevant details on the potentially affected
systems and equipment. The field teams initiate an emergency plan to secure the
affected devices and change the compromised credentials, either remotely where
applicable or locally where necessary. Once the analysis has been completed by
the O-SOC team, the severity is set to medium in every incident related to the
attack, and the analysis report is written and attached to the incident message. This
incident is considered of interest for other critical infrastructures and is therefore
shared with country X’s N-SOC. This happens following the secure information
Real-World Implementation of an Information Sharing Network ◾ 411
exchange procedure illustrated in the previous application cases, based on the adop-
tion of a SGW34 and the application of ABE35; see arrows 3 and 4 in Figure 9.18.
of the ECOSSIAN interdependency model36 (arrow 18). During this impact analy-
sis the E-SOC team finds out that the incident reported by NRRA has an impact
on other critical infrastructures operating in other European countries. The inter-
dependency model shows the list of such CIs on a map and stores the calculated
impact in a summary, which is additionally attached to the received incident report
(arrow 19).
The overall security situation is monitored and visualized through Cymerius
Portal.37 At the same time the incident is processed by the SEC correlator,38 which
detects whether any similar situation was already reported from other transport-
related CIs in Europe. The correlator identifies that this is the case in country Y.
Cymerius Portal shows indeed that the organization RailY, in country Y, reported
very similar issues only a few hours before; the E-SOC team examines the avail-
able information related to the incidents reported by RailY, and decides to notify
the respective N-SOC with a warning message (arrow 20) indicating a possible
cross-national attack. The nonsensitive available information collected during the
response of the incident affecting NRRA in country X are anonymized and securely
shared (through the SGW) with the country Y’s N-SOC (arrow 21).
Warnings received from the E-SOC are processed by the N-SOC following
a dedicated procedure that involves the assessment of the information obtained,
the evaluation of the relevance to their constituencies, and if necessary the noti-
fication of the interested critical infrastructures on their territory. Hence, in this
case, the N-SOC informs the RailY O-SOC (arrow 22) about the warning received
from the E-SOC and recommends it adopt the suggested countermeasures to miti-
gate the security incident.
36 The interdependency model presents all CIs and their location in Europe. After an attack the
model highlights all the potentially affected CIs and shows a list of immediately impacted CIs
and their availability.
37 Cymerius Portal displays a situation overview and a map of Europe with the monitored CIs
including their security status and some summary of the cyber situation: incident, risk, miti-
gation actions. Correlated situations are shown in a specific view in the portal. The situation
evolution can also be seen on a set of dashboards with graphs, and pie charts.
38 See Section 9.4.2.2.3.
Real-World Implementation of an Information Sharing Network ◾ 413
Authority. The same question applies at the European level: it is currently not
defined yet which organization will be responsible for operating this entity. In any
case, the ECOSSIAN architecture would be flexible enough to be seen as a possible
technical layer to be adopted and suitably customized when implementing this
directive on both national and European levels.
Additionally to the three-tiered architecture, sectorial SOCs could be foreseen
as intermediary entities between the CIs and the (public) N-SOC, which could
act as “buffer level,” and decide which security events to forward to the national
entity.
When considering critical infrastructure protection, vulnerabilities and threats
have been largely identified, while the consequences to business, politics, and soci-
eties of related security incidents are still not fully understood, resulting in a lack of
preparedness and response measures. High investments, cutting-edge technologies,
and a system of advanced functionalities, which are the basic characteristics of the
ECOSSIAN system, are prerequisites but not sufficient for success. The system must
be tested and its behavior assessed, proven, and measured in a real environment.
ECOSSIAN must be seen as a highly complex security measure, a system of
technology, procedures, and organizations that will operate in various CI sectors,
across sectors, with national governments, and in an international environment
with a dedicated role of the EU.
Prior to its rollout, the evaluation of the ECOSSIAN system is therefore fun-
damental. This assessment can be broken down into four “pillars” of evaluation,
reflecting the four main challenges a system such as ECOSSIAN has to address
the following:
The CIC framework illustrated in Section 9.3 outlines opportunities and con-
straints, providing some guideline and role models on how such a PPP framework
could look like and which prerequisites and procedures should be established in
order to make it a success story for all: for the CI industry, for national governments
and for the EU.
Several additional factors of relevance need to be regarded when implementing
such a sophisticated information sharing system. Most of these criteria on expected
societal reactions, ethical risks, or political preferences cannot usually be expressed
in physical or monetary units, often not even in logical ones. These “qualitative”
criteria have been identified and grouped into the following categories:
1.
Ethical criteria address social values, trust of citizens in such a system, risk of
privacy violations, integrity of decision makers, etc.
2.
Political criteria allow the assessment under political preferences, possible
political conflicts, or international political reputation and agreements.
3.
Societal criteria address the security impact of the ECOSSIAN system per-
ceived by society, welcoming, or rejection of new and possibly intrusive tech-
nologies and possible health impact.
List of Abbreviations
ABE Attribute-based encryption
AECID Automatic event correlation of incident detection
Collaborative Analysis Engine for Situational Awareness
CAESAIR
and Incident Response
CDC Cyber Defense Centers
CERT Computer emergency response team
CI Critical infrastructure
CIC Cyber Intelligence Center
CCOP Common Cyber Operational Picture
COTS Commercial off-the-shelf
CSIRT Computer security incident response team
418 ◾ Collaborative Cyber Threat Intelligence
References
Albanese, M. and Jajodia, S. (2014). Formation of awareness, In: Cyber Defense and
Situational Awareness, (pp. 47-62). A. Kott, R. Erbacher, and C. Wang, eds, Springer:
Heidelberg.
Bethencourt, J., Sahai, A., and Waters, B. (2007). Ciphertext-policy attribute-based encryp-
tion. In: SP’07 Proceedings of the 2007 IEEE Symposium on Security and Privacy, 2007,
pp. 321–334.
BSI-Global (2006). BS 25999—Business continuity management. http://www.bsi-global.
com/. Last accessed on February 21, 2017.
Real-World Implementation of an Information Sharing Network ◾ 419
Center for Strategic and International Studies (2013). Public private partnerships for criti-
cal infrastructure protection. http://csis.org/files/publication/130819_PPP.pdf, part4.
Last accessed on February 21, 2017.
CTO (2014). Commonwealth approach for developing National Cybersecurity Strategies.
https://www.sbs.ox.ac.uk/cybersecurity-capacity/system/files/Commonwealth%20
Approach%20for%20National%20Cybersecurity%20Strategies.pdf. Last accessed on
April 16, 2016.
CTO (2015). Commonwealth approach for developing National Cybersecurity Strategies.
https://www.sbs.ox.ac.uk/cybersecurity-capacity/system/files/Commonwealth%20
Approach%20for%20National%20Cybersecurity%20Strategies.pdf. Last accessed on
April 16, 2016.
Degeler, V. et al. (2015). ECOSSIAN Deliverable D1.2: Requirements report. http://ecos-
sian.eu/downloads/D1.2-Requirements-PU-M09.pdf. Last accessed on May 05, 2017.
Desmedt, Y. (2011). Man-in-the-middle attack. In Encyclopedia of Cryptography and Security,
pp. 759–759. Springer: Heidelberg.
ECOSSIAN Project Consortium (2015). Newsletter November 2015-Issue 3. http://ecos-
sian.eu/downloads/ECOSSIAN-Newsletter-Issue3-November2015.pdf. Last accessed
on May 5, 2017.
ECOSSIAN Project Consortium (2017). Newsletter March 2017-Issue 6. http://ecossian.
eu/downloads/ECOSSIAN-Newsletter-Issue6-March2017.pdf. Last accessed on May
5, 2017.
ENISA (2006). A step-by-step approach on how to set up a CSIRT. https://www.enisa.
europa.eu/publications/csirt-setting-up-guide. Last accessed on February 21, 2017.
ENISA (2014). An evaluation framework for National Cyber Security Strategies. https://
www.enisa.europa.eu/publications/an-evaluation-framework-for-cyber-security-
strategies-1. Last accessed on March 19, 2016
ENISA (2016). Incident reporting for Telcos 2015. October 2016. https://www.enisa.europa.
eu/publications/annual-incident-reports-2015. Last accessed on February 21, 2017.
European Commission (2016). European Directive on security of network and informa-
tion systems. https://ec.europa.eu/digital-single-market/en/network-and-information-
security-nis-directive. Last accessed on February 21, 2017.
International Organization for Standardization (2012). ISO 22301:2012. Societal Security—
Business Continuity Management Systems—Requirements. https://www.iso.org/obp/
ui/#iso:std:iso:22301:ed-1:v2:en. Last accessed on February 21, 2017.
Kaufmann, H., Hutter, R., Skopik, F., Mantere, M. (2015). A structural design for a
pan-European early warning system for critical infrastructures. Elektrotechnik und
Informationstechnik, Volume 132, Issue 2, pp. 117–121.
Lipson, H.F. (2002) Tracking and tracing cyber-attacks: Technical challenges and global policy
issues. (No. CMU/SEI-2002-SR-009). Software Engineering Inst., Carnegie-Mellon
University, Pittsburgh, PA.
NIST (2012). Computer Security Incident Handling Guide. Recommendations of the
National Institute of Standards and Technology. http://nvlpubs.nist.gov/nistpubs/
SpecialPublications/NIST.SP.800-61r2.pdf. Last accessed on February 21, 2017.
Obama, B. (2010). National Security Strategy of the United States. DIANE Publishing: Darby,
PA.
Pahi, T. (2016). Cyber Intelligence Centre framework, Bachelor Thesis, University of Applied
Sciences St Poelten, Austria. https://www.fhstp.ac.at/de/studium-weiterbildung/
informatik-security/it-security/bachelorarbeiten/cyber-intelligence-centre-framework.
420 ◾ Collaborative Cyber Threat Intelligence
Polancich, J. (2015). OSINT alone does not equal threat intelligence. http://www.securityweek.
com/osint-alone-does-not-equal-threat-intelligence. Last accessed on July 17, 2015.
Senate and House of Representatives of the United States of America (2015). Cybersecurity
Information Sharing Act. https://www.congress.gov/bill/114th-congress/senate-
bill/754/text. Last accessed on February 22, 2017.
Settanni, G. et al. (2016). A collaborative cyber incident management system for European
interconnected critical infrastructures. Journal of Information Security and Applications,
Volume 34, Part 2, June 2017, pp. 166-182.
Settanni, G. et al. (2016a). A collaborative analysis system for cross-organization cyber inci-
dent handling. Proceedings of the 2nd International Conference on Information Systems
Security and Privacy, IEEE, pp. 105–116.
Settanni, G. et al. (2016b). Correlating cyber incident information to establish situational
awareness in critical infrastructures. 14th Annual Conference on Privacy, Security and
Trust (PST), 2016. IEEE, Auckland, New Zealand.
U.S. Department of Justice (2015). Best practices for victim response and report-
ing of cyber incidents, Version 1. https://www.justice.gov/sites/default/files/
criminal-ccips/legacy/2015/04/30/04272015reporting-cyber-incidents-final.pdf.
Last Accessed on June 22, 2016.
Whalen, S. (2001). An introduction to ARP spoofing. Node99, April 2001. http://www.
leetupload.com/database/Misc/Papers/arp_spoofing_slides.pdf.
Index
A C
Actions of intent, 35 C2 (command and control), 34
AD (anomaly-based detection), 109 Capturing network data and process, 2–3
Address Resolution Protocol, see ARP CCOP (cyber common operating pictures)
Advance persistent threats, see APTs contextual information, 259
Adwind, 3 best practices, 265
AGI (Above Ground Installation), 398 critical infrastructure provider list,
Anomaly detection, 107–108, see also AD; IDS 262–263
Application-specific observables, 84 current political environment, 264
APTs (advance persistent threats), 28 dependencies, 264
advanced victims, 29 domain, 264
characteristics, 29 incident reports, 264
history, 28 industry knowledge, 264
threat actors, 29 international law, 265
Arbitrary organization network diagram, 71–72 lessons learned, 265
ARP (Address Resolution Protocol), 94 national law, 265
Asset adaption, 80–81 organizational assets, 263
Asset components, 263 public incident documentation,
Asset disposal, 81 264–265
Asset groups, 263 technical reports, 264–265
Asset identification, 79–80 core information, 259, 260–262
Asset information, 79 decision makers, 388–389
Asset lifecycle, 77–78 ECOSSIAN research project, 361
Asset operation, 80 sources, 265–266
Asset type, 263 accessibility, 266
Attacker campaigns, 189 information modeling, 267–268
ownership, 268–269
B CERTs (Computer Emergence Response
Teams), 132
Big Data, 26 CIC (cyber intelligence center) framework
Binary patterns, 98 business level, 383
BIPT (Belgisch Instituut voor Postdiensten en design approach, 379
Telecommunicatie), 287 goals, 378
BlackEnergy 3 malware, 42 implementation level, 383
BSI IT-Krisenreaktionszentrum, 243 national scope, 380
BSI IT-Lage und Analysezentrum, 243 nation-states, 379
Business network, 71 organizational scope, 382, 383
421
422 ◾ Index
T IT operations, 8
participants, 12–13
Tactics, techniques, and procedures, see TTPs roles, 14
TAXII (Trusted Automated eXchange of threat actor, 10
Indicator Information), 204–205 tools and analysis techniques, 10–11
Technology integration in organization TTPs, 9–10
dimensions, 134 vulnerability, 10
open-source tools, 165–169 Transport-oriented observables, 89–91
open web-platforms, 165–169 Trojan Locky, 5
protocols, 170–173 TTPs (tactics, techniques and procedures),
technical standards, 170–173 9–10, 22, 189
tools application, 173 cyber threat intelligence, 75–76
Terrorists, 238
Threat actors, 10
U
attribution, 55
classification, 58 United Kingdom
COTS hacker tools, 60 cybersecurity centers, 244
cover, 55 national cybersecurity strategies, 238
crackers, 59 United States of America
cyber criminals (see Cyber criminals) cybersecurity centers, 244–245
cyberterrorists, 58 Cybersecurity Information Sharing Act
hacktivists, 58 (CISA), 2
impact, 60 national cybersecurity strategies, 239–240
insiders, 58–59 Presidential Policy Directive, 150–153
motivations, 60 White House Executive Order, 146–147,
profiles, 189 149–150
script kiddies, 59 Unsupervised self-learning, 111
state-sponsored, 58 US-CERT (United States Computer Emergency
tactics and procedures, 60 Readiness Team), 245
with unknown identity, 59
Threat information sharing
V
advantages, 5–6
capabilities, 11–12 Vulnerability, 10
challenges, 6–7 Vulnerability databases, 267
CoA, 10
cybersecurity best practices, 10 W
external sources, 8
indicators, 9 walls.bmp, 44
internal sources, 7–8 Weaponization, 31