Collaborative Repository for Cybersecurity Data and Threat Information
Abstract
In this paper, we attempt to show how to build a collaborative repository for cybersecurity data and threat information by building on top of a privacy-aware storage system: Tamias. We set the following goals: allow data sharing with a very high level of control over the sharing scope, enhance collaboration of entities that may not know each other but deal with similar threats, and manage different levels of trust between each parties. These levels of trust will define how much information is shared with each entity.
Publication Details
- Publication Type
- Conference Paper
- Publication Date
- 2014
- Published In
- 2014 Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS)
- Pages
- 83--87
- Publisher
- IEEE
- Location
- Wroclaw, Poland
- Digital Object Identifier (DOI)
- 10.1109/BADGERS.2014.13
BibTeX Citation
@inproceedings{Lorchat2014,
title = {Collaborative Repository for Cybersecurity Data and Threat Information},
author = {Jean Lorchat and Cristel Pelsser and Romain Fontugne},
year = 2014,
journal = {2014 Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS)},
booktitle = {Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, BADGERS@ESORICS 2014, Wroclaw, Poland, September 11, 2014},
publisher = {IEEE},
address = {Wroclaw, Poland},
pages = {83--87},
doi = {10.1109/BADGERS.2014.13},
isbn = {978-1-4799-8308-7},
abstract = {In this paper, we attempt to show how to build a collaborative repository for cybersecurity data and threat information by building on top of a privacy-aware storage system: Tamias. We set the following goals: allow data sharing with a very high level of control over the sharing scope, enhance collaboration of entities that may not know each other but deal with similar threats, and manage different levels of trust between each parties. These levels of trust will define how much information is shared with each entity.},
bibsource = {dblp computer science bibliography, https://dblp.org},
biburl = {https://dblp.org/rec/conf/badgers/LorchatPF14.bib},
eventdate = {11-11 Sept. 2014},
eventtitleaddon = {Wroclaw, Poland},
file = {:Lorchat2014 - Collaborative Repository for Cybersecurity Data and Threat Information.pdf:PDF},
groups = {International Conferences},
keywords = {Authorization, Collaboration, Computer security, Internet, Standards, Public key, Buildings, threat data exchange, trust, security}
}
Related publications
Chocolatine: Outage Detection for Internet Background Radiation
Andreas Guillot, Romain Fontugne, and Philipp Winter, et al.
2019 Network Traffic Measurement and Analysis Conference (TMA), 2019
Disco: Fast, good, and cheap outage detection
Anant Shah, Romain Fontugne, and Emile Aben, et al.
2017 Network Traffic Measurement and Analysis Conference (TMA), 2017
Pinpointing Delay and Forwarding Anomalies Using Large-Scale Traceroute Measurements
Romain Fontugne, Emile Aben, and Cristel Pelsser, et al.
CoRR, 2017
The Forest Behind the Tree: Revealing Hidden Smart Home Communication Patterns
François De Keersmaeker, Rémi Van Boxem, and Cristel Pelsser, et al.
Proceedings of the 33rd IEEE International Conference on Network Protocols (ICNP '25), 2025