Abstrakt: |
The number of cyberattacks has increased significantly, necessitating the establishment of robust safeguards. To protect networks from intrusion, Cybersecurity Threat Intelligence (CTI) has been employed. CTI must effectively counter these attacks. Sharing CTI is essential for understanding threats, safeguarding assets, and blocking attack vectors. However, conventional CTI faces challenges related to privacy concerns, negative publicity, and issues with quality, which hinder the sharing of threats within the CTI community. This paper introduces a new framework that leverages Blockchain technology to enhance CTI frameworks. We developed a consensus algorithm combining Proof of Work (PoW) and Proof of Stake (PoS) methodologies to maintain CTI network security. This hybrid system requires miners to stake tokens in proportion to their hashing power, aligning incentives with network integrity and defending against double spending attacks. Our framework employs Blockchain features such as privacy, and digital signatures to create a secure and private environment for CTI sharing. We evaluated the effective hash power distribution and discussed the advantages, limitations, and potential improvements for the CTIB mode. The model was tested against 51% attacks, proving its effectiveness statistically. Implementing this Blockchain & CTI algorithm will pave the way for a more resilient and equitable cybersecurity defense mechanism. [ABSTRACT FROM AUTHOR] |