skip to main content
10.1145/2660267.2660386acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
tutorial

WISCS 2014: The First ACM Workshop on Information Sharing & Collaborative Security

Published:03 November 2014Publication History

ABSTRACT

Sharing of security related information is believed to greatly enhance the ability of organizations to defend themselves against sophisticated attacks. If one organization detects a breach the automated sharing of observed security indicators (such as IP addresses, domain names etc.) provide valuable, actionable information to others. Through analyzing shared data it seems possible to get much better insights into emerging attacks. Sharing higher level intelligence about campaigns, threat actors and mitigations is also of great interest. Both in the US and the EU there are major efforts underway to strengthen information sharing. Yet there are a number of technical and policy challenges to realizing this vision. The First ACM Workshop on Information Sharing and Collaborative Security (WISCS 2014) aims to bring together experts and practitioners from academia, industry and government to present innovative research, case studies, and legal and policy issues. WISCS 2014 is held in Scottsdale, Arizona, USA on Nov. 3, 2014 in conjunction with 21st ACM Conference on Computer and Communications Security (CCS 2014).

References

  1. MITRE, STIX, https://stix.mitre.org/ Accessed 8/22/2014.Google ScholarGoogle Scholar
  2. Danyliw, R., Meijer, J., and Y. Demchenko, The Incident Object Description Exchange Format, RFC 5070, Dec 2007.Google ScholarGoogle Scholar
  3. IETF MILE Working group, https://datatracker.ietf.org/wg/mile/ Accessed 8/22/2014.Google ScholarGoogle Scholar
  4. S. Katti, B. Krishnamurthy, and D. Katabi. 2005. Collaborating against common enemies. In Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement (IMC '05). USENIX Association, Berkeley, CA, USA, 34--34. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. C. Zhou, C. Leckie and S. Karunasekera. A Survey of Coordinated Attacks and Collaborative Intrusion Detection. In Computers and Security, vol. 29, no. 1, 124--140, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. N. Boggs, S. Hiremagalore, A. Stavrou, and S. Stolfo. 2011. Cross-Domain collaborative anomaly detection: so far yet so close. In Proceedings of the 14th international conference on Recent Advances in Intrusion Detection (RAID'11), R. Sommer, D. Balzarotti, and G. Maier (Eds.). Springer-Verlag, Berlin, Heidelberg, 142--160. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. R. Pang, M. Allman, V. Paxson, and J. Lee, The devil and packet trace anonymization, ACM SIGCOMM Computer Communication Review, vol. 36, no. 1, pp. 29--38, Jan. 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. J. Zhang, P. Porras, and J. Ullrich. 2008. Highly predictive blacklisting. In Proceedings of the 17th conference on Security symposium (SS'08). USENIX Association, Berkeley, CA, USA, 107--122. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. M. Freedman, K. Nissim and B. Pinkas. Efficient Private Matching and Set Intersection. In Advances in Cryptology -- Eurocrypt '2004 Proceedings, LNCS 3027, Springer-Verlag, pp. 1--19, May 2004.Google ScholarGoogle Scholar
  10. Information Technology Industry Council (ITI), ITI Recommendation: Addressing Liability Concerns Impeding More Effective Cybersecurity Information Sharing, 2012. http://www.itic.org/dotAsset/fae2feab-7b0e-45f4--9e74--64e4c9ece132.pdf Accessed 8/22/2014.Google ScholarGoogle Scholar
  11. Executive Office of the President, Statement of Administration Policy, H.R. 624 -- Cyber Intelligence Sharing and Protection Act. http://www.whitehouse.gov/sites/default/files/omb/legislative/sap/113/saphr624r_20130416.pdf Accessed 8/22/2014.Google ScholarGoogle Scholar
  12. EFF, How The Expansive Immunity Clauses in CISPA Will Facilitate Abuse of User Privacy. https://www.eff.org/deeplinks/2012/04/how-expansive-immunity-clauses-cispa-will-facilitate-abuse-user-privacy-0 Accessed 8/22/2014.Google ScholarGoogle Scholar

Index Terms

  1. WISCS 2014: The First ACM Workshop on Information Sharing & Collaborative Security

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        CCS '14: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security
        November 2014
        1592 pages
        ISBN:9781450329576
        DOI:10.1145/2660267

        Copyright © 2014 Owner/Author

        Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 3 November 2014

        Check for updates

        Qualifiers

        • tutorial

        Acceptance Rates

        CCS '14 Paper Acceptance Rate114of585submissions,19%Overall Acceptance Rate1,261of6,999submissions,18%

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA
      • Article Metrics

        • Downloads (Last 12 months)2
        • Downloads (Last 6 weeks)0

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader