ETSI TR 103 331-2016 CYBER Structured threat information sharing (V1 1 1)《网络 结构化威胁信息共享(V1 1 1)》.pdf
《ETSI TR 103 331-2016 CYBER Structured threat information sharing (V1 1 1)《网络 结构化威胁信息共享(V1 1 1)》.pdf》由会员分享,可在线阅读,更多相关《ETSI TR 103 331-2016 CYBER Structured threat information sharing (V1 1 1)《网络 结构化威胁信息共享(V1 1 1)》.pdf(20页珍藏版)》请在麦多课文档分享上搜索。
1、 ETSI TR 103 331 V1.1.1 (2016-08) CYBER; Structured threat information sharing TECHNICAL REPORT ETSI ETSI TR 103 331 V1.1.1 (2016-08) 2 Reference DTR/CYBER-0009 Keywords security, threat analysis, threat intelligence ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92
2、94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice The present document can be downloaded from: http:/www.etsi.org/standards-search The present document may be made available in ele
3、ctronic versions and/or in print. The content of any electronic and/or print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any existing or perceived difference in contents between such versions and/or in print, the only prevailing
4、document is the print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI docum
5、ents is available at https:/portal.etsi.org/TB/ETSIDeliverableStatus.aspx If you find errors in the present document, please send your comment to one of the following services: https:/portal.etsi.org/People/CommiteeSupportStaff.aspx Copyright Notification No part may be reproduced or utilized in any
6、 form or by any means, electronic or mechanical, including photocopying and microfilm except as authorized by written permission of ETSI. The content of the PDF version shall not be modified without the written authorization of ETSI. The copyright and the foregoing restriction extend to reproduction
7、 in all media. European Telecommunications Standards Institute 2016. All rights reserved. DECTTM, PLUGTESTSTM, UMTSTMand the ETSI logo are Trade Marks of ETSI registered for the benefit of its Members. 3GPPTM and LTE are Trade Marks of ETSI registered for the benefit of its Members and of the 3GPP O
8、rganizational Partners. GSM and the GSM logo are Trade Marks registered and owned by the GSM Association. ETSI ETSI TR 103 331 V1.1.1 (2016-08) 3 Contents Intellectual Property Rights 4g3Foreword . 4g3Modal verbs terminology 4g3Executive summary 4g3Introduction 4g31 Scope 6g32 References 6g32.1 Norm
9、ative references . 6g32.2 Informative references 6g33 Definitions and abbreviations . 8g33.1 Definitions 8g33.2 Abbreviations . 8g34 Means for exchanging structured cyber threat intelligence 9g34.1 Introduction 9g34.2 OASIS Cyber Threat Intelligence Technical Committee (TC CTI) . 10g34.2.1 Introduct
10、ion. 10g34.2.2 CTI STIX Subcommittee 10g34.2.3 CTI TAXII Subcommittee 12g34.2.4 CTI CybOX Subcommittee . 13g34.2.5 CTI Interoperability Subcommittee 14g34.3 IETF Managed Incident Lightweight Exchange Working Group (mile) 14g34.4 CSIRTGadgets Collective Intelligence Foundation (CIF) 15g34.5 EU Advanc
11、ed Cyber Defence Centre (ACDC) 15g34.6 AbuseHelper . 15g34.7 OMG Threat Modelling Working Group . 15g34.8 ITU-T SG17 . 16g34.9 Open Threat Exchange (OTX) 17g34.10 OpenIOC Framework . 17g34.11 VERIS Framework . 17g34.12 ETSI ISI (Information Security Indicators) ISG 17g3Annex A: Bibliography 19g3Hist
12、ory 20g3ETSI ETSI TR 103 331 V1.1.1 (2016-08) 4 Intellectual Property Rights IPRs essential or potentially essential to the present document may have been declared to ETSI. The information pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be
13、found in ETSI SR 000 314: “Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in respect of ETSI standards“, which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web server (https:/ipr.etsi.org/). Pursuant to the ETSI IPR
14、 Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become, essential to the present document. Some material
15、 contained herein is the copyright of, or has been supplied by OASIS and the United States Government. Figures 1, 2, 3, 4, 5, 6, 7 copyright OASIS Open 2016. All Rights Reserved. Figures 1, 2, 3, 4, 5, 6, 7 copyright United States Government 2012-2015. All Rights Reserved. Used by permission. Forewo
16、rd This Technical Report (TR) has been produced by ETSI Technical Committee Cyber Security (CYBER). Modal verbs terminology In the present document “should“, “should not“, “may“, “need not“, “will“, “will not“, “can“ and “cannot“ are to be interpreted as described in clause 3.2 of the ETSI Drafting
17、Rules (Verbal forms for the expression of provisions). “must“ and “must not“ are NOT allowed in ETSI deliverables except when used in direct citation. Executive summary Cyber threat information sharing - often described as threat intelligence sharing - is one of the most important components of an o
18、rganizations cyber security program. It can be obtained internally and from external trusted sources. It is collected, analysed, shared, and leveraged. The present document provides a survey of ongoing activities and the resulting platforms that are aimed at structuring and exchanging cyber threat i
19、nformation. These activities range from those developed among the Computer Emergency Response Teams in the 1990s in the IETF, to cutting-edge new initiatives being advanced in OASIS. Some of the platforms are semi-open commercial product communities. It is possible that the OASIS CTI work could brin
20、g about significant interoperability if not integration in this area. Introduction The importance of cyber threat information sharing has been underscored recently by the European Union and North America enacting into organic law, combined with major executive level and national initiatives. These a
21、ctions extend across all information, and infrastructure sectors. Some of the more prominent of these recent actions include: EU Network Information Security Directive, approved 18 December 2015 i.1. Cybersecurity Information Sharing Act of 2015 (18 December 2015) i.2. CPNI, Threat Intelligence: Col
22、lecting, Analysing, Evaluating, 23 March 2015 i.3. Launch of the Canadian Cyber Threat Exchange, 11 December 2015. ETSI ETSI TR 103 331 V1.1.1 (2016-08) 5 Against this backdrop of initiatives that included the scaling of Financial Services Information Sharing and Analysis Center (FS-ISAC) and The De
23、pository Trust draft Specifications STIX 2.0, TAXII 2.0, CybOX 3.0; draft CybOX 3.0 Roadmap, CybOX 3.0 Visualization. NOTE 1: Available at https:/www.oasis-open.org/committees/tc_home.php?wg_abbrev=cti. NOTE 2: See also, OASIS Cyber Threat Intelligence (CTI) TC Wiki, https:/wiki.oasis-open.org/cti/;
24、 Sean Barnum, Standardizing Cyber Threat Intelligence Information with the Structured Threat Information eXpression (STIX), MITRE (February 20, 2014). i.5 OASIS. Cyber Threat Intelligence (CTI) TC Meeting Notes, OASIS Cyber Threat Intelligence (CTI) TC Documents. NOTE: Available at https:/www.oasis-
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ETSITR1033312016CYBERSTRUCTUREDTHREATINFORMATIONSHARINGV111 网络 结构 威胁 信息 共享 V111PDF

链接地址:http://www.mydoc123.com/p-736418.html