<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="research-article"        dtd-version="1.4">
            <front>

                <journal-meta>
                                    <journal-id></journal-id>
            <journal-title-group>
                                                                                    <journal-title>Balkan Journal of Electrical and Computer Engineering</journal-title>
            </journal-title-group>
                            <issn pub-type="ppub">2147-284X</issn>
                                        <issn pub-type="epub">2147-284X</issn>
                                                                                            <publisher>
                    <publisher-name>MUSA YILMAZ</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id pub-id-type="doi">10.17694/bajece.644948</article-id>
                                                                <article-categories>
                                            <subj-group  xml:lang="en">
                                                            <subject>Software Testing, Verification and Validation</subject>
                                                    </subj-group>
                                            <subj-group  xml:lang="tr">
                                                            <subject>Yazılım Testi, Doğrulama ve Validasyon</subject>
                                                    </subj-group>
                                    </article-categories>
                                                                                                                                                        <title-group>
                                                                                                                                                            <article-title>Blockchain Based Information Sharing Mechanism for Cyber Threat Intelligence</article-title>
                                                                                                    </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0002-0586-7514</contrib-id>
                                                                <name>
                                    <surname>Büber</surname>
                                    <given-names>Ebubekir</given-names>
                                </name>
                                                                    <aff>YILDIZ TEKNİK ÜNİVERSİTESİ</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0002-1588-8220</contrib-id>
                                                                <name>
                                    <surname>Şahingöz</surname>
                                    <given-names>Özgür Koray</given-names>
                                </name>
                                                                    <aff>İSTANBUL KÜLTÜR ÜNİVERSİTESİ</aff>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20200730">
                    <day>07</day>
                    <month>30</month>
                    <year>2020</year>
                </pub-date>
                                        <volume>8</volume>
                                        <issue>3</issue>
                                        <fpage>242</fpage>
                                        <lpage>253</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20191110">
                        <day>11</day>
                        <month>10</month>
                        <year>2019</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20200610">
                        <day>06</day>
                        <month>10</month>
                        <year>2020</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 2013, Balkan Journal of Electrical and Computer Engineering</copyright-statement>
                    <copyright-year>2013</copyright-year>
                    <copyright-holder>Balkan Journal of Electrical and Computer Engineering</copyright-holder>
                </permissions>
            
                                                                                                                        <abstract><p>In recent years, networked computers areextensively used in every aspect of our daily lives. Besides, the anonymousstructure of the Internet results in an increase in the number of attacks notonly for individual users but also for local area networks. Current attacks aremore sophisticated, and they are developed by experienced intruders with theuse of automated malware production methods. These organized intrusions can goover the defense lines of the systems due to the weakness of thedetection/prevention mechanisms or carelessness of individual users. Aftersneaking into the system, these attacks can work until they are detected, andthey can access many critical resources of the company. Earlier detection ofthese attacks is very trivial issue for the security admins. This can beaccomplished by acquiring the signature (critical information) of the newestattacks as early as possible. One suggested solution is the use of a Threat Information Sharing system, whichis set up between security firms and authorities. This approach enables thedistribution of the marks of the recent (zero-day) attacks and the developmentof some proactive prevention mechanisms for them. The use of both peer to peerand centralized sharing mechanisms have some inherited deficiencies. Therefore,in this paper, a pure decentralized cyber security information sharing systemis proposed with the use of blockchain technology. A controlled decision-makingmechanism, authorization termination, and rule-sets maintenance are proposed tomake distributed decisions within the system. For making a decision, two smartcontracts should be used in the blockchain. One holds the positive votes whilethe other holds the negative ones. Members of the system are able to accesscyber threat data by using company-related queries. The system can facilitatethe integration of many data sources into cyber security management system.Additionally, it enables to collect in a single repository that can be accessedfor implementing real-time cyber security applications.</p></abstract>
                                                            
            
                                                                                        <kwd-group>
                                                    <kwd>blockchain</kwd>
                                                    <kwd>  cyber threat intelligence</kwd>
                                                    <kwd>  information sharing</kwd>
                                                    <kwd>  controlled decision-making mechanism</kwd>
                                                    <kwd>  smart contract</kwd>
                                            </kwd-group>
                            
                                                                                                                                                    </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">[1]	Ninth Annual Cost Of Cybercrime Study, THE COST OF CYBERCRIME, https://www.accenture.com/_acnmedia/pdf-6/accenture-2019-cost-of-cybercrime-study-final.pdf, The Last Access: October 2019</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">[2]	PhishTank | Join the fight against phishing, https:// www.phishtank.com/ , The Last Access: October 2019</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">[3]	IBM X-Force Exchange,  https://exchange.xforce.ibmcloud .com/, The Last Access: October 2019</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">[4]	AutoFocus Threat Intelligence, https://www.paloaltonetworks .com/products/secure-the-network/subscriptions/autofocus  , The Last Access: October 2019</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">[5]	LogRhythm Threat Lifecycle Management (TLM) Platform, https://logrhythm.com/products/threat-lifecycle-management-platform/, The Last Access: October 2019</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">[6]	iSIGHT Intelligence Subscriptions, https://www.fireeye. com/products/isight-cyber-threat-intelligence-subscriptions .html, The Last Access: October 2019</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">[7]	LookingGlass Cyber Solutions, https://www.lookingglasscyber .com/ , The Last Access: October 2019</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">[8]	Normshield Free Cyber Threat Intelligence, https://services. normshield.com/honeypotfeed , The Last Access: October 2019</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">[9]	Z. Zheng, S. Xie, H. N. Dai, H. Wang, “Blockchain challenges and opportunities: A survey. Work Pap”, 2016.</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">[10]	S. Nakamoto. “Bitcoin: A peer-to-peer electronic cash system.”, 2008.</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">[11]	G. Foroglou, A. L. Tsilidou, “Further applications of the blockchain.”, 2015.</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">[12]	A. Kosba, A. Miller, E. Shi, Z. Wen, C. Papamanthou, “Hawk: The blockchain model of cryptography and privacy-preserving smart contracts.”, In Proceedings of IEEE Symposium on Security and Privacy (SP), pages 839–858, San Jose, CA, USA, 2016.</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">[13]	B. W. Akins, J. L. Chapman, J. M. Gordon, “A whole new world: Income tax considerations of the bitcoin economy.”, 2013.</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">[14]	Y. Zhang, J. Wen, “An IOT electric business model based on the protocol of bitcoin.”, In Proceedings of 18th International Conference on Intelligence in Next Generation Networks (ICIN), pages 184–191, Paris, France, 2015.</mixed-citation>
                    </ref>
                                    <ref id="ref15">
                        <label>15</label>
                        <mixed-citation publication-type="journal">[15]	M. Sharples, J. Domingue, “The blockchain and kudos: A distributed system for educational record, reputation and reward.”, In Proceedings of 11th European Conference on Technology Enhanced Learning (EC-TEL 2015), pages 490–496, Lyon, France, 2015.</mixed-citation>
                    </ref>
                                    <ref id="ref16">
                        <label>16</label>
                        <mixed-citation publication-type="journal">[16]	C. Noyes, “Bitav: Fast anti-malware by distributed blockchain consensus and feedforward scanning.”, arXiv preprint arXiv:1601.01405, 2016.</mixed-citation>
                    </ref>
                                    <ref id="ref17">
                        <label>17</label>
                        <mixed-citation publication-type="journal">[17]	NRI, “Survey on blockchain technologies and related services. Technical report”, 2015.</mixed-citation>
                    </ref>
                                    <ref id="ref18">
                        <label>18</label>
                        <mixed-citation publication-type="journal">[18]	L. Lamport, R. Shostak, M. Pease. “The byzantine generals problem.”, ACM Transactions on Programming Languages and Systems (TOPLAS), 4(3):382–401, 1982.</mixed-citation>
                    </ref>
                                    <ref id="ref19">
                        <label>19</label>
                        <mixed-citation publication-type="journal">[19]	N. Szabo. “The idea of smart contracts”, 1997.</mixed-citation>
                    </ref>
                                    <ref id="ref20">
                        <label>20</label>
                        <mixed-citation publication-type="journal">[20]	G. Wood. “Ethereum: A secure decentralized generalized transaction ledger.”, Ethereum Project Yellow Paper, 2014.</mixed-citation>
                    </ref>
                                    <ref id="ref21">
                        <label>21</label>
                        <mixed-citation publication-type="journal">[21]	FireHOL IP Lists | IP Blacklists | IP Blocklists | IP Reputation, http://iplists.firehol.org/, The Last Access: October 2019</mixed-citation>
                    </ref>
                                    <ref id="ref22">
                        <label>22</label>
                        <mixed-citation publication-type="journal">[22]	K. Lee, J. I. James, T. G. Ejeta, H. J. Kim, “Electronic voting service using block-chain.”, The Journal of Digital Forensics, Security and Law: JDFSL, 11(2), 123, 2016</mixed-citation>
                    </ref>
                                    <ref id="ref23">
                        <label>23</label>
                        <mixed-citation publication-type="journal">[23]	G. Foroglou, A. L. Tsilidou, “Further applications of the blockchain.”, In 12th Student Conference on Managerial Science and Technology, 2015.</mixed-citation>
                    </ref>
                                    <ref id="ref24">
                        <label>24</label>
                        <mixed-citation publication-type="journal">[24]	Z. Zheng, S. Xie, H. N. Dai, H. Wang, “Blockchain challenges and opportunities: A survey.”, International Journal of Web and Grid Services, 14(4), 352-375, 2018</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
