incident analysis tasks in order to eliminate irrelevant
information and to focus on important information to
promptly perform mitigation steps. Another contribu-
tion is the employment of smart contract techniques
to provide an automated trusted system for incident
management life-cycle that allows automatic acquisi-
tion, classification, use, archiving and disposal. The
presented method employs a domain expert knowl-
edge base collected through a cyber intelligence tools
to detect Situational Awareness risks. An additional
advantage of this approach is a reduction of human
analysis costs. Ultimately, our research will lead to
the creation of automated security assessment tools
with more effective handling of cyber incidents.
REFERENCES
Barford, P., Dacier, M., Dietterich, T., Fredrikson, M., Gif-
fin, J., Jajodia, S., Jha, S., Li, J., Liu, P., Ning, P., Ou,
X., Song, D., Strater, L., Swarup, V., Tadda, G., Wang,
C., and Yen, J. (2010). Cyber sa: Situational aware-
ness for cyber defense. In Jajodia, S., Liu, P., Swarup,
V., and Wang, C., editors, Cyber Situational Aware-
ness, volume 46 of Advances in Information Security,
pages 3–13. Springer US.
Caldas, C. H. and Soibelman, L. (2003). Automating hier-
archical document classification for construction man-
agement information systems. Automation in Con-
struction, 12(4):395 – 406.
Christidis, K. and Devetsikiotis, M. (2016). Blockchains
and smart contracts for the internet of things. IEEE
Access, 4:2292–2303.
Harris, S. and Maymi, F. (2016). Cissp all-in-one exam
guide. CISSP book, seventh edition, chapter 2, pages
189 – 245.
Kanoun, W. and et al (2009). Success likelihood of ongoing
attacks for intrusion detection and response systems.
volume 3, pages 83–91. IEEE.
Kott, A. and Wang, C. (2014). Cyber Defense and Situa-
tional Awareness. Springer International Publishing
Switzerland.
M., U. and Padmavath, G. (2013). A survey on various cy-
ber attacks and their classification. nternational Jour-
nal of Network Security, 15(5):390–396.
Macdonald, M., Liu-Thorrold, L., and Julien, R. (2017).
The blockchain: A comparison of platforms and their
uses beyond bitcoin. The University of Queensland.
Maghrabi, L., Pfluegel, E., and Noorji, S. F. (2016). Design-
ing utility functions for game-theoretic cloud security
assessment: a case for using the common vulnerabil-
ity scoring system. In 2016 International Conference
On Cyber Security And Protection Of Digital Services
(Cyber Security), pages 1–6.
Morita, P., Burns C.M., H., and He, Q. (2011). Situa-
tion awareness and risk management understanding
the notification issues. In Stud Health Technol Inform.
PubMed.
Nakamoto, S. (2009). Bitcoin: A peer-to-peer electronic
cash system.
Peters, G. W. and Panayi, E. (2016). Understanding Mod-
ern Banking Ledgers Through Blockchain Technolo-
gies: Future of Transaction Processing and Smart
Contracts on the Internet of Money, pages 239–278.
Springer International Publishing, Cham.
Reguly, T. (2013). Does anybody really care
about vulnerability scoring? [online],
Available: https://www.tripwire.com/stateof-
security/risk-based-security-for-executives/risk-
management/doesanybody- really-care-about-
vulnerability-scoring/.
Salmon, P., Stanton, N., Walker, G., and Green, D. (2006).
Situation awareness measurement: A review of appli-
cability for {C4i} environments. Applied Ergonomics,
37(2):225 – 238.
Samarji, L. and et al (2015). Coordination and concurrency
aware likelihood assessment of simultaneous attacks.
volume 153, pages 524–529.
Settanni, G., Shovgenya, Y., Skopik, F., Graf, R., Wurzen-
berger, M., and Fiedler, R. (2016). Correlating cyber
incident information to establish situational awareness
in critical infrastructures. In 2016 14th Annual Con-
ference on Privacy, Security and Trust (PST), pages
78–81, Auchland, New Zealand. IEEE.
Vukoli
´
c, M. (2016). The Quest for Scalable Blockchain
Fabric: Proof-of-Work vs. BFT Replication, pages
112–125. Springer International Publishing, Cham.
Weng, S.-S., Tsai, H.-J., Liu, S.-C., and Hsu, C.-H. (2006).
Ontology construction for information classification.
Expert Systems with Applications, 31(1):1 – 12.
Wood, G. (2014). Ethereum: A secure decentralised gener-
alised transaction ledger.
Cyber Threat Information Classification and Life Cycle Management using Smart Contracts
311