API) and provides a collection of threat specifications.
Additionally, it provides an appropriate set of services
and message exchange functionality to facilitate CTI
sharing between parties. Some other characteristics
of OpenTAXII include customizable APIs, authenti-
cation and flexible logging. Furthermore, it automat-
ically handles the data of the frameworks, provides
machine-readable threat intelligence, and combines
network security operations data with threat intelli-
gence, analysis and scoring of data in an optimized
manner.
Collective Intelligence Frameworks (CIF). CIF
9
is
a CTI management system and one of the platforms
of choice of ENISA for CTI sharing (ENISA, 2017).
CIF helps users to parse, normalize, store, post-
process, query, share and produce CTI data, while
allowing them to combine known malicious threat
information from many sources and utilize that in-
formation for identification (incident response), de-
tection (Intrusion Detection System) and mitigation
(null route). It also supports an automated form of
the most common types of threat intelligence such
as IP addresses and URLs that are observed to be
related to malicious activity. The CIF framework
aggregates various data-observations from different
sources. When a user queries for CTI data, the system
returns a series of chronologically ordered messages;
users are then able to make decisions by examining
the returned results (e.g., series of observations about
a particular adversary) in a way similar to examin-
ing an email threat. The CIF server consists of a few
different modules including: CIF-smrt, CIF-worker,
CIF-starman, CIF-router and ElasticSearch.
The CIF-smrt module has two primary capabili-
ties: (a) to fetch files using http(s) and (b) to parse
files using built-in parsers for regular expressions,
JSON, XML, RSS, HTML and plain text files.
Finally, the CIF-worker module helps CIF ex-
tract additional intelligence from collected threat data,
the CIF-starman module offers an HTTP API envi-
ronment, the CIF-router module provides the broker
mechanism between the client and web framework,
while the ElasticSearch module is a data warehouse
for storing (meta)data for intrusions.
4 CTI PLATFORMS EVALUATION
An observed outcome reached out from the character-
istics of the six referred platforms, is the utilization
of the same threat intelligence framework, namely
9
https://github.com/csirtgadgets/massive-octo-spice/wiki/
The-CIF-Book
STIX; notice that STIX and TAXII are currently two
of the most used sources in the threat intelligence plat-
forms.
We will now review the benefits and the draw-
backs of the six CTI sharing platforms we have con-
sidered in Section 3. For convenience, our findings
are summarized in Figure 3. In the following, we
present the highlights of each platform.
MISP: platform is fully organized and the range of
individuals that could utilize it could be developers
or even simple users, providing material for stand-
alone sharing. It is very flexible, expandable and
automated. The information in the database can be
extended by external sources while its functionality
can be extended by integrating with third-party tools.
MISP is both human and machine readable, making
correlations between observables and attributes pos-
sible, which is an exceptional characteristic consisted
by series of data models created by MISP community.
GOSINT: has an organized repository, a managing
system and exporting data functionalities. It can also
be extended by external sources (URL, TEXT, AD-
HOC). It has a community that applies research that
automatically identifies similar, or identical, indica-
tors of malicious behavior. Finally, GOSIT is both
human and machine readable.
OpenTPX: has an organized repository, is very flex-
ible, extensible and provides automation support. It
also offers enhancements of data capabilities by al-
lowing extensions to threat observables descriptions.
It provides a comprehensive threat-scoring frame-
work that allows security analysts, threat researchers,
network security operations and incident responders
to make relevant threat mitigation decisions straight-
forwardly.
YETI Platform: has an organized repository, is very
flexible, extensible and provides automation support.
It is both human and machine readable. YETI’s goal,
is to turn it into a self-sustainable project, where not
only the core developers but the whole community
helps out. To this end, the communication between
community partners is centralized and is based on
GitHub.
OpenTAXII: has an organized repository and manag-
ing system, and can also mimic already known cases
and threats. It is flexible and extendable since it is pro-
viding machine-readable threat intelligence, possibil-
ity of layer extension, source intelligent extension and
APIs extension. It also provides automation support.
CIF: has an organized repository and managing sys-
tem. It also offers data exporting facilities. It pro-
vides combination of malicious threats and utilize that
information for identification (incident response), de-
tection (IDS) and mitigation (null route). CIF can be
DATA 2019 - 8th International Conference on Data Science, Technology and Applications
374