University of Twente Student Theses

Login

Analysing Cyber Threat Intelligence Data Using Fully Homomorphic Encryption

Sustronk, J.J. (2022) Analysing Cyber Threat Intelligence Data Using Fully Homomorphic Encryption.

[img] PDF
4MB
Abstract:Companies continuously monitor their (internal) networks for incoming cyber attacks and use that ‘cyber threat intelligence data’ (CTI) to improve their security policies. This information is almost always considered private data that parties are unwilling to share with others. However, at the same time can this information help the overall community in its defence against cyber attacks. We present new methods that allow multiple parties to analyze their CTI without the need to share the data itself. We use fully homomorphic encryption (FHE) for this purpose, a technique that allows us to compute arbitrary functions on encrypted data. Consequently, we do not need extensive communication protocols for large calculations, something that is necessary for more traditional secure multi-party computation solutions. We construct an aggregation and k-means clustering algorithm for encrypted data points and implement our solution using the Lattigo framework. Using an ordinary PC, we can aggregate 20 rows of data in 10 minutes with high accuracy, and perform one iteration of k-means clustering for a dataset of 212 points in 69 minutes with a silhouette score of 0.47. To the best of our knowledge, these algorithms are the first of their kind and their results form a solid basis for future MPC analysis applications. Furthermore, it shows that FHE becomes increasingly viable as a tool for MPC purposes.
Item Type:Essay (Master)
Clients:
TNO, Den Haag, The Netherlands
Faculty:EEMCS: Electrical Engineering, Mathematics and Computer Science
Subject:54 computer science
Programme:Computer Science MSc (60300)
Link to this item:https://purl.utwente.nl/essays/93355
Export this item as:BibTeX
EndNote
HTML Citation
Reference Manager

 

Repository Staff Only: item control page