University of Twente Student Theses
Analysing Cyber Threat Intelligence Data Using Fully Homomorphic Encryption
Sustronk, J.J. (2022) Analysing Cyber Threat Intelligence Data Using Fully Homomorphic Encryption.
PDF
4MB |
Abstract: | Companies continuously monitor their (internal) networks for incoming cyber attacks and use that ‘cyber threat intelligence data’ (CTI) to improve their security policies. This information is almost always considered private data that parties are unwilling to share with others. However, at the same time can this information help the overall community in its defence against cyber attacks. We present new methods that allow multiple parties to analyze their CTI without the need to share the data itself. We use fully homomorphic encryption (FHE) for this purpose, a technique that allows us to compute arbitrary functions on encrypted data. Consequently, we do not need extensive communication protocols for large calculations, something that is necessary for more traditional secure multi-party computation solutions. We construct an aggregation and k-means clustering algorithm for encrypted data points and implement our solution using the Lattigo framework. Using an ordinary PC, we can aggregate 20 rows of data in 10 minutes with high accuracy, and perform one iteration of k-means clustering for a dataset of 212 points in 69 minutes with a silhouette score of 0.47. To the best of our knowledge, these algorithms are the first of their kind and their results form a solid basis for future MPC analysis applications. Furthermore, it shows that FHE becomes increasingly viable as a tool for MPC purposes. |
Item Type: | Essay (Master) |
Clients: | TNO, Den Haag, The Netherlands |
Faculty: | EEMCS: Electrical Engineering, Mathematics and Computer Science |
Subject: | 54 computer science |
Programme: | Computer Science MSc (60300) |
Link to this item: | https://purl.utwente.nl/essays/93355 |
Export this item as: | BibTeX EndNote HTML Citation Reference Manager |
Repository Staff Only: item control page