Cyber Threat Intelligence Sharing: A Survey

Rufus Muchiri, Shem Mbandu, Charles Katila

Abstract


The importance of CTI is underscored by its ability to provide structured and actionable insights into threat landscapes, helping organizations anticipate and neutralize cyber-attacks before they manifest. This study surveys the landscape of CTI sharing and explores the various mechanisms and strategies employed to enhance CTI information sharing. The paper explores the fundamentals, benefits, and challenges of CTI sharing and reviews current proposals addressing these issues. Additionally, we examine the use of machine learning in CTI sharing, which improves intelligence by incorporating advanced analytics for more refined data and predictive analytics to anticipate attack patterns, thereby enabling proactive measures. The study also explores the role of trust in collaborative CTI sharing, especially in automated environments, and the use of sector specific CTI sharing mechanisms to mitigate the issues of trust concerns in CTI sharing. Through this review, this study contributes to the ongoing discourse on CTI sharing to improve cyber defense mechanisms in an increasingly interconnected and vulnerable digital world.

Keywords: Cyber Threat Intelligence (CTI), CTI Sharing Framework, Cyberattacks, Cybersecurity, Trust

DOI: 10.7176/JIEA/15-2-08

Publication date: September 28th 2025


Full Text: PDF
Download the IISTE publication guideline!

To list your conference here. Please contact the administrator of this platform.

Paper submission email: JIEA@iiste.org
ISSN (Paper)2224-5782 ISSN (Online)2225-0506
Please add our address "contact@iiste.org" into your email contact list.
This journal follows ISO 9001 management standard and licensed under a Creative Commons Attribution 3.0 License.
Copyright © www.iiste.org