The inter-organizational exchange of cyber threat intelligence constitutes a potential countermeasure against today's sophisticated cyber attacks. For this reason, research and practice introduced several data formats, messaging protocols and frameworks that enable the automated and standardized exchange of cyber threat intelligence. However, research and practice lacks a comprehensive overview and analysis of these standards. The goals of this thesis are to systematically identify the used standards in research and practice, define comparison criteria, analyze the identified standards, interpret the results and discuss the key findings.
(Note: The bar chart shows the estimated distribution of tasks.)
Multivocal Literature Study
Definition of Comparison Criteria
Analysis of the Identified Standards
Interpretation & Discussion of Results