MISP Research topics
Exploring New Horizons in Cyber security and threat intelligence with MISP: Research Opportunities
Welcome to the MISP Research Initiative! MISP is an essential open-source project at the forefront of the global cybersecurity landscape. Developed to empower organizations and security professionals in the battle against cyber threats, MISP serves as a distributed platform for sharing, storing, and analyzing threat intelligence data.
We are excited to extend an invitation to researchers, academics, and cybersecurity enthusiasts to embark on a journey of discovery within the realm of MISP. In collaboration with the MISP community, your expertise and innovative thinking can help drive advancements in threat intelligence sharing and enhance the state-of-the art in threat intelligence.
Listed below are a set of potential research topics that touch upon various aspects of MISP, offering a diverse range of opportunities to explore, research, experiment, and contribute to this dynamic field. Whether you are interested in technical challenges, user experience improvements, policy and governance issues, or integration with other cybersecurity tools, there’s a topic that aligns with your interests and expertise.
By participating in MISP research, you can:
- Contribute to the development and improvement of MISP features.
- Enhance the effectiveness of threat intelligence sharing.
- Investigate emerging threats and vulnerabilities.
- Shape the future of cybersecurity collaboration and information sharing.
We encourage you to delve into these research topics, collaborate with the MISP community, and make a significant impact on the cybersecurity landscape. Your work has the potential to strengthen the collective defense against cyber threats, safeguard critical infrastructures, and protect the digital world we rely on.
Explore the potential topics below, and let your research journey with MISP begin! We are open to other research topics and the list below is just a way to trigger research ideas.
MISP correlation analysis and improving algorithm complexity modeling
MISP users frequently experience performance issues when utilizing the correlation feature. This often leads to time-consuming manual debugging of queries, accompanied by adjustments to the existing correlation algorithms. In this research, researcher could aim to conduct an in-depth complexity analysis of the current correlation engines. This analysis will help optimize hardware utilization for more effective correlation. Using this model, system engineers can obtain precise specifications for hardware components like disks, RAM, and CPUs to dimension their hardware accurately. Additionally, researcher could plan to follow up with enhancements to the existing correlation algorithms.
Cryptographic data integrity analysis and improvements
In March 2022, the concept of protected events was introduced to cryptographically sign events, preventing data tampering 1. The distribution of cryptographic materials is carried out using Cerberate 2. In this research, these mechanisms will be analyzed in-depth, followed by an examination of cryptographic attacks and the proposal of potential solutions or improvements.
Mis- and dis-information detection and mitigation
The companion tool, Cerebrate 2, provides an overview of contributors to MISP through cryptographic verification. Nevertheless, the risk of misinformation and disinformation within MISP communities remains ever-present, with malicious users disseminating false information. The objective of this research is to assess the current mechanisms, such as warning lists3 and blacklisting 4 in MISP. Subsequently, researcher could conduct a survey of detailed misinformation and disinformation techniques that could potentially impact MISP communities, followed by the development of appropriate countermeasures.
Community analysis tools
MISP facilitates the sharing of numerous types of objects 5 within a sharing community. While some features provide basic statistics on the usage of these objects within a given community, the aim of this research is to comprehensively analyze these statistics, assess their advantages and limitations, and introduce novel automated methods to gain deeper insights into MISP communities, with a particular emphasis on information sharing aspects.
MISP community rating
In the rich tapestry of MISP information sharing communities, a wealth of insights and analytical data resides, offering valuable glimpses into the diverse capabilities of organizations engaged in sharing threat intelligence. Our research endeavor seeks to assess algorithms and methodologies that can autonomously evaluate and rate organizations within a MISP community. The outcomes of this research hold the potential for seamless integration into MISP or Cerebrate, enabling the sharing of calculated organizational capabilities and ratings across the community. Such ratings can, in turn, play a pivotal role in the qualification and validation of information generated by these participating organizations. The research results can be then integrated into MISP to qualify the intelligence produced by the rated organisations.
Interesting Bibliography for Research
- Beuving, J. and De Vries, G., 2015. Doing qualitative research: The craft of naturalistic inquiry. Amsterdam University Press.
- Charmaz, K. and Belgrave, L.L., 2007. Grounded theory. The Blackwell encyclopedia of sociology.
- Corballis, M.C., 2014. The recursive mind: The origins of human language, thought, and civilization-updated edition. Princeton University Press.
- Corbin, J. and Strauss, A., 2014. Basics of qualitative research: Techniques and procedures for developing grounded theory. Sage publications.
- Corsín Jiménez, A., 2011. Trust in anthropology. Anthropological Theory, 11(2), pp. 177-196.
- Edgar, T.W. and Manz, D.O., 2017. Research methods for cyber security. Syngress. pp. 96-105.
- Glaser, B.G. and Strauss, A.L., 2017. Discovery of grounded theory: Strategies for qualitative research. Routledge.
- Goldenberg, I. and Dean, W.H., 2017. Enablers and barriers to information sharing in military and security operations: lessons learned. In Information Sharing in Military Operations (pp. 251-267). Springer, Cham.
- Goldenberg, I., Soeters, J. and Dean, W.H. eds., 2017. Information sharing in military operations. Springer International Publishing.
- Hernandez-Ardieta, J.L., Tapiador, J.E. and Suarez-Tangil, G., 2013, June. Information sharing models for cooperative cyber defence. In 2013 5th International Conference on Cyber Conflict (CYCON 2013) (pp. 1-28). IEEE.
- Heuer, R.J., 1999. Psychology of intelligence analysis. Center for the Study of Intelligence.
- Hunger, I. and Müller, J., 2016. Barney G. Glaser/Anselm L. Strauss: The Discovery of Grounded Theory. Strategies for Qualitative Research, Aldine Publishing Company: Chicago 1967, 271 S.(dt. Grounded Theory. Strategien qualitativer Forschung, Bern: Huber 1998, 270 S.). In Klassiker der Sozialwissenschaften (pp. 259-262). Springer VS, Wiesbaden.
- Jiménez, A.C., 2017. The anthropology of organisations. Routledge.
- Johnston, R., 2005. Analytic culture in the US intelligence community: An ethnographic study (No. 14). Central Intelligence Agency.
- Mermoud, A., Keupp, M.M., Huguenin, K., Palmié, M. and Percia David, D., 2019. To share or not to share: a behavioral perspective on human participation in security information sharing. Journal of Cybersecurity, 5(1), p.tyz006.
- Moore, D.T., 2010. Critical thinking and intelligence analysis (No. 14). Government Printing Office.
- Murdoch, S. and Leaver, N., 2015, October. Anonymity vs. trust in cyber-security collaboration. In Proceedings of the 2nd ACM Workshop on Information Sharing and Collaborative Security (pp. 27-29).
- Price, D.H., 2008. Anthropological intelligence: the deployment and neglect of American anthropology in the Second World War. Duke University Press.
- Skopik, F., Settanni, G. and Fiedler, R., 2016. A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing. Computers & Security, 60, pp.154-176.
- Soeters, J., 2017. Information sharing in military and security operations. In Information sharing in military operations (pp. 1-15). Springer, Cham.
- Strauss, A. and Corbin, J., 1998. Basics of qualitative research techniques. Thousand Oaks, CA: Sage publications.
- Sutton, R.I. and Staw, B.M., 1995. What theory is not. Administrative science quarterly, pp.371-384.
- T. Sander and J. Hailpern. Ux aspects of threat information sharing platforms: An examination and lessons learned using personas. In Proceedings of the 2nd ACM Workshop on Information Sharing and Collaborative Security, WISCS ‘15, pages 51–59, New York, NY, USA, 2015. ACM.
- Van den Heuvel, G., 2017. Information sharing in military organizations: a sociomaterial perspective. In Information Sharing in Military Operations (pp. 165-182). Springer, Cham.
- Wagner, C., Dulaunoy, A., Wagener, G. and Iklody, A., 2016, October. Misp: The design and implementation of a collaborative threat intelligence sharing platform. In Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security (pp. 49-56).
- Zibak, A. and Simpson, A., 2019, August. Cyber threat information sharing: Perceived benefits and barriers. In Proceedings of the 14th International Conference on Availability, Reliability and Security (pp. 1-9).