skip to main content
10.1145/3465481.3470477acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
research-article

Pan-European Cybersecurity Incidents Information Sharing Platform to support NIS Directive

Published: 17 August 2021 Publication History

Abstract

Cybersecurity in the Energy sector and relevant information sharing is at the foremost of European strategy towards the digital decade targeted by the EC for the years to come. The proposed Pan-European Incidents Information Sharing Platform (I2SP) offers a cyber-shield armour to European Electrical Power and Energy Systems (EPES) enabling cooperative detection of large scale, cyber-human security and privacy incidents and attacks. Via Incidents Information Sharing Platform, early detection and appropriate mitigation, guarantees the continuity of operations and minimization of cascading effects in the infrastructure itself, the environment, the citizens and the end-users.The Incidents’ Information Sharing Platform (I2SP) constitutes the software package which enables secure Cyber-Threat Intelligence (CTI) information sharing among EPES participants, as well as with trusted nominated entities, such as Information Sharing and Analysis Centers (ISACs), Computer Security Incident Response Teams (CSIRTs) and Security Operations Centers (SOC). I2SP facilitates technical information sharing in view of a warning system and incident reporting across the EU, aligning with the pillars of the new Network Code on Cybersecurity.

References

[1]
European Parliament and the Council of the European Union, “DIRECTIVE (EU) 2016/1148 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 6 July 2016 concerning measures for a high common level of security of network and information systems across the Union,” Official Journal of the European Union, 2016. [Online]. Available: https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=uriserv:OJ.L_.2016.194.01.0001.01.ENG&toc=OJ:L:2016:194:TOC.
[2]
regulation (EU) 2019/881 of the European Parliament and of the Council of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526/2013 (Cybersecurity Act) (Text with EEA relevance) [Online] Available: https://eur-lex.europa.eu/eli/reg/2019/881/oj
[3]
European Commission, “JOINT COMMUNICATION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL - The EU's Cybersecurity Strategy for the Digital Decade,” 2020. [Online]. Available: https://ec.europa.eu/newsroom/dae/document.cfm?doc_id=72164.
[4]
ENISA, GUIDELINE ON SECURITY MEASURES UNDER THE EECC December 2020 [Online]. Available: https://www.enisa.europa.eu/publications/enisa-technical-guideline-on-incident-reporting-under-the-eecc/at_download/fullReport
[5]
OASIS-Open, “STIX™ Version 2.1,” OASIS Open, [Online]. Available: https://docs.oasis-open.org/cti/stix/v2.1/stix-v2.1.html.

Cited By

View all
  • (2025)Empowering Security Operation Center With Artificial Intelligence and Machine Learning—A Systematic Literature ReviewIEEE Access10.1109/ACCESS.2025.353295113(19162-19197)Online publication date: 2025
  • (2022)Demonstration of alignment of the Pan-European Cybersecurity Incidents Information Sharing Platform to Cybersecurity policy, regulatory and legislative advancementsProceedings of the 17th International Conference on Availability, Reliability and Security10.1145/3538969.3544477(1-8)Online publication date: 23-Aug-2022
  • (2022)Cyber-security measures for protecting EPES systems in the 5G areaProceedings of the 17th International Conference on Availability, Reliability and Security10.1145/3538969.3544476(1-10)Online publication date: 23-Aug-2022

Recommendations

Comments

Information & Contributors

Information

Published In

ARES '21: Proceedings of the 16th International Conference on Availability, Reliability and Security
August 2021
1447 pages
ISBN:9781450390514
DOI:10.1145/3465481
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 17 August 2021

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. CTI
  2. Cybersecurity Incident
  3. Incidents Information Sharing

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Funding Sources

  • European Commission within the H2020 Framework Program

Conference

ARES 2021

Acceptance Rates

Overall Acceptance Rate 228 of 451 submissions, 51%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)46
  • Downloads (Last 6 weeks)7
Reflects downloads up to 18 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2025)Empowering Security Operation Center With Artificial Intelligence and Machine Learning—A Systematic Literature ReviewIEEE Access10.1109/ACCESS.2025.353295113(19162-19197)Online publication date: 2025
  • (2022)Demonstration of alignment of the Pan-European Cybersecurity Incidents Information Sharing Platform to Cybersecurity policy, regulatory and legislative advancementsProceedings of the 17th International Conference on Availability, Reliability and Security10.1145/3538969.3544477(1-8)Online publication date: 23-Aug-2022
  • (2022)Cyber-security measures for protecting EPES systems in the 5G areaProceedings of the 17th International Conference on Availability, Reliability and Security10.1145/3538969.3544476(1-10)Online publication date: 23-Aug-2022

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy