AI-Based Threat Intelligence Sharing on Decentralized Networks

Authors

  • Ajay Shriram Kushwaha Sharda University, Knowledge Park III, Greater Noida, U.P. 201310, India Author

DOI:

https://doi.org/10.63345/

Keywords:

Cyber Threat Intelligence, Decentralized Networks, Federated Learning, Differential Privacy, STIX/TAXII, Blockchain, Reputation Systems, Graph Neural Networks, MISP, MITRE ATT&CK

Abstract

Cyber threat intelligence (CTI) has become indispensable for anticipating, detecting, and mitigating sophisticated attacks that evolve faster than any single organization can track. Traditional, hub-and-spoke CTI exchanges—centralized repositories, mailing lists, or vendor-managed portals—struggle with timeliness, trust, privacy, and single-point-of-failure risks. This manuscript proposes and elaborates an AI-based, privacy-preserving threat intelligence sharing framework built atop decentralized networks. Artificial intelligence components automate ingestion from heterogeneous sources, extract indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs), correlate multi-source signals across organizations, and continuously score indicator quality, confidence, and relevance. A decentralized substrate—using permissioned distributed ledgers and peer-to-peer overlays—ensures provenance, immutability, and resilient dissemination while enforcing fine-grained access policies (e.g., Traffic Light Protocol), lineage tracking, and incentive-compatible governance. We review the state of the art in CTI formats (STIX/TAXII), sharing platforms (MISP, OpenCTI), and knowledge bases (MITRE ATT&CK). We then synthesize advances in federated learning, secure aggregation, differential privacy, and private set intersection to support collaborative analytics without exposing sensitive telemetry. The methodology section details an end-to-end architecture: (1) AI pipelines for NLP-based IOC/TTP extraction, graph learning for cross-organizational correlation, anomaly detection for novel threats, and active learning loops with analysts; (2) a decentralized trust layer with verifiable credentials, reputation-weighted consensus, and smart contracts for curation and slashing; (3) privacy-preserving protocols for secure multi-party collaboration; and (4) interoperability bridges to existing CTI ecosystems via STIX 2.1/TAXII 2.1 and MISP connectors. A results section presents a proof-of-concept evaluation and design-space trade-offs (precision/recall, timeliness, deduplication, ledger latency, and byzantine robustness). The paper concludes with limitations and practical adoption pathways for sectoral ISACs/ISAOs, critical infrastructure operators, and multinational consortia.

Downloads

Download data is not yet available.

Published

03-02-2026

Issue

Section

Original Research Articles

How to Cite

AI-Based Threat Intelligence Sharing on Decentralized Networks. (2026). Scientific Journal of Artificial Intelligence and Blockchain Technologies, 3(1), Feb (45-56). https://doi.org/10.63345/

Similar Articles

1-10 of 105

You may also start an advanced similarity search for this article.