Research Article
A Reputation-Based Approach Using Consortium Blockchain for Cyber Threat Intelligence Sharing
| Data: state: the state of a node, num: total number of nodes in the CTI sharing consortium network. | | Result: void | (1) | begin | (2) | switch state do: | (3) | case “leader” do: | (4) | for i = 1, i<=num, i++ do: | (5) | send valid threat proposal to node i | (6) | if number of ack message received <1/2num then: | (7) | update the index; | (8) | respond to client; | (9) | break | (10) | default do: | (11) | received the valid threat proposal from leader; | (12) | if valid threat proposal from leader is correct then: | (13) | update the index; | (14) | send ack message to leader; | (15) | break | (16) | end |
|