Research Article

A Reputation-Based Approach Using Consortium Blockchain for Cyber Threat Intelligence Sharing

Algorithm 3

Consensus phase.
Data: state: the state of a node, num: total number of nodes in the CTI sharing consortium network.
Result: void
(1)begin
(2)switch state do:
(3)  case “leader” do:
(4)   for i = 1, i<=num, i++ do:
(5)    send valid threat proposal to node i
(6)    if number of ack message received <1/2num then:
(7)     update the index;
(8)     respond to client;
(9)     break
(10)  default do:
(11)   received the valid threat proposal from leader;
(12)   if valid threat proposal from leader is correct then:
(13)    update the index;
(14)    send ack message to leader;
(15)    break
(16)end