A deployment-oriented privacy-preserving CTI framework: integrating PIR, federated learning, differential privacy, and practical hardenings
| dc.authorid | 0009-0003-5878-5621 | |
| dc.authorid | 0000-0003-2865-6370 | |
| dc.contributor.author | Çamalan, Emre | en_US |
| dc.contributor.author | Çeliktaş, Barış | en_US |
| dc.date.accessioned | 2026-05-05T06:27:51Z | |
| dc.date.available | 2026-05-05T06:27:51Z | |
| dc.date.issued | 2026 | |
| dc.department | Işık Üniversitesi, Lisansüstü Eğitim Enstitüsü, Bilgisayar Mühendisliği Yüksek Lisans Programı | en_US |
| dc.department | Işık University, School of Graduate Studies, Master’s Program in Computer Engineering | en_US |
| dc.department | Işık Üniversitesi, Mühendislik ve Doğa Bilimleri Fakültesi, Bilgisayar Mühendisliği Bölümü | en_US |
| dc.department | Işık University, Faculty of Engineering and Natural Sciences, Department of Computer Engineering | en_US |
| dc.description.abstract | Threat Intelligence Platforms (TIPs) enable organizations to share indicators of compromise (IoCs), yet the operational CTI lifecycle exposes multiple, largely independent privacy surfaces: query content and access-pattern leakage during IoC lookup, gradient and membership inference risks during collaborative model training, and residual metadata side-channels in network traffic. Existing work addresses these surfaces in isolation; no prior framework orchestrates their joint mitigation within a single, deploymentoriented CTI pipeline under explicit guarantee boundaries. We present a prototype workflow-level privacy orchestration for cyber threat intelligence that coordinates four mechanisms across the query-learn-update lifecycle: (i) Private Information Retrieval (PIR) to hide queried IoC indices, (ii) cross-silo federated learning (FL) to keep raw CTI data local, (iii) a formal client-level Differential Privacy (DP) mechanism for federated model training to protect against inversion and membership inference attacks, and (iv) practical privacy hardenings, namely fixed-shape PIR batching (a traffic-shaping mechanism, not a cryptographic PIR guarantee) and secure aggregation simulated under an honest-but-curious coordinator assumption, to mitigate residual side-channel leakage. The contribution is therefore one of CTI-specific workflow orchestration and systematic evaluation, not of new cryptographic primitives: formal (ε, δ) guarantees apply exclusively to the differentially private federated learning component, while the remaining mechanisms serve as deployment-oriented hardenings under stated assumptions. We implement a working prototype over a two-million-row AbuseIPDB-style IoC dataset. Under a two-server non-colluding assumption, PIR queries complete in approximately 40 seconds with 16MB transfer per fixed batch. Local Random Forest and Logistic Regression baselines reach 89.0% and 77.00% accuracy, respectively, while federated variants with DP-FedAvg (gradient clipping and RDP-based privacy accounting) demonstrate a quantified privacy–utility trade-off across multiple noise levels. A corrected canonical single-round (T=1) baseline establishes the reconciled reference operating point; reviewer-driven multi-round experiments (T ∈ {1, 10, 20}) and an auxiliary clip-norm sensitivity analysis (C ∈ {0.5, 1.0, 2.0}) further characterize how privacy budgets, model utility, and training stability evolve beyond the single-round setting, with all (ε, δ) values computed via RDP composition for the corresponding configuration. The framework aligns with recent advances in secure aggregation and privacy-preserving CTI analytics, and is designed to be compatible with GDPR, CCPA, ISO/IEC 27701, and NIST 800-53 privacy principles, demonstrating prototype-level feasibility for regulation-aware CTI collaboration across organizations. | en_US |
| dc.description.version | Publisher's Version | en_US |
| dc.identifier.citation | Çamalan, E. & Çeliktaş, B. (2026). A deployment-oriented privacy-preserving CTI framework: integrating PIR, federated learning, differential privacy, and practical hardenings. IEEE Access, 11, 1-26. doi:https://doi.org/10.1109/ACCESS.2026.3686089 | en_US |
| dc.identifier.doi | 10.1109/ACCESS.2026.3686089 | |
| dc.identifier.endpage | 26 | |
| dc.identifier.issn | 2169-3536 | |
| dc.identifier.scopus | 2-s2.0-105036495658 | |
| dc.identifier.scopusquality | Q1 | |
| dc.identifier.startpage | 1 | |
| dc.identifier.uri | https://hdl.handle.net/11729/7372 | |
| dc.identifier.uri | https://doi.org/10.1109/ACCESS.2026.3686089 | |
| dc.identifier.volume | 11 | |
| dc.indekslendigikaynak | Scopus | en_US |
| dc.institutionauthor | Çamalan, Emre | en_US |
| dc.institutionauthor | Çeliktaş, Barış | en_US |
| dc.institutionauthorid | 0009-0003-5878-5621 | |
| dc.institutionauthorid | 0000-0003-2865-6370 | |
| dc.language.iso | en | en_US |
| dc.peerreviewed | Yes | en_US |
| dc.publicationstatus | Published | en_US |
| dc.publisher | Institute of Electrical and Electronics Engineers Inc. | en_US |
| dc.relation.ispartof | IEEE Access | en_US |
| dc.relation.publicationcategory | Makale - Uluslararası Hakemli Dergi - Öğrenci | en_US |
| dc.relation.publicationcategory | Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı | en_US |
| dc.rights | info:eu-repo/semantics/openAccess | en_US |
| dc.subject | Differential privacy | en_US |
| dc.subject | Federated learning | en_US |
| dc.subject | Fixed-shape PIR | en_US |
| dc.subject | Privacy-preserving CTI | en_US |
| dc.subject | Private information retrieval | en_US |
| dc.subject | Secure aggregation | en_US |
| dc.subject | Threat intelligence | en_US |
| dc.subject | Distributed computer systems | en_US |
| dc.subject | Hardening | en_US |
| dc.subject | Information leakage | en_US |
| dc.subject | Logistic regression | en_US |
| dc.subject | Metadata | en_US |
| dc.subject | Network security | en_US |
| dc.subject | Privacy-preserving techniques | en_US |
| dc.subject | Query processing | en_US |
| dc.subject | Side channel attack | en_US |
| dc.subject | Differential privacies | en_US |
| dc.subject | Fixed-shape private information retrieval | en_US |
| dc.subject | Model training | en_US |
| dc.subject | Privacy preserving | en_US |
| dc.subject | Secure aggregations | en_US |
| dc.subject | Side-channel | en_US |
| dc.subject | Economic and social effects | en_US |
| dc.title | A deployment-oriented privacy-preserving CTI framework: integrating PIR, federated learning, differential privacy, and practical hardenings | en_US |
| dc.type | Article | en_US |
| dspace.entity.type | Publication | en_US |
Dosyalar
Orijinal paket
1 - 1 / 1
Yükleniyor...
- İsim:
- A_Deployment_Oriented_Privacy_Preserving_CTI_Framework_Integrating_PIR_Federated_Learning_Differential_Privacy_and_Practical_Hardenings.pdf
- Boyut:
- 1.4 MB
- Biçim:
- Adobe Portable Document Format
Lisans paketi
1 - 1 / 1
Küçük Resim Yok
- İsim:
- license.txt
- Boyut:
- 1.17 KB
- Biçim:
- Item-specific license agreed upon to submission
- Açıklama:












