MISP Management Models for Effective Threat Intelligence in Cybersecurity
Year of publication
2025
Authors
Eljaala, Saku-Lassi; Laine, Meri; Okko, Nella; Pacil, Edward; Rajamäki, Jyri
Abstract
Studies conducted in the context of the DYNAMO Horizon Europe project reveal that a significant proportion of regional cyber threat intelligence (CTI) data is still shared through manual methods such as email and chat. While these systems are generally viewed positively, they are also understood to be prone to delays and inaccuracies. The interest in utilizing the Malware Information Sharing Platform (MISP) is rising, yet its implementation is still nascent. Effective integration of MISP into cybersecurity operations hinges on selecting an appropriate governance model. This paper evaluates four models—Centralized, Decentralized, Hybrid, and Federated—to understand their advantages, limitations, and suitability for diverse organizational needs. As cyber threats grow in complexity, organizations increasingly rely on collaborative tools like MISP, requiring robust management frameworks to ensure efficient threat intelligence sharing. This study involves a systematic review of literature and desk research of materials produced during the DYNAMO project to analyse different governance models in terms of their alignment with MISP's objectives, operational needs, and organizational structures. The study’s main conclusion is that no single governance model fits all scenarios. Centralized models ensure compliance and consistency, making them ideal for small or regulated environments. Decentralized models offer flexibility for organizations with varied local demands but risk fragmentation. Hybrid and Federated models balance centralized control with local autonomy, providing scalability and resilience for large or complex organizations. Among these, the hybrid model stands out for its ability to dynamically address cybersecurity threats while maintaining cohesive governance. However, successful MISP integration also depends on user engagement, clear protocols, and adaptability to evolving needs. This study provides actionable insights to optimize MISP governance, enhancing collaboration, compliance, and cybersecurity resilience. The study also highlights the importance of ongoing training, clear procedures, and active user participation to maximize MISP’s benefits. These insights help organizations build resilience and stay adaptable to evolving cybersecurity challenges.
Show moreOrganizations and authors
Publication type
Publication format
Article
Parent publication type
Conference
Article type
Other article
Audience
ScientificPeer-reviewed
Peer-ReviewedMINEDU's publication type classification code
A4 Article in conference proceedingsPublication channel information
Parent publication name
Proceedings of the 24th European Conference on Cyber Warfare and Security
Publisher
Volume
24
Issue
1
Pages
884-888
ISSN
Publication forum
Publication forum level
1
Open access
Open access in the publisher’s service
Yes
Open access of publication channel
Fully open publication channel
License of the publisher’s version
CC BY NC ND
Self-archived
No
Other information
Fields of science
Computer and information sciences; Other social sciences
Keywords
[object Object],[object Object],[object Object],[object Object]
Publication country
United Kingdom
Internationality of the publisher
International
Language
English
International co-publication
No
Co-publication with a company
No
DOI
10.34190/eccws.24.1.3536
The publication is included in the Ministry of Education and Culture’s Publication data collection
Yes