draft-ietf-mile-implementreport-04.txt   draft-ietf-mile-implementreport-05.txt 
MILE C. Inacio MILE C. Inacio
Internet-Draft CMU Internet-Draft CMU
Intended status: Informational D. Miyamoto Intended status: Informational D. Miyamoto
Expires: January 5, 2016 UTokyo Expires: January 6, 2016 UTokyo
July 4, 2015 July 5, 2015
MILE Implementation Report MILE Implementation Report
draft-ietf-mile-implementreport-04 draft-ietf-mile-implementreport-05
Abstract Abstract
This document is a collection of implementation reports from vendors, This document is a collection of implementation reports from vendors,
consortiums, and researchers who have implemented one or more of the consortiums, and researchers who have implemented one or more of the
standards published from the IETF INCident Handling (INCH) and standards published from the IETF INCident Handling (INCH) and
Management Incident Lightweight Exchange (MILE) working groups. Management Incident Lightweight Exchange (MILE) working groups.
Status of This Memo Status of This Memo
skipping to change at page 1, line 34 skipping to change at page 1, line 34
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet- working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/. Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
This Internet-Draft will expire on January 5, 2016. This Internet-Draft will expire on January 6, 2016.
Copyright Notice Copyright Notice
Copyright (c) 2015 IETF Trust and the persons identified as the Copyright (c) 2015 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of (http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
skipping to change at page 2, line 11 skipping to change at page 2, line 11
include Simplified BSD License text as described in Section 4.e of include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License. described in the Simplified BSD License.
Table of Contents Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
2. Consortiums and Information Sharing and Analysis Centers 2. Consortiums and Information Sharing and Analysis Centers
(ISACs) . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 (ISACs) . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
2.1. Anti-Phishing Working Group . . . . . . . . . . . . . . . 3 2.1. Anti-Phishing Working Group . . . . . . . . . . . . . . . 3
2.2. Advanced Cyber Defence Centre (ACDC) . . . . . . . . . . 3 2.2. Advanced Cyber Defence Centre . . . . . . . . . . . . . . 3
2.3. Research and Education Networkig Information Sharing and 2.3. Research and Education Networking Information Sharing and
Analyssi Center (REN-ISAC) . . . . . . . . . . . . . . . 4 Analysis Center . . . . . . . . . . . . . . . . . . . . . 4
3. Open Source Implementations . . . . . . . . . . . . . . . . . 4 3. Open Source Implementations . . . . . . . . . . . . . . . . . 4
3.1. EMC/RSA RID Agent . . . . . . . . . . . . . . . . . . . . 4 3.1. EMC/RSA RID Agent . . . . . . . . . . . . . . . . . . . . 4
3.2. NICT IODEF-SCI implementation . . . . . . . . . . . . . . 4 3.2. NICT IODEF-SCI implementation . . . . . . . . . . . . . . 4
3.3. n6 . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 3.3. n6 . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
4. Vendor Implementations . . . . . . . . . . . . . . . . . . . 5 4. Vendor Implementations . . . . . . . . . . . . . . . . . . . 5
4.1. Deep Secure . . . . . . . . . . . . . . . . . . . . . . . 5 4.1. Deep Secure . . . . . . . . . . . . . . . . . . . . . . . 5
4.2. IncMan Suite, DFLabs . . . . . . . . . . . . . . . . . . 6 4.2. IncMan Suite, DFLabs . . . . . . . . . . . . . . . . . . 6
4.3. Surevine Proof of Concept . . . . . . . . . . . . . . . . 7 4.3. Surevine Proof of Concept . . . . . . . . . . . . . . . . 7
4.4. MANTIS Cyber-Intelligence Management Framework . . . . . 8 4.4. MANTIS Cyber-Intelligence Management Framework . . . . . 8
5. Vendors with Planned Support . . . . . . . . . . . . . . . . 8 5. Vendors with Planned Support . . . . . . . . . . . . . . . . 8
skipping to change at page 3, line 40 skipping to change at page 3, line 40
2.1. Anti-Phishing Working Group 2.1. Anti-Phishing Working Group
Anti-Phishing Working Group (APWG) is one of the biggest coalition Anti-Phishing Working Group (APWG) is one of the biggest coalition
against cybercrime, especially phishing. In order to collect threat against cybercrime, especially phishing. In order to collect threat
information in a structured format, APWG provides a phishing and information in a structured format, APWG provides a phishing and
cybercrime reporting tool which sends threat information to APWG by cybercrime reporting tool which sends threat information to APWG by
tailoring information with IODEF format, based on RFC5070 and tailoring information with IODEF format, based on RFC5070 and
RFC5901. RFC5901.
2.2. Advanced Cyber Defence Centre (ACDC) 2.2. Advanced Cyber Defence Centre
The Advanced Cyber Defense Centre (ACDC), is EU-wide activity to The Advanced Cyber Defense Centre (ACDC), is EU-wide activity to
fight against botnets. ACDC provides a solutions to mitigate on- fight against botnets. ACDC provides a solutions to mitigate on-
going attacks, as well as consolidating information provided by going attacks, as well as consolidating information provided by
various stakeholders into a pool of knowledge. Within ACDC, IODEF is various stakeholders into a pool of knowledge. Within ACDC, IODEF is
one of the supported schema for exchanging the information. one of the supported schema for exchanging the information.
2.3. Research and Education Networkig Information Sharing and Analyssi 2.3. Research and Education Networking Information Sharing and Analysis
Center (REN-ISAC) Center
Research and Education Networking Information Sharing and Analysis Research and Education Networking Information Sharing and Analysis
Center (REN-ISAC) is a private community of the research and higher Center (REN-ISAC) is a private community of the research and higher
education members fro sharing threat information, and employs IODEF education members fro sharing threat information, and employs IODEF
formatted-message to exchange information. formatted-message to exchange information.
REN-ISAC also recommends to ues of the IODEF attachment provided with REN-ISAC also recommends to ues of the IODEF attachment provided with
the notification email be processed rather than relying on parsing of the notification email be processed rather than relying on parsing of
the email body text. The interface provided by REN-ISAC are designed the email body text. The interface provided by REN-ISAC are designed
for dealing with such email. for dealing with such email.
 End of changes. 6 change blocks. 
10 lines changed or deleted 10 lines changed or added

This html diff was produced by rfcdiff 1.42. The latest version is available from http://tools.ietf.org/tools/rfcdiff/