Open source intelligence gathering and cyber security incident data visualisation

Cyber security incidents have affected organisations from various industries. Malicious actors aim to cause monetary damage, destroy data records or even damage the reputations of the organisations. Organisations need to secure their vulnerable systems with a robust cyber security implementation. Th...

Full description

Saved in:
Bibliographic Details
Main Author: Soh, Nicholas Yong Tat
Other Authors: Anwitaman Datta
Format: Final Year Project
Language:English
Published: Nanyang Technological University 2020
Subjects:
Online Access:https://hdl.handle.net/10356/138005
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-138005
record_format dspace
spelling sg-ntu-dr.10356-1380052020-04-21T10:42:01Z Open source intelligence gathering and cyber security incident data visualisation Soh, Nicholas Yong Tat Anwitaman Datta School of Computer Science and Engineering anwitaman@ntu.edu.sg Engineering::Computer science and engineering::Computer applications Cyber security incidents have affected organisations from various industries. Malicious actors aim to cause monetary damage, destroy data records or even damage the reputations of the organisations. Organisations need to secure their vulnerable systems with a robust cyber security implementation. These organisations require recommendations from cyber security experts to select a cyber security solution that suits their needs, thus preventing or lowering the impact of further incidents. This report documents the solution that has been created to gather and conduct analysis on cyber security incidents. The objective of the solution is to gather data from multiple different sources and compiling it for further analysis. Many different naming conventions have been used by the data sources which must be parsed, based on a taxonomy, to reference the same schema. Subsequently, all the gathered data is stored into the database. An application with a graphical user interface is used to interact with the database and cyber security incident data can be retrieved for analysis. The results of the analysis can be visualised as graphs with the same application. Data analysis methods such as clustering and linear regression can be visualized as well. Inferences from the visualisations could therefore be made by analysts. Recommendations which are derived from the inferences could be provided to organisations and businesses affected by cyber security attacks. Informed decisions on the type of cyber attacks to defend against could be made by following the recommendations. Bachelor of Engineering (Computer Science) 2020-04-21T10:42:01Z 2020-04-21T10:42:01Z 2020 Final Year Project (FYP) https://hdl.handle.net/10356/138005 en SCSE19-0209 application/pdf Nanyang Technological University
institution Nanyang Technological University
building NTU Library
country Singapore
collection DR-NTU
language English
topic Engineering::Computer science and engineering::Computer applications
spellingShingle Engineering::Computer science and engineering::Computer applications
Soh, Nicholas Yong Tat
Open source intelligence gathering and cyber security incident data visualisation
description Cyber security incidents have affected organisations from various industries. Malicious actors aim to cause monetary damage, destroy data records or even damage the reputations of the organisations. Organisations need to secure their vulnerable systems with a robust cyber security implementation. These organisations require recommendations from cyber security experts to select a cyber security solution that suits their needs, thus preventing or lowering the impact of further incidents. This report documents the solution that has been created to gather and conduct analysis on cyber security incidents. The objective of the solution is to gather data from multiple different sources and compiling it for further analysis. Many different naming conventions have been used by the data sources which must be parsed, based on a taxonomy, to reference the same schema. Subsequently, all the gathered data is stored into the database. An application with a graphical user interface is used to interact with the database and cyber security incident data can be retrieved for analysis. The results of the analysis can be visualised as graphs with the same application. Data analysis methods such as clustering and linear regression can be visualized as well. Inferences from the visualisations could therefore be made by analysts. Recommendations which are derived from the inferences could be provided to organisations and businesses affected by cyber security attacks. Informed decisions on the type of cyber attacks to defend against could be made by following the recommendations.
author2 Anwitaman Datta
author_facet Anwitaman Datta
Soh, Nicholas Yong Tat
format Final Year Project
author Soh, Nicholas Yong Tat
author_sort Soh, Nicholas Yong Tat
title Open source intelligence gathering and cyber security incident data visualisation
title_short Open source intelligence gathering and cyber security incident data visualisation
title_full Open source intelligence gathering and cyber security incident data visualisation
title_fullStr Open source intelligence gathering and cyber security incident data visualisation
title_full_unstemmed Open source intelligence gathering and cyber security incident data visualisation
title_sort open source intelligence gathering and cyber security incident data visualisation
publisher Nanyang Technological University
publishDate 2020
url https://hdl.handle.net/10356/138005
_version_ 1681056181315960832