Open source intelligence gathering and cyber security incident data visualisation

Cyber security incidents have affected organisations from various industries. Malicious actors aim to cause monetary damage, destroy data records or even damage the reputations of the organisations. Organisations need to secure their vulnerable systems with a robust cyber security implementation. Th...

Full description

Bibliographic Details
Main Author: Soh, Nicholas Yong Tat
Other Authors: Anwitaman Datta
Format: Final Year Project (FYP)
Language:English
Published: Nanyang Technological University 2020
Subjects:
Online Access:https://hdl.handle.net/10356/138005
_version_ 1826110384372711424
author Soh, Nicholas Yong Tat
author2 Anwitaman Datta
author_facet Anwitaman Datta
Soh, Nicholas Yong Tat
author_sort Soh, Nicholas Yong Tat
collection NTU
description Cyber security incidents have affected organisations from various industries. Malicious actors aim to cause monetary damage, destroy data records or even damage the reputations of the organisations. Organisations need to secure their vulnerable systems with a robust cyber security implementation. These organisations require recommendations from cyber security experts to select a cyber security solution that suits their needs, thus preventing or lowering the impact of further incidents. This report documents the solution that has been created to gather and conduct analysis on cyber security incidents. The objective of the solution is to gather data from multiple different sources and compiling it for further analysis. Many different naming conventions have been used by the data sources which must be parsed, based on a taxonomy, to reference the same schema. Subsequently, all the gathered data is stored into the database. An application with a graphical user interface is used to interact with the database and cyber security incident data can be retrieved for analysis. The results of the analysis can be visualised as graphs with the same application. Data analysis methods such as clustering and linear regression can be visualized as well. Inferences from the visualisations could therefore be made by analysts. Recommendations which are derived from the inferences could be provided to organisations and businesses affected by cyber security attacks. Informed decisions on the type of cyber attacks to defend against could be made by following the recommendations.
first_indexed 2024-10-01T02:33:31Z
format Final Year Project (FYP)
id ntu-10356/138005
institution Nanyang Technological University
language English
last_indexed 2024-10-01T02:33:31Z
publishDate 2020
publisher Nanyang Technological University
record_format dspace
spelling ntu-10356/1380052020-04-21T10:42:01Z Open source intelligence gathering and cyber security incident data visualisation Soh, Nicholas Yong Tat Anwitaman Datta School of Computer Science and Engineering anwitaman@ntu.edu.sg Engineering::Computer science and engineering::Computer applications Cyber security incidents have affected organisations from various industries. Malicious actors aim to cause monetary damage, destroy data records or even damage the reputations of the organisations. Organisations need to secure their vulnerable systems with a robust cyber security implementation. These organisations require recommendations from cyber security experts to select a cyber security solution that suits their needs, thus preventing or lowering the impact of further incidents. This report documents the solution that has been created to gather and conduct analysis on cyber security incidents. The objective of the solution is to gather data from multiple different sources and compiling it for further analysis. Many different naming conventions have been used by the data sources which must be parsed, based on a taxonomy, to reference the same schema. Subsequently, all the gathered data is stored into the database. An application with a graphical user interface is used to interact with the database and cyber security incident data can be retrieved for analysis. The results of the analysis can be visualised as graphs with the same application. Data analysis methods such as clustering and linear regression can be visualized as well. Inferences from the visualisations could therefore be made by analysts. Recommendations which are derived from the inferences could be provided to organisations and businesses affected by cyber security attacks. Informed decisions on the type of cyber attacks to defend against could be made by following the recommendations. Bachelor of Engineering (Computer Science) 2020-04-21T10:42:01Z 2020-04-21T10:42:01Z 2020 Final Year Project (FYP) https://hdl.handle.net/10356/138005 en SCSE19-0209 application/pdf Nanyang Technological University
spellingShingle Engineering::Computer science and engineering::Computer applications
Soh, Nicholas Yong Tat
Open source intelligence gathering and cyber security incident data visualisation
title Open source intelligence gathering and cyber security incident data visualisation
title_full Open source intelligence gathering and cyber security incident data visualisation
title_fullStr Open source intelligence gathering and cyber security incident data visualisation
title_full_unstemmed Open source intelligence gathering and cyber security incident data visualisation
title_short Open source intelligence gathering and cyber security incident data visualisation
title_sort open source intelligence gathering and cyber security incident data visualisation
topic Engineering::Computer science and engineering::Computer applications
url https://hdl.handle.net/10356/138005
work_keys_str_mv AT sohnicholasyongtat opensourceintelligencegatheringandcybersecurityincidentdatavisualisation