Open source intelligence gathering and cyber security incident data visualisation
Cyber security incidents have affected organisations from various industries. Malicious actors aim to cause monetary damage, destroy data records or even damage the reputations of the organisations. Organisations need to secure their vulnerable systems with a robust cyber security implementation. Th...
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project (FYP) |
Language: | English |
Published: |
Nanyang Technological University
2020
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/138005 |
_version_ | 1826110384372711424 |
---|---|
author | Soh, Nicholas Yong Tat |
author2 | Anwitaman Datta |
author_facet | Anwitaman Datta Soh, Nicholas Yong Tat |
author_sort | Soh, Nicholas Yong Tat |
collection | NTU |
description | Cyber security incidents have affected organisations from various industries. Malicious actors aim to cause monetary damage, destroy data records or even damage the reputations of the organisations. Organisations need to secure their vulnerable systems with a robust cyber security implementation. These organisations require recommendations from cyber security experts to select a cyber security solution that suits their needs, thus preventing or lowering the impact of further incidents. This report documents the solution that has been created to gather and conduct analysis on cyber security incidents. The objective of the solution is to gather data from multiple different sources and compiling it for further analysis. Many different naming conventions have been used by the data sources which must be parsed, based on a taxonomy, to reference the same schema. Subsequently, all the gathered data is stored into the database. An application with a graphical user interface is used to interact with the database and cyber security incident data can be retrieved for analysis. The results of the analysis can be visualised as graphs with the same application. Data analysis methods such as clustering and linear regression can be visualized as well. Inferences from the visualisations could therefore be made by analysts. Recommendations which are derived from the inferences could be provided to organisations and businesses affected by cyber security attacks. Informed decisions on the type of cyber attacks to defend against could be made by following the recommendations. |
first_indexed | 2024-10-01T02:33:31Z |
format | Final Year Project (FYP) |
id | ntu-10356/138005 |
institution | Nanyang Technological University |
language | English |
last_indexed | 2024-10-01T02:33:31Z |
publishDate | 2020 |
publisher | Nanyang Technological University |
record_format | dspace |
spelling | ntu-10356/1380052020-04-21T10:42:01Z Open source intelligence gathering and cyber security incident data visualisation Soh, Nicholas Yong Tat Anwitaman Datta School of Computer Science and Engineering anwitaman@ntu.edu.sg Engineering::Computer science and engineering::Computer applications Cyber security incidents have affected organisations from various industries. Malicious actors aim to cause monetary damage, destroy data records or even damage the reputations of the organisations. Organisations need to secure their vulnerable systems with a robust cyber security implementation. These organisations require recommendations from cyber security experts to select a cyber security solution that suits their needs, thus preventing or lowering the impact of further incidents. This report documents the solution that has been created to gather and conduct analysis on cyber security incidents. The objective of the solution is to gather data from multiple different sources and compiling it for further analysis. Many different naming conventions have been used by the data sources which must be parsed, based on a taxonomy, to reference the same schema. Subsequently, all the gathered data is stored into the database. An application with a graphical user interface is used to interact with the database and cyber security incident data can be retrieved for analysis. The results of the analysis can be visualised as graphs with the same application. Data analysis methods such as clustering and linear regression can be visualized as well. Inferences from the visualisations could therefore be made by analysts. Recommendations which are derived from the inferences could be provided to organisations and businesses affected by cyber security attacks. Informed decisions on the type of cyber attacks to defend against could be made by following the recommendations. Bachelor of Engineering (Computer Science) 2020-04-21T10:42:01Z 2020-04-21T10:42:01Z 2020 Final Year Project (FYP) https://hdl.handle.net/10356/138005 en SCSE19-0209 application/pdf Nanyang Technological University |
spellingShingle | Engineering::Computer science and engineering::Computer applications Soh, Nicholas Yong Tat Open source intelligence gathering and cyber security incident data visualisation |
title | Open source intelligence gathering and cyber security incident data visualisation |
title_full | Open source intelligence gathering and cyber security incident data visualisation |
title_fullStr | Open source intelligence gathering and cyber security incident data visualisation |
title_full_unstemmed | Open source intelligence gathering and cyber security incident data visualisation |
title_short | Open source intelligence gathering and cyber security incident data visualisation |
title_sort | open source intelligence gathering and cyber security incident data visualisation |
topic | Engineering::Computer science and engineering::Computer applications |
url | https://hdl.handle.net/10356/138005 |
work_keys_str_mv | AT sohnicholasyongtat opensourceintelligencegatheringandcybersecurityincidentdatavisualisation |