Open Source Intelligence

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 7182 Experts worldwide ranked by ideXlab platform

Daniel Zeng - One of the best experts on this subject based on the ideXlab platform.

  • message from 2013 international symposium on foundations of Open Source Intelligence and security informatics chairs
    Advances in Social Networks Analysis and Mining, 2013
    Co-Authors: Zeki Erdem, Triant G Flouris, Uwe Glasser, David B Skillicorn, Daniel Zeng
    Abstract:

    The International Symposium on Foundations of Open Source Intelligence and Security Informatics (FOSINT-SI 2013, Niagara Falls, ON, Canada, 26–27 August 2013) provides a unique international forum for academic researchers, government professionals and industrial practitioners to socialize, share their ideas, and exchange their data, knowledge, and expertise. Terrorism and crime threaten the international community and our society more than ever before. Criminal networks and terrorist groups that often operate globally try to hide their illegal activities by using advanced information and communications technology. They communicate easier and form global communities that are hard to track. Fortunately, reSources like social media, event logs, phone call logs, web logs, and other time series data, constitute a rich Source for knowledge discovery. There is a serious need for innovative techniques and tools capable of achieving the ultimate goal of early warning to help detecting, identifying and neutralizing the Source of a threat. Motivated by this need with high social impact, research related to Open Source Intelligence and security informatics is gaining momentum in academia, industry, law enforcement and Intelligence agencies. Developing effective knowledge discovery methods, techniques and tools to combat crime and terrorism requires coordinated and intensified collaborations across these communities. After the careful review of submitted papers by 90 expert reviewers, about 20 papers were finally accepted.

  • story extraction from the web a case study in security informatics
    International Conference on Service Operations and Logistics and Informatics, 2010
    Co-Authors: Wenji Mao, Daniel Zeng
    Abstract:

    Open Source Intelligence is becoming more and more important in security-related applications. Effective extraction of valuable information from these Intelligence Sources so as to understand the content of Intelligence is one of the central issues in security domain. To address this key problem, this paper studies how to extract domain events and generate story representation of the events. We implement a story extraction platform (SEP) which applies pattern matching to extract events from Web news and organizes events based on theme using narrative structure. We also design extraction rules, use domain-specific features and employ ontology to facilitate story extraction in SEP. The experimental results show the effectiveness of our system in security informatics.

Jong Hyuk Park - One of the best experts on this subject based on the ideXlab platform.

  • blockchain based cyber threat Intelligence system architecture for sustainable computing
    Sustainability, 2020
    Co-Authors: Jeonghun Cha, Sushil Kumar Singh, Yi Pan, Jong Hyuk Park
    Abstract:

    Nowadays, the designing of cyber-physical systems has a significant role and plays a substantial part in developing a sustainable computing ecosystem for secure and scalable network architecture. The introduction of Cyber Threat Intelligence (CTI) has emerged as a new security system to mitigate existing cyber terrorism for advanced applications. CTI demands a lot of requirements at every step. In particular, data collection is a critical Source of information for analysis and sharing; it is highly dependent on the reliability of the data. Although many feeds provide information on threats recently, it is essential to collect reliable data, as the data may be of unknown origin and provide information on unverified threats. Additionally, effective reSource management needs to be put in place due to the large volume and diversity of the data. In this paper, we propose a blockchain-based cyber threat Intelligence system architecture for sustainable computing in order to address issues such as reliability, privacy, scalability, and sustainability. The proposed system model can cooperate with multiple feeds that collect CTI data, create a reliable dataset, reduce network load, and measure organizations’ contributions to motivate participation. To assess the proposed model’s effectiveness, we perform the experimental analysis, taking into account various measures, including reliability, privacy, scalability, and sustainability. Experimental results of evaluation using the IP of 10 Open Source Intelligence (OSINT) CTI feeds show that the proposed model saves about 15% of storage space compared to total network reSources in a limited test environment.

Babak Akhgar - One of the best experts on this subject based on the ideXlab platform.

Jeonghun Cha - One of the best experts on this subject based on the ideXlab platform.

  • blockchain based cyber threat Intelligence system architecture for sustainable computing
    Sustainability, 2020
    Co-Authors: Jeonghun Cha, Sushil Kumar Singh, Yi Pan, Jong Hyuk Park
    Abstract:

    Nowadays, the designing of cyber-physical systems has a significant role and plays a substantial part in developing a sustainable computing ecosystem for secure and scalable network architecture. The introduction of Cyber Threat Intelligence (CTI) has emerged as a new security system to mitigate existing cyber terrorism for advanced applications. CTI demands a lot of requirements at every step. In particular, data collection is a critical Source of information for analysis and sharing; it is highly dependent on the reliability of the data. Although many feeds provide information on threats recently, it is essential to collect reliable data, as the data may be of unknown origin and provide information on unverified threats. Additionally, effective reSource management needs to be put in place due to the large volume and diversity of the data. In this paper, we propose a blockchain-based cyber threat Intelligence system architecture for sustainable computing in order to address issues such as reliability, privacy, scalability, and sustainability. The proposed system model can cooperate with multiple feeds that collect CTI data, create a reliable dataset, reduce network load, and measure organizations’ contributions to motivate participation. To assess the proposed model’s effectiveness, we perform the experimental analysis, taking into account various measures, including reliability, privacy, scalability, and sustainability. Experimental results of evaluation using the IP of 10 Open Source Intelligence (OSINT) CTI feeds show that the proposed model saves about 15% of storage space compared to total network reSources in a limited test environment.

Sushil Kumar Singh - One of the best experts on this subject based on the ideXlab platform.

  • blockchain based cyber threat Intelligence system architecture for sustainable computing
    Sustainability, 2020
    Co-Authors: Jeonghun Cha, Sushil Kumar Singh, Yi Pan, Jong Hyuk Park
    Abstract:

    Nowadays, the designing of cyber-physical systems has a significant role and plays a substantial part in developing a sustainable computing ecosystem for secure and scalable network architecture. The introduction of Cyber Threat Intelligence (CTI) has emerged as a new security system to mitigate existing cyber terrorism for advanced applications. CTI demands a lot of requirements at every step. In particular, data collection is a critical Source of information for analysis and sharing; it is highly dependent on the reliability of the data. Although many feeds provide information on threats recently, it is essential to collect reliable data, as the data may be of unknown origin and provide information on unverified threats. Additionally, effective reSource management needs to be put in place due to the large volume and diversity of the data. In this paper, we propose a blockchain-based cyber threat Intelligence system architecture for sustainable computing in order to address issues such as reliability, privacy, scalability, and sustainability. The proposed system model can cooperate with multiple feeds that collect CTI data, create a reliable dataset, reduce network load, and measure organizations’ contributions to motivate participation. To assess the proposed model’s effectiveness, we perform the experimental analysis, taking into account various measures, including reliability, privacy, scalability, and sustainability. Experimental results of evaluation using the IP of 10 Open Source Intelligence (OSINT) CTI feeds show that the proposed model saves about 15% of storage space compared to total network reSources in a limited test environment.