Abstract
Cyber-Threat Intelligence (CTI) is an acknowledged concept both by professionals and academia. This well-known notion was synthesized through interdisciplinary and multidisciplinary subspecialties of Cyber-Intelligence (CI). The CI concept focuses on extracting pure intelligence reports and cyber-perspectives through available information sources, including the deep/dark web. It also discloses possible threats, risks, attack campaigns, espionage, and exposure operations. Focusing on the clear and dark side of the Internet is not enough to feed CI; for an accurate and richer stream of information, the Internet of Things (IoT) concept needs to be clarified and integrated into the entire CI lifecycle. The process includes extracting information through various sources using different methodologies and techniques and by applying the proposed aggregation function/methodology models for continuous development of the CI lifecycle. This chapter focuses on the fundamentals of the CI concentrations such as Open-Source Intelligence (OSINT ), Human Intelligence (HUMINT ), Technical Intelligence (TECHINT ), and the IoT vision in order to propose a proactive CYBer-INTelligence (CYBINT) aggregation approach model. The proposed model depends on practical tools and approaches that are part of the proactive defenses and analyzing strategies.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
EY Global (2015) Cybersecurity and the Internet of Things, March 2015. https://www.ey.com/Publication/vwLUAssets/EY-cybersecurity-and-the-internet-of-things/%24FILE/EY-cybersecurity-and-the-internet-of-things.pdf. Accessed 1 Nov 2018
Cunningham T (2015) A cyber-threat intelligence program—how to develop one and why it matters (Unpublished doctoral dissertation). Luleå University of Technology
Eom J (2014) Roles and responsibilities of cyber intelligence for cyber operations in cyberspace. Int J Softw Eng Appl 8(9):137–146
Köseli M (2015) Bilimsel Araştırma Yöntemlerinin İstihbarat Analizinde Kullanılması. J Secur Strateg 21(11):87–117
Richards J (2010) The art & science of intelligence analysis. Oxford University Press, USA
Marrin S (2011) Improving intelligence analysis: bridging the gap between scholarship and practice. Routledge, New York
Antonio A (2013) Open source information, the future of intelligence. http://www.euintelligenceacademy.eu/sites/eia/files/EIA_REPORT_2013.pdf. Accessed 1 Nov 2018
Almeida F (2017) Concept and dimensions of web 4.0. Int J Comput Technol V16:N7
Sari A, Kilic S (2017) Exploiting cryptocurrency miners with OSINT techniques. Trans Netw Commun V5:N6
Sari A (2018) Countrywide virtual siege in the new era of cyber warfare: remedies from the cyber-firewall: Seddulbahir. J Cyber Secur Technol. https://doi.org/10.1080/23742917.2018.1476956
Prolexic Attack Report, Prolexic believes the nature of DDoS attacks are changing: they are becoming more concentrated and damaging. Quarter 4, 2011, Akamai Technologies, DC, USA
Akamai Technologies (2011) Prolexic Attack Report, Financial services firms get hit by DDoS attacks as malicious packet volume increases 3.000% quarter over quarter, Quarter 1, 2012, Akamai Technologies, DC, USA. https://www.akamai.com/us/en/multimedia/documents/content/akamai-quarterly-global-attack-report-q4-2013-white-paper.pdf. Accessed 5 November 2018
Burchfield RW (1996) Fowler’s modern english usage (3rd ed.). Oxford: Clarendon Press. pp 197–198. ISBN 0-19- 869126-2
Felix TM (2018) Unified cyber threat intelligence, (Unpublished doctoral dissertation). Universidade De Lisboa
Vardangalos G (2016) Cyber-intelligence and Cyber Counterintelligence (CCI): General definitions and principles. KEDISA
Luciano F (2005) Is Information meaningful data? The Standard Definition of Information, Philosophy and Phenomenological Research, pp 351–370
Thomas EA (2017) Use of cyber threat intelligence in security operation center. CreateSpace Independent Publishing Platform, USA
Sari A (2018) Context-aware intelligent systems for fog computing environments for cyber threat intelligence. Springer International Publishing AG, Part of Springer Nature 2018
Bautistia J (2018) Practical cyber intelligence. Packet Publishing, ISBN 978-1-78862-556-2
Omand D, Bartlett J, Miller C (2012) Introducing social media intelligence (SOCMINT). IntellNat Secur 27(6):801–823
Butler R (2004) Review of intelligence on weapons of mass destruction. UK House of Commons, HC 898, July 14
Enisa (2017) Exploring the opportunities and limitations of current threat intelligence platforms. https://www.enisa.europa.eu/publications/exploring-the-opportunities-andlimitations-of-current-threat-intelligence-platforms/at_download/fullReport Accesses 10 September 2018
EclecticIQ (2017) A stakeholder-centric approach to building a cyber threat intelligence (CTI) practice. https://www.eclecticiq.com/downloads/EclecticIQ-White-Paper-A-Stakeholder-CentricApproach-to-Building-a-Cyber-Threat-Intelligence-Practice.pdf. Accessed 15 Sept 2018
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Can Atasoy, U., Sari, A. (2019). Multidisciplinary Intel Fusion Technique for Proactive Cyber-Intelligence Model for the IoT. In: Mahmood, Z. (eds) Security, Privacy and Trust in the IoT Environment. Springer, Cham. https://doi.org/10.1007/978-3-030-18075-1_4
Download citation
DOI: https://doi.org/10.1007/978-3-030-18075-1_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-18074-4
Online ISBN: 978-3-030-18075-1
eBook Packages: Computer ScienceComputer Science (R0)