Skip to main content

Multidisciplinary Intel Fusion Technique for Proactive Cyber-Intelligence Model for the IoT

  • Chapter
  • First Online:
Security, Privacy and Trust in the IoT Environment

Abstract

Cyber-Threat Intelligence (CTI) is an acknowledged concept both by professionals and academia. This well-known notion was synthesized through interdisciplinary and multidisciplinary subspecialties of Cyber-Intelligence (CI). The CI concept focuses on extracting pure intelligence reports and cyber-perspectives through available information sources, including the deep/dark web. It also discloses possible threats, risks, attack campaigns, espionage, and exposure operations. Focusing on the clear and dark side of the Internet is not enough to feed CI; for an accurate and richer stream of information, the Internet of Things (IoT) concept needs to be clarified and integrated into the entire CI lifecycle. The process includes extracting information through various sources using different methodologies and techniques and by applying the proposed aggregation function/methodology models for continuous development of the CI lifecycle. This chapter focuses on the fundamentals of the CI concentrations such as Open-Source Intelligence (OSINT ), Human Intelligence (HUMINT ), Technical Intelligence (TECHINT ), and the IoT vision in order to propose a proactive CYBer-INTelligence (CYBINT) aggregation approach model. The proposed model depends on practical tools and approaches that are part of the proactive defenses and analyzing strategies.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 179.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. EY Global (2015) Cybersecurity and the Internet of Things, March 2015. https://www.ey.com/Publication/vwLUAssets/EY-cybersecurity-and-the-internet-of-things/%24FILE/EY-cybersecurity-and-the-internet-of-things.pdf. Accessed 1 Nov 2018

  2. Cunningham T (2015) A cyber-threat intelligence program—how to develop one and why it matters (Unpublished doctoral dissertation). Luleå University of Technology

    Google Scholar 

  3. Eom J (2014) Roles and responsibilities of cyber intelligence for cyber operations in cyberspace. Int J Softw Eng Appl 8(9):137–146

    Google Scholar 

  4. Köseli M (2015) Bilimsel Araştırma Yöntemlerinin İstihbarat Analizinde Kullanılması. J Secur Strateg 21(11):87–117

    Google Scholar 

  5. Richards J (2010) The art & science of intelligence analysis. Oxford University Press, USA

    Google Scholar 

  6. Marrin S (2011) Improving intelligence analysis: bridging the gap between scholarship and practice. Routledge, New York

    Google Scholar 

  7. Antonio A (2013) Open source information, the future of intelligence. http://www.euintelligenceacademy.eu/sites/eia/files/EIA_REPORT_2013.pdf. Accessed 1 Nov 2018

  8. Almeida F (2017) Concept and dimensions of web 4.0. Int J Comput Technol V16:N7

    Google Scholar 

  9. Sari A, Kilic S (2017) Exploiting cryptocurrency miners with OSINT techniques. Trans Netw Commun V5:N6

    Google Scholar 

  10. Sari A (2018) Countrywide virtual siege in the new era of cyber warfare: remedies from the cyber-firewall: Seddulbahir. J Cyber Secur Technol. https://doi.org/10.1080/23742917.2018.1476956

    Article  Google Scholar 

  11. Prolexic Attack Report, Prolexic believes the nature of DDoS attacks are changing: they are becoming more concentrated and damaging. Quarter 4, 2011, Akamai Technologies, DC, USA

    Google Scholar 

  12. Akamai Technologies (2011) Prolexic Attack Report, Financial services firms get hit by DDoS attacks as malicious packet volume increases 3.000% quarter over quarter, Quarter 1, 2012, Akamai Technologies, DC, USA. https://www.akamai.com/us/en/multimedia/documents/content/akamai-quarterly-global-attack-report-q4-2013-white-paper.pdf. Accessed 5 November 2018

  13. Burchfield RW (1996) Fowler’s modern english usage (3rd ed.). Oxford: Clarendon Press. pp 197–198. ISBN 0-19- 869126-2

    Google Scholar 

  14. Felix TM (2018) Unified cyber threat intelligence, (Unpublished doctoral dissertation). Universidade De Lisboa

    Google Scholar 

  15. Vardangalos G (2016) Cyber-intelligence and Cyber Counterintelligence (CCI): General definitions and principles. KEDISA

    Google Scholar 

  16. Luciano F (2005) Is Information meaningful data? The Standard Definition of Information, Philosophy and Phenomenological Research, pp 351–370

    Google Scholar 

  17. Thomas EA (2017) Use of cyber threat intelligence in security operation center. CreateSpace Independent Publishing Platform, USA

    Google Scholar 

  18. Sari A (2018) Context-aware intelligent systems for fog computing environments for cyber threat intelligence. Springer International Publishing AG, Part of Springer Nature 2018

    Google Scholar 

  19. Bautistia J (2018) Practical cyber intelligence. Packet Publishing, ISBN 978-1-78862-556-2

    Google Scholar 

  20. Omand D, Bartlett J, Miller C (2012) Introducing social media intelligence (SOCMINT). IntellNat Secur 27(6):801–823

    Article  Google Scholar 

  21. Butler R (2004) Review of intelligence on weapons of mass destruction. UK House of Commons, HC 898, July 14

    Google Scholar 

  22. Enisa (2017) Exploring the opportunities and limitations of current threat intelligence platforms. https://www.enisa.europa.eu/publications/exploring-the-opportunities-andlimitations-of-current-threat-intelligence-platforms/at_download/fullReport Accesses 10 September 2018

  23. EclecticIQ (2017) A stakeholder-centric approach to building a cyber threat intelligence (CTI) practice. https://www.eclecticiq.com/downloads/EclecticIQ-White-Paper-A-Stakeholder-CentricApproach-to-Building-a-Cyber-Threat-Intelligence-Practice.pdf. Accessed 15 Sept 2018

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Arif Sari .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Can Atasoy, U., Sari, A. (2019). Multidisciplinary Intel Fusion Technique for Proactive Cyber-Intelligence Model for the IoT. In: Mahmood, Z. (eds) Security, Privacy and Trust in the IoT Environment. Springer, Cham. https://doi.org/10.1007/978-3-030-18075-1_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-18075-1_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-18074-4

  • Online ISBN: 978-3-030-18075-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics