Araştırma Makalesi
BibTex RIS Kaynak Göster

Cyber Attack Detection Methods over Open Source Intelligence

Yıl 2019, , 577 - 593, 31.01.2019
https://doi.org/10.29130/dubited.494416

Öz

In recent years, the growing impact of cybercrime has revealed worldwide intelligence and law enforcement
agencies to overcome cyber threats. All institutions and organizations are trying to learn how to fight cybercrime
in the best possible way. With the development and expansion of internet networking technologies, it becomes
increasingly difficult to prevent cyber attacks. It is rapidly developing as an important tool for intelligence units
by collecting data on the internet to generate a comprehensive analysis of dangerous targets on the network. As
the amount of available open-source resources on the internet increases rapidly, the emerging open-source
intelligence, in other words, is more effective within the framework of OSINT methods. In this connection, advanced software tools and techniques are further developed for the effective and efficient collection and
processing of information. In this study, the concept of OSINT was discussed in all aspects for cyber attack
detection. The purpose of browsing, finding, collecting, extracting, using, verifying and analyzing the OSINT
concept through publicly available data is explained in detail. Existing efforts to use open source data for
research against cyber threats have been reviewed and examined in detail. In addition, the cyber crime
investigation framework has been proposed to combat cybercrime effectively.

Kaynakça

  • [1] M. Roozbehani, A. Povilionis, C. Schunck ve M. Talamo, “On the Fragility of Network Security Verification in Rare-Observation Regimes,” IFAC-PapersOnLine, vol. 50, no.1, pp. 411-418, 2017.
  • [2] M. Glassman ve M. J. Kang, “Intelligence in the Internet Age: The Emergence and Evolution of Open Source Intelligence (OSINT),” Computers in Human Behavior, vol. 28, no. 2, pp. 673-682, 2012.
  • [3] C. Hobbs, M. Moran ve D. Salisbury, Open Source Intelligence in the Twenty-First Century: New Approaches and Opportunities, Springer, 2012.
  • [4] R. A. Best Jr ve A. Cumming, “Open source intelligence (OSINT): Issues for congress,” Congressional Research Service Reports, Rap. 5 Aralık 2007.
  • [5] PWC cyber security, (16 Ocak 2019). [Online]. Erişim: https://www.pwc.com/us/en/increasing-it-effectiveness/publications/assets/2015-us-cybercrimesurvey.pdf.
  • [6] O. A. Hathaway, R. Crootof, P. Levitz, H. Nix, A. Nowlan, W. Perdue ve J. Spiegel, “The Law of Cyber-Attack,” California Law Review, vol. 100, pp. 817-885, 2012.
  • [7] R. Layton, C. Perez, B. Birregah, P. Watters ve M. Lemercier, “Indirect information linkage for OSINT through authorship analysis of aliases,” Pacific-Asia Conference on Knowledge Discovery and Data Mining, Gold Coast, Avustralya, 2013, pp. 36-46.
  • [8] A. S. Hulnick, “The dilemma of open sources intelligence: Is OSINT really intelligence?,” The Oxford Handbook of National Security Intelligence, New York, A.B.D: Oxford University Press, Inc., 2010.
  • [9] D. Quick ve K. K. R. Choo, “Digital forensic intelligence: Data subsets and open source intelligence (DFINT+ OSINT): A timely and cohesive mix,” Future Generation Computer Systems, vol. 78, pp. 558-567, 2018.
  • [10] G. Hribar, I. Podbregar, ve T. Ivanuša, “OSINT: a “grey zone”?,” International Journal of Intelligence and CounterIntelligence, vol. 27, no. 3, pp. 529-549, 2014.
  • [11] S. A. Stottlemyre, “HUMINT, OSINT, or something new? Defining crowdsourced intelligence,” International Journal of Intelligence and CounterIntelligence, vol. 28, no. 3, pp. 578-589, 2015.
  • [12] J. M. Carroll, “OSINT analysis using adaptive resonance theory for conterterrorism warnings,” Artificial Intelligence and Applications, pp. 756-760, 2005.
  • [13] N. Einwechter. (7 Ocak 2002). An introduction to distributed intrusion detection systems. Erişim: https://www.symantec.com/connect/articles/introduction-distributed-intrusion-detectionsystems.
  • [14] L. Benes, “OSINT, new technologies, education: Expanding opportunities and threats. A new paradigm,” Journal of Strategic Security, vol. 6, no. 5, pp. 22-37, 2013.
  • [15] Y. Benkler ve H. Masum, Collective Intelligence: Creating a Prosperous World at Peace, Oakton, Virginia, A.B.D.: Earth Intelligence Network, 2008.
  • [16] F. Schaurer ve J. Störger, “The evolution of open source intelligence (OSINT),” The Intelligencer Journal of U.S. Intelligence Studies, vol. 19, pp. 53-56, 2013.
  • [17] M. Vigil, J. Buchmann, D. Cabarcas, C. Weinert ve A. Wiesmaier, “Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: A survey,” Computers & Security, vol. 50, pp. 16-32, 2015.
  • [18] R. D. Steele, “Information peacekeeping: The purest form of war,” Challenging the United States Symmetrically and Asymmetrically: Can America be Defeated, Carlisle Barracks, A.B.D.: U.S. Army War College Strategic Studies Institute, pp. 143-171, 1998.
  • [19] N. D. Thuc, N. C. Phu, T. N. Bao ve V. T. Hai, “A Sofware Solution for Defending Against Man-in-the-Middle Attacks on Wlan,” Department of Electronic Engineering and Information Sciences, Ruhr University Bochum, Germany, 2015.
  • [20] S. Gong, C. Jaeik, ve L. Changhoon, “A Reliability Comparison Method for OSINT Validity Analysis,” IEEE Transactions on Industrial Informatics, vol. 14, no. 12, pp. 5428-5435, 2018.
  • [21 ] C. Simmons, C. Ellis, S. Shiva, D. Dasgupta ve Q. Wu, “AVOIDIT: A cyber attack taxonomy,” In Proc. of 9th Annual Symposium On Information Assurance-ASIA, 2009 vol. 14, pp. 12- 22.
  • [22] B. J. Koops, J.H. Hoepman, R. Leenes, “Open-Source Intelligence and Privacy by Design,” Computer Law & Security Review, vol. 29, no. 6, pp. 676-688, 2013.
  • [23] A. S. Hulnick, “The Downside of Open Source Intelligence,” International Journal of Intelligence and CounterIntelligence, vol. 15, no. 4, pp. 565-579, 2010.
  • [24] E. Otte ve R. Rousseau, “Social Network Analysis: A Powerful Strategy, Also for the Information Sciences,” Journal of Information Science, vol. 28, no. 6, pp. 441-453, 2002.
  • [24 ] F. Stalder ve J. Hirsh, “Open source intelligence,” First Monday, vol. 7, no. 6, 2002.
  • [25 ] C. Best, “OSINT, the internet and privacy,” 2012 European Intelligence and Security Informatics Conference, Odense, Denmark, 2012, pp. 4.
  • [26] S. Mittal, P. K. Das, V. Mulwad, A. Joshi ve T. Finin, “Cybertwitter: Using twitter to generate alerts for cybersecurity threats and vulnerabilities.,” 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, San Francisco, CA, USA, 2016, pp. 860-867.
  • [27] L. K. Johnson, (Ed.)., Handbook of Intelligence Studies, 1. Baskı, New York, A.B.D.:Routledge, 2007.
  • [28] R. Vatrapu, R. R. Mukkamala, A. Hussain ve B. Flesch, “Social Set Analysis: A Set Theoretical Approach to Big Data Analytics,” IEEE Access, vol. 4, pp. 2542-2571, 2016.
  • [29] G. Cascavilla, F. Beato, A. Burattin, M. Conti ve L. V. Mancini, “OSSINT-Open Source Social Network Intelligence an Efficient and Effective Way to Uncover" Private" Information in OSN Profiles,” Online Social Networks and Media, vol. 6, pp. 58–68, 2018.
  • [30] H. Zhang, R. Dantu ve J. W. Cangussu, “Socioscope: Human Relationship and Behavior Analysis in Social Networks,” IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans, vol. 41, no. 6, pp. 1122-1143, 2011.
  • [31] S. Wasserman ve K. Faust. “Social Network Analysis: Methods and Applications,” Cambridge, U.K.: Cambridge Univ. Press, pp. 505–555, 1994.
  • [32] S. Noubours, A. Pritzkau ve U. Schade, “NLP as an essential ingredient of effective OSINT frameworks,” IEEE Military Communications and Information Systems Conference, Canberra, Avustralya, 2013, pp. 1-7.
  • [33] M. A. Pravia, R. K. Prasanth, P. O. Arambel, C. Sidner, ve C. Y. Chong, “Generation of a fundamental data set for hard/soft information fusion,” IEEE 11th International Conference on Information Fusion, Köln, Almanya, 2008, pp. 1-8.
  • [34] D. Bradbury, “In plain view: open source intelligence,” Computer Fraud & Security, vol. 4, pp. 5-9, 2011.
  • [35] R. D. Steele, “Open source intelligence,” Handbook of Intelligence Studies, Routledge, 2007, pp. 129-147.

Açık Kaynak İstihbaratı Üzerinden Siber Saldırı Tespiti Yöntemleri

Yıl 2019, , 577 - 593, 31.01.2019
https://doi.org/10.29130/dubited.494416

Öz

Son yıllarda siber suçun gittikçe büyüyen etkisi, siber tehditlerin üstesinden gelmek için dünya çapında istihbarat
ve kanun uygulayıcı kurumlar ortaya çıkartmıştır. Tüm kurum ve kuruluşlar siber suçla en iyi şekilde nasıl
mücadele edileceğini öğrenmeye çalışmaktadır. İnternet ağ teknolojilerinin gelişmesi ve genişlemesi ile siber
saldırıları engellemek gittikçe zorlaşmaktadır. Ağdaki tehlikeli hedeflerin kapsamlı bir analizini oluşturmak için
internette açık halde bulunan verileri toplayarak istihbarat elde etmek, istihbarat birimleri için önemli bir araç
olarak hızla gelişmektedir. İnternetteki mevcut açık kaynakların miktarı hızla arttıkça, siber suçla mücadele
gelişen açık kaynak istihbaratı yani OSINT yöntemleri çerçevesinde daha etkin olmaktadır. Buna bağlı olarak
bilginin etkili ve verimli bir şekilde toplanması ve işlenmesi için gelişmiş yazılım araçları ve teknikleri daha da
gelişmektedir. Bu çalışmada, OSINT kavramı siber saldırı tespiti için her açıdan ele alınmıştır. OSINT kavramını
internet ortamında kamuya açık paylaşılan veriler üzerinden tarama, bulma, toplama, çıkarma, kullanma,
doğrulama ve analiz yaparak elde etme amaçlı destek yöntemleri detaylandırılarak anlatılmıştır. Siber tehditlere
karşı geliştiren araştırmalar için açık kaynak verilerinin kullanılmasına yönelik mevcut çabalar gözden geçirilmiş
ve detaylı bir şekilde incelenmiştir. Bunlara ek olarak, siber suçlarla etkin mücadele için siber suç soruşturma
çerçevesi önerilmiştir.

Kaynakça

  • [1] M. Roozbehani, A. Povilionis, C. Schunck ve M. Talamo, “On the Fragility of Network Security Verification in Rare-Observation Regimes,” IFAC-PapersOnLine, vol. 50, no.1, pp. 411-418, 2017.
  • [2] M. Glassman ve M. J. Kang, “Intelligence in the Internet Age: The Emergence and Evolution of Open Source Intelligence (OSINT),” Computers in Human Behavior, vol. 28, no. 2, pp. 673-682, 2012.
  • [3] C. Hobbs, M. Moran ve D. Salisbury, Open Source Intelligence in the Twenty-First Century: New Approaches and Opportunities, Springer, 2012.
  • [4] R. A. Best Jr ve A. Cumming, “Open source intelligence (OSINT): Issues for congress,” Congressional Research Service Reports, Rap. 5 Aralık 2007.
  • [5] PWC cyber security, (16 Ocak 2019). [Online]. Erişim: https://www.pwc.com/us/en/increasing-it-effectiveness/publications/assets/2015-us-cybercrimesurvey.pdf.
  • [6] O. A. Hathaway, R. Crootof, P. Levitz, H. Nix, A. Nowlan, W. Perdue ve J. Spiegel, “The Law of Cyber-Attack,” California Law Review, vol. 100, pp. 817-885, 2012.
  • [7] R. Layton, C. Perez, B. Birregah, P. Watters ve M. Lemercier, “Indirect information linkage for OSINT through authorship analysis of aliases,” Pacific-Asia Conference on Knowledge Discovery and Data Mining, Gold Coast, Avustralya, 2013, pp. 36-46.
  • [8] A. S. Hulnick, “The dilemma of open sources intelligence: Is OSINT really intelligence?,” The Oxford Handbook of National Security Intelligence, New York, A.B.D: Oxford University Press, Inc., 2010.
  • [9] D. Quick ve K. K. R. Choo, “Digital forensic intelligence: Data subsets and open source intelligence (DFINT+ OSINT): A timely and cohesive mix,” Future Generation Computer Systems, vol. 78, pp. 558-567, 2018.
  • [10] G. Hribar, I. Podbregar, ve T. Ivanuša, “OSINT: a “grey zone”?,” International Journal of Intelligence and CounterIntelligence, vol. 27, no. 3, pp. 529-549, 2014.
  • [11] S. A. Stottlemyre, “HUMINT, OSINT, or something new? Defining crowdsourced intelligence,” International Journal of Intelligence and CounterIntelligence, vol. 28, no. 3, pp. 578-589, 2015.
  • [12] J. M. Carroll, “OSINT analysis using adaptive resonance theory for conterterrorism warnings,” Artificial Intelligence and Applications, pp. 756-760, 2005.
  • [13] N. Einwechter. (7 Ocak 2002). An introduction to distributed intrusion detection systems. Erişim: https://www.symantec.com/connect/articles/introduction-distributed-intrusion-detectionsystems.
  • [14] L. Benes, “OSINT, new technologies, education: Expanding opportunities and threats. A new paradigm,” Journal of Strategic Security, vol. 6, no. 5, pp. 22-37, 2013.
  • [15] Y. Benkler ve H. Masum, Collective Intelligence: Creating a Prosperous World at Peace, Oakton, Virginia, A.B.D.: Earth Intelligence Network, 2008.
  • [16] F. Schaurer ve J. Störger, “The evolution of open source intelligence (OSINT),” The Intelligencer Journal of U.S. Intelligence Studies, vol. 19, pp. 53-56, 2013.
  • [17] M. Vigil, J. Buchmann, D. Cabarcas, C. Weinert ve A. Wiesmaier, “Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: A survey,” Computers & Security, vol. 50, pp. 16-32, 2015.
  • [18] R. D. Steele, “Information peacekeeping: The purest form of war,” Challenging the United States Symmetrically and Asymmetrically: Can America be Defeated, Carlisle Barracks, A.B.D.: U.S. Army War College Strategic Studies Institute, pp. 143-171, 1998.
  • [19] N. D. Thuc, N. C. Phu, T. N. Bao ve V. T. Hai, “A Sofware Solution for Defending Against Man-in-the-Middle Attacks on Wlan,” Department of Electronic Engineering and Information Sciences, Ruhr University Bochum, Germany, 2015.
  • [20] S. Gong, C. Jaeik, ve L. Changhoon, “A Reliability Comparison Method for OSINT Validity Analysis,” IEEE Transactions on Industrial Informatics, vol. 14, no. 12, pp. 5428-5435, 2018.
  • [21 ] C. Simmons, C. Ellis, S. Shiva, D. Dasgupta ve Q. Wu, “AVOIDIT: A cyber attack taxonomy,” In Proc. of 9th Annual Symposium On Information Assurance-ASIA, 2009 vol. 14, pp. 12- 22.
  • [22] B. J. Koops, J.H. Hoepman, R. Leenes, “Open-Source Intelligence and Privacy by Design,” Computer Law & Security Review, vol. 29, no. 6, pp. 676-688, 2013.
  • [23] A. S. Hulnick, “The Downside of Open Source Intelligence,” International Journal of Intelligence and CounterIntelligence, vol. 15, no. 4, pp. 565-579, 2010.
  • [24] E. Otte ve R. Rousseau, “Social Network Analysis: A Powerful Strategy, Also for the Information Sciences,” Journal of Information Science, vol. 28, no. 6, pp. 441-453, 2002.
  • [24 ] F. Stalder ve J. Hirsh, “Open source intelligence,” First Monday, vol. 7, no. 6, 2002.
  • [25 ] C. Best, “OSINT, the internet and privacy,” 2012 European Intelligence and Security Informatics Conference, Odense, Denmark, 2012, pp. 4.
  • [26] S. Mittal, P. K. Das, V. Mulwad, A. Joshi ve T. Finin, “Cybertwitter: Using twitter to generate alerts for cybersecurity threats and vulnerabilities.,” 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, San Francisco, CA, USA, 2016, pp. 860-867.
  • [27] L. K. Johnson, (Ed.)., Handbook of Intelligence Studies, 1. Baskı, New York, A.B.D.:Routledge, 2007.
  • [28] R. Vatrapu, R. R. Mukkamala, A. Hussain ve B. Flesch, “Social Set Analysis: A Set Theoretical Approach to Big Data Analytics,” IEEE Access, vol. 4, pp. 2542-2571, 2016.
  • [29] G. Cascavilla, F. Beato, A. Burattin, M. Conti ve L. V. Mancini, “OSSINT-Open Source Social Network Intelligence an Efficient and Effective Way to Uncover" Private" Information in OSN Profiles,” Online Social Networks and Media, vol. 6, pp. 58–68, 2018.
  • [30] H. Zhang, R. Dantu ve J. W. Cangussu, “Socioscope: Human Relationship and Behavior Analysis in Social Networks,” IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans, vol. 41, no. 6, pp. 1122-1143, 2011.
  • [31] S. Wasserman ve K. Faust. “Social Network Analysis: Methods and Applications,” Cambridge, U.K.: Cambridge Univ. Press, pp. 505–555, 1994.
  • [32] S. Noubours, A. Pritzkau ve U. Schade, “NLP as an essential ingredient of effective OSINT frameworks,” IEEE Military Communications and Information Systems Conference, Canberra, Avustralya, 2013, pp. 1-7.
  • [33] M. A. Pravia, R. K. Prasanth, P. O. Arambel, C. Sidner, ve C. Y. Chong, “Generation of a fundamental data set for hard/soft information fusion,” IEEE 11th International Conference on Information Fusion, Köln, Almanya, 2008, pp. 1-8.
  • [34] D. Bradbury, “In plain view: open source intelligence,” Computer Fraud & Security, vol. 4, pp. 5-9, 2011.
  • [35] R. D. Steele, “Open source intelligence,” Handbook of Intelligence Studies, Routledge, 2007, pp. 129-147.
Toplam 36 adet kaynakça vardır.

Ayrıntılar

Birincil Dil Türkçe
Konular Mühendislik
Bölüm Makaleler
Yazarlar

Ali Eksim 0000-0002-3424-2409

Mustafa Kara Bu kişi benim

Yayımlanma Tarihi 31 Ocak 2019
Yayımlandığı Sayı Yıl 2019

Kaynak Göster

APA Eksim, A., & Kara, M. (2019). Açık Kaynak İstihbaratı Üzerinden Siber Saldırı Tespiti Yöntemleri. Duzce University Journal of Science and Technology, 7(1), 577-593. https://doi.org/10.29130/dubited.494416
AMA Eksim A, Kara M. Açık Kaynak İstihbaratı Üzerinden Siber Saldırı Tespiti Yöntemleri. DÜBİTED. Ocak 2019;7(1):577-593. doi:10.29130/dubited.494416
Chicago Eksim, Ali, ve Mustafa Kara. “Açık Kaynak İstihbaratı Üzerinden Siber Saldırı Tespiti Yöntemleri”. Duzce University Journal of Science and Technology 7, sy. 1 (Ocak 2019): 577-93. https://doi.org/10.29130/dubited.494416.
EndNote Eksim A, Kara M (01 Ocak 2019) Açık Kaynak İstihbaratı Üzerinden Siber Saldırı Tespiti Yöntemleri. Duzce University Journal of Science and Technology 7 1 577–593.
IEEE A. Eksim ve M. Kara, “Açık Kaynak İstihbaratı Üzerinden Siber Saldırı Tespiti Yöntemleri”, DÜBİTED, c. 7, sy. 1, ss. 577–593, 2019, doi: 10.29130/dubited.494416.
ISNAD Eksim, Ali - Kara, Mustafa. “Açık Kaynak İstihbaratı Üzerinden Siber Saldırı Tespiti Yöntemleri”. Duzce University Journal of Science and Technology 7/1 (Ocak 2019), 577-593. https://doi.org/10.29130/dubited.494416.
JAMA Eksim A, Kara M. Açık Kaynak İstihbaratı Üzerinden Siber Saldırı Tespiti Yöntemleri. DÜBİTED. 2019;7:577–593.
MLA Eksim, Ali ve Mustafa Kara. “Açık Kaynak İstihbaratı Üzerinden Siber Saldırı Tespiti Yöntemleri”. Duzce University Journal of Science and Technology, c. 7, sy. 1, 2019, ss. 577-93, doi:10.29130/dubited.494416.
Vancouver Eksim A, Kara M. Açık Kaynak İstihbaratı Üzerinden Siber Saldırı Tespiti Yöntemleri. DÜBİTED. 2019;7(1):577-93.

Cited By

Türkiye’de Siber Saldırı ve Tespit Yöntemleri: Bir Literatür Taraması
Bilecik Şeyh Edebali Üniversitesi Fen Bilimleri Dergisi
Cemalettin HATİPOĞLU
https://doi.org/10.35193/bseufbd.838732