OSINT investigation to detect and prevent cyber attacks and cyber security incidents

Authors

  • Oleksandr Puchkov Institute of special communication and information protection of National technical university of Ukraine “Igor Sikorsky Kyiv polytechnic institute”, Kyiv, Ukraine https://orcid.org/0000-0002-8585-1044
  • Dmytro Lande Institute for information recording of National academy of science of Ukraine, Kyiv, Ukraine https://orcid.org/0000-0003-3945-1178
  • Ihor Subach Institute of special communication and information protection of National technical university of Ukraine “Igor Sikorsky Kyiv polytechnic institute”, Kyiv, Ukraine https://orcid.org/0000-0002-9344-713X
  • Mykhailo Boliukh Institute of special communication and information protection of National technical university of Ukraine “Igor Sikorsky Kyiv polytechnic institute”, Kyiv, Ukraine https://orcid.org/0000-0001-8984-7686
  • Dmytro Nahornyi Institute of special communication and information protection of National technical university of Ukraine “Igor Sikorsky Kyiv polytechnic institute”, Kyiv, Ukraine https://orcid.org/0000-0002-3699-7880

DOI:

https://doi.org/10.20535/2411-1031.2021.9.2.249921

Keywords:

cyber security, cyber security incident, open source intelligence, big data

Abstract

A methodology for investigating and predicting cyber incidents based on the use of open sources of information and freely available open source software is offered and substantiated. The suggested methodology refers to such types of methodologies as Open Source Intelligence (OSINT). In addition, it is based on technologies of monitoring the modern Internet space, the concept of processing large amounts of data (Big Data), complex networks (Complex Networks), and extracting knowledge from text arrays (Text Mining). The components of the keyword detection technology (NLTK, Natural Language Toolkit), concepts (SpaCy, NLP), graph visualization and analysis systems are considered in detail. The main idea of analyzing large amounts of data on cybersecurity from the Internet space is to use methods and tools for collecting data using global search engines, aggregating information flows and mining the data obtained. The technique is based on the implementation of such functions as the collection of relevant information from certain information resources using the capabilities of global search engines; automatic scanning and primary processing of information from websites; formation of full-text arrays of information; analysis of text messages, determination of sentiment, formation of analytical reports; integration with a geographic information system; analysis and visualization of information reports; research of dynamics of thematic information flows; forecasting the development of events based on the analysis of the dynamics of publications in the Internet space. In the analytical mode, a number of tools are implemented for graphical presentation of data dynamics, displayed as a time series of the number of messages per day matching to a specific cyber incident, viewing plots from messages on the topic of cyber incidents, clusters grouped by the cluster analysis algorithm. Within the framework of the methodology, it is provided for the formation and inclusion of networks in operational reports from concepts matching to people, organizations, information sources, allowing to explore the relationship between them.

Author Biographies

Oleksandr Puchkov, Institute of special communication and information protection of National technical university of Ukraine “Igor Sikorsky Kyiv polytechnic institute”, Kyiv

candidate of philosophy science, professor, head

Dmytro Lande, Institute for information recording of National academy of science of Ukraine, Kyiv

doctor of technical sciences, professor, head at the specialized modeling tools department

Ihor Subach, Institute of special communication and information protection of National technical university of Ukraine “Igor Sikorsky Kyiv polytechnic institute”, Kyiv

doctor of technical sciences, associate professor, head at the cybersecurity and application of information systems and technologies academic department

Mykhailo Boliukh, Institute of special communication and information protection of National technical university of Ukraine “Igor Sikorsky Kyiv polytechnic institute”, Kyiv

master’s student

Dmytro Nahornyi, Institute of special communication and information protection of National technical university of Ukraine “Igor Sikorsky Kyiv polytechnic institute”, Kyiv

master’s student

References

D. Lande, and E. Shnurko-Tabakova, “OSINT as a part of cyber defense system”, Theoretical and Applied Cybersecurity, no. 1, pp. 103-108, 2019, doi: https://doi.org/10.20535/tacs.2664-29132019.1.169091.

B. Akhgar, P. S. Bayerl, and F. Sampson, Open Source Intelligence Investigation. From Strategy to Implementation. Cham: Springer International Publishing AG, 2016.

N. Memon, and R. Reda Alhajj, Counterterrorism and Open Source Intelligence. Wien, Austria: Springer-Verlag, 2011.

D. Lande, I. Subach, and A. Puchkov, “System of Analysis of Big Data from Social Media”, Information & Security: An International Journal, vol. 47, no. 1, pp. 44-61, 2020, doi: https://doi.org/10.11610/isij.4703.

D. V. Lande, I. Yu. Subach, and Yu. Ye. Boyarinova, Fundamentals of the theory and practice of data mining in the field of cyber security. Kyiv: Institute of Special Communications and Information Protection of National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”, 2018.

D. Lande, “Information Streams Analysis in the Global Computer Networks”, Visnyk NAS of Ukraine, no. 3, pp. 46-54, 2017, doi: https://doi.org/10.15407/visn2017.03.045.

N. Astafieva, “Wavelet analysis: bases of the theory and examples of application”, Achievements of physical sciences, iss. 11, pp. 1145-1170, 1996.

A. Dodonov, D. Lande, V. Tsyganok, O. Andriichuk, S. Kadenko, and A. Graivoronskaya, Information Operations Recognition. From Nonlinear Analysis to Decision-Making. Kiev: Lambert Academic Publishing, 2019.

D. Sornette, Why Stock Markets Crash: Critical Events in Complex Financial Systems. Princeton: Princeton University Press, 2004, doi: https://doi.org/10.23943/princeton/9780691175959.001.0001.

D. Sornette, How to predict the collapse of financial markets. Critical events in complex financial systems. Princeton: Litres, 2017.

D. Lande, and I. Subach, Visualization and analysis of network structures. Kyiv: National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”, Politekhnika, 2021.

Downloads

Published

2021-12-30

How to Cite

Puchkov, O., Lande, D., Subach, I., Boliukh, M., & Nahornyi, D. (2021). OSINT investigation to detect and prevent cyber attacks and cyber security incidents. Collection "Information Technology and Security", 9(2), 209–218. https://doi.org/10.20535/2411-1031.2021.9.2.249921

Issue

Section

CYBERSECURITY AND CRITICAL INFRASTRUCTURE PROTECTION