Çağatay Yücel, “An Annotated Bibliographical Survey on Cyber Intelligence for Cyber Intelligence Officers”, 8 Ocak 2014 – Yaşar Üniversitesi

Çağatay Yücel, “An Annotated Bibliographical Survey on Cyber Intelligence for Cyber Intelligence Officers”, 8 Ocak 2014

Bilgisayar Mühendisliği Bölümü Semineri #32:

cagatay-yucel Başlık: An Annotated Bibliographical Survey on Cyber Intelligence for Cyber Intelligence Officers
Konuşmacı: Çağatay Yücel, Doktora Öğrencisi
Yaşar Üniversitesi
Tarih: 8 Ocak 2014 Çarşamba
Saat: 16:30-17:15
Yer: Bilgisayar Ağları Laboratuvarı C126
Sunum Dili: İngilizce

Abstract: Since 2008, Cyberspace is officially regarded as a distinct military domain, along with land, sea and air for many countries (Goel, 2011). Several nations are developing defensive and offensive cyber capabilities for this domain. The nature of this warfare in cyberspace is radically different than the traditional warfare; as the attacks are more remote, stealthily and it may be impossible to detect the identity of the adversary (Greengard, 2010). Moreover, the time parameter becomes extremely important in this domain since conducting an attack takes only seconds even the target is at the globally farthest point possible. Therefore, the power and impacts of cyber operations are limited by fast computation and transmission skills of your front.

Nations need intelligence in this relatively new domain of war in order to know the strengths and weaknesses of the other nations and themselves. With cyber intelligence of high quality, nations can assess the effects of attacks; detect their vulnerabilities therefore mitigating the risks and implement cyber security processes based on well defined decisions (Rudner, 2013). This paper presents a literature survey on computer science methodologies that can be useful for intelligence officers working in the cyberspace. The methodologies include defensive identification methods such as incident response strategies, social network analysis (Webber, Michael Yip and Nigel Shadbolt and Craig, 2012) (Benjamin, V. and Hsinchun Chen, 2012), intrusion detection systems (Zaman, S. and Karray, F., 2009) and anomaly detections (Varun Chandola, Arindam Banerjee, and Vipin Kumar , 2009) as well as offensive methods such as disinformation, destruction of information and communication, and advance persistent threats (APTs).