Skip to main content
Top

2022 | OriginalPaper | Chapter

Human-Machine Cooperation and Optimizing Strategies for Cyberspace OSINT Analysis

Authors : Jianfeng Chen, Ling Zhang, Xian Luo, Chunhui Hu

Published in: Human Interaction, Emerging Technologies and Future Systems V

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Cyberspace open-source intelligence is a subset of open-source intelligence that mainly pay attention to the information that reflects tactics, technology, procedures, behaviors, events, and other elements which are valuable for cyberspace defenders to gain an advantage in finding out what is happening, why is it happening and how to deal with troubles concerning cyberspace environments. As the scale and complexity of cyberspace continue to rise, nobody could process that increasing amount of data in time. To extract important information from fragments of observing results, it is necessary to strengthen human-machine cooperation in the intelligence domain for better accuracy, insight, and efficiency. From the viewpoint of space dimension, time dimension, and layer model of intelligence-organization, the desired relationship between human and machine and their respective duties are investigated by model-based methodology research, while corresponding suggestions are purposed for better analysis accuracy, insight, and efficiency in the future.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Lenders, V., Tanner, A., Blarer, A.: Gaining an edge in cyberspace with advanced situational awareness. IEEE Secur. Priv. 13(2), 65–74 (2015)CrossRef Lenders, V., Tanner, A., Blarer, A.: Gaining an edge in cyberspace with advanced situational awareness. IEEE Secur. Priv. 13(2), 65–74 (2015)CrossRef
3.
go back to reference Evangelista, J.R.G., Sassi, R.J., Romero, M., Napolitano, D.: Systematic literature review to investigate the application of open source intelligence (OSINT) with artificial intelligence. J. Appl. Secur. Res. 16(3), 345–369 (2020) Evangelista, J.R.G., Sassi, R.J., Romero, M., Napolitano, D.: Systematic literature review to investigate the application of open source intelligence (OSINT) with artificial intelligence. J. Appl. Secur. Res. 16(3), 345–369 (2020)
4.
go back to reference Liao, X., Yuan, K., Wang, X.F., et al.: Acing the IOC game: toward automatic discovery and analysis of open-source cyber threat intelligence. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 755–766 (2016) Liao, X., Yuan, K., Wang, X.F., et al.: Acing the IOC game: toward automatic discovery and analysis of open-source cyber threat intelligence. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 755–766 (2016)
5.
go back to reference Lyn Paul, C., Blaha, L.M., Fallon, C.K., et al.: Opportunities and challenges for human-machine teaming in cybersecurity operations. Proc. Hum. Factors Ergon. Soc. Annu. Meet. 63(1), 442–446 (2019)CrossRef Lyn Paul, C., Blaha, L.M., Fallon, C.K., et al.: Opportunities and challenges for human-machine teaming in cybersecurity operations. Proc. Hum. Factors Ergon. Soc. Annu. Meet. 63(1), 442–446 (2019)CrossRef
6.
7.
go back to reference Obrst, L., Chase, P., Markeloff, R.: Developing an ontology of the cyber security domain. In: STIDS, pp. 49–56 (2012) Obrst, L., Chase, P., Markeloff, R.: Developing an ontology of the cyber security domain. In: STIDS, pp. 49–56 (2012)
8.
go back to reference Barnum, S.: Standardizing cyber threat intelligence information with the structured threat information expression (STIX). Mitre Corp. 11, 1–22 (2012) Barnum, S.: Standardizing cyber threat intelligence information with the structured threat information expression (STIX). Mitre Corp. 11, 1–22 (2012)
Metadata
Title
Human-Machine Cooperation and Optimizing Strategies for Cyberspace OSINT Analysis
Authors
Jianfeng Chen
Ling Zhang
Xian Luo
Chunhui Hu
Copyright Year
2022
DOI
https://doi.org/10.1007/978-3-030-85540-6_80

Premium Partner