Mostrar el registro sencillo del ítem

dc.contributor.authorHernandez Mediná, Martin Jose
dc.contributor.authorPinzón Hernández, Cristian Camilo
dc.contributor.authorDíaz López, Daniel Orlando
dc.contributor.authorGarcia Ruiz, Juan Carlos
dc.contributor.authorPinto Rico, Ricardo Andrés
dc.date.accessioned2021-05-20T23:11:38Z
dc.date.accessioned2021-10-01T17:22:49Z
dc.date.available2021-05-20
dc.date.available2021-10-01T17:22:49Z
dc.date.issued2018
dc.identifier.issn1794-211X
dc.identifier.issn2322-939X
dc.identifier.urihttps://repositorio.escuelaing.edu.co/handle/001/1459
dc.description.abstractOpen source intelligence (OSINT) is used to obtain and analyze information related to adversaries, so it can support risk assessments aimed to prevent damages against critical assets. This paper presents a research about different OSINT technologies and how these can be used to perform cyber intelligence tasks. One of the key components in the operation of OSINT tools are the “transforms”, which are used to establish relations between entities of information from queries to different open sources. A set of transforms addressed to the Colombian context are presented, which were implemented and contributed to the community allowing to the law enforcement agencies to develop information gathering process from Colombian open sources. Additionally, this paper shows the implementation of three machine learning models used to perform sentiment analysis over the information obtained from an adversary. Sentiment analysis can be extremely useful to understand the motivation that an adversary can have and, in this way, define proper cyber defense strategies. Finally, some challenges related to the application of OSINT techniques are identified and described.eng
dc.description.abstractLa Inteligencia de fuentes abiertas (OSINT) es una rama de la ciber inteligencia usada para obtener y analizar información relacionada a posibles adversarios, para que esta pueda apoyar evaluaciones de riesgo y ayudar a prevenir afectaciones contra activos críticos. Este artículo presenta una investigación acerca de diferentes tecnologías OSINT y como estas pueden ser usadas para desarrollar tareas de ciber inteligencia de una nación. Un conjunto de transformadas apropiadas para un contexto colombiano son presentadas y contribuidas a la comunidad, permitiendo a organismos de seguridad adelantar procesos de recolección de información de fuentes abiertas colombianas. Sin embargo, el verdadero aprovechamiento de la información recolectada se da mediante la implementación de tres modelos de aprendizaje automático usados para desarrollar análisis de sentimientos sobre dicha información, con el fin de saber la posición del adversario respecto a determinados temas y así entender la motivación que puede tener, lo cual permite definir estrategias de ciberdefensa apropiadas. Finalmente, algunos desafíos relacionados a la aplicación de técnicas OSINT también son identificados y descritos al respecto de su aplicación por agencias de seguridad del estado.spa
dc.format.extent20 páginasspa
dc.format.mimetypeapplication/pdfspa
dc.language.isoengspa
dc.publisherUniversidad Distrital Francisco José de Caldas-Facultad Tecnológicaspa
dc.rights.urihttps://creativecommons.org/licenses/by/4.0/spa
dc.sourcehttps://revistas.udistrital.edu.co/index.php/vinculos/article/view/13504spa
dc.titleOpen source intelligence (OSINT) as support of cybersecurity operations. Use of OSINT in a colombian context and sentiment Analysisspa
dc.title.alternativeInteligencia de fuentes abierta (OSINT) para operaciones de ciberseguridad. “Aplicación de OSINT en un contexto colombiano y análisis de sentimientosspa
dc.typeArtículo de revistaspa
dc.description.notesEstudiante Ingeniería de Sistemas. Escuela Colombiana de Ingeniería Julio Garavito. Correo electrónico: ricardo.pinto@mail.escuelaing.edu.co Estudiante Ingeniería de Sistemas. Escuela Colombiana de Ingeniería Julio Garavito. Correo electrónico: martin.hernandez@mail.escuelaing.edu.co Estudiante Ingeniería de Sistemas. Escuela Colombiana de Ingeniería Julio Garavito. Correo electrónico: cristian.pinzon@mail.escuelaing.edu.co Doctor en Informática; profesor asistente, Escuela Colombiana de Ingeniería Julio Garavito. Correo electrónico: daniel.diaz@escuelaing.edu.co Especialista en Seguridad Informática; jefe División de Ciberdefensa, Dirección de Cibernética Naval. Armada Nacional. Correo electrónico: juan.garciaru@armada.mil.coA+T AcTuAlidAd TecnologicAspa
dc.type.versioninfo:eu-repo/semantics/publishedVersionspa
oaire.accessrightshttp://purl.org/coar/access_right/c_abf2spa
oaire.versionhttp://purl.org/coar/version/c_970fb48d4fbd8a85spa
dc.contributor.researchgroupCTG-Informáticaspa
dc.identifier.doihttps://doi.org/10.14483/2322939X.13504
dc.identifier.urlhttps://revistas.udistrital.edu.co/index.php/vinculos/article/view/13504
dc.publisher.placeColombiaspa
dc.relation.citationendpage214spa
dc.relation.citationissue2spa
dc.relation.citationstartpage195spa
dc.relation.citationvolume15spa
dc.relation.indexedN/Aspa
dc.relation.ispartofjournalVinculosspa
dc.relation.referencesM. Glassman and M. J. Kang, “Intelligence in the internet age: The emergence and evolu-tion of Open Source Intelligence (OSINT)”, Computers in Human Behavior, vol. 28, no. 2, pp. 673–682, 2012, https://doi.org/10.1016/j.chb.2011.11.014spa
dc.relation.referencesL. brotherston and A. berlin, “Defensive se-curity handbook: best practices for securing infrastructure”. O’Reilly Media, 2017spa
dc.relation.referencesW. Alcorn, C. Frichot, and M. Orrù, “The brow-ser hacker’s handbook”,New Jersey: John Wiley and Sons, 2014.spa
dc.relation.referencesM. Gregg, “Certified Ethical Hacker (CEH) Ver-sion 9 Cert Guide” London: Pearson Education, 2017.spa
dc.relation.referencesP. Engebretson, “The basics of hacking and pe-netration testing” Syngressr Publishing, 2013.spa
dc.relation.referencesD. bradbury, “In plain view: open source inte-lligence”, Computers in Human Behavior, no. 4, pp. 5–9, 2011.spa
dc.relation.referencesb. de S. G. Rodrigues, “Open-source intelligen-ce em sistemas SIEM” Lisboa: Universidade de Lisboa, 2015.spa
dc.relation.referencesC. Pérez, “Minería de datos: técnicas y herra-mientas” Paraninfo Cengage Learning, 2007.spa
dc.relation.referencesG. Subramanian, “R Data analysis projects: build end to end analytics systems to get deeper insights from your data”, birmingham: Packt Publishing, 2017.spa
dc.relation.referencesL. Zhang and b. Liu, “Sentiment Analysis and Opinion Mining”. in Encyclopedia of Ma-chine Learning and Data Mining, boston: Springer, 2017, pp. 1152–1161, https://doi.org/10.1007/978-1-4899-7687-1_907spa
dc.relation.referencesE. Cambria, b. Schuller, Y. Xia, and C. Havasi, “New Avenues in Opinion Mining and Senti-ment Analysis”, IEEE Intelligent Systems, vol. 28, no. 2, pp. 15–21, 2013, https://doi.org/10.1109/MIS.2013.30spa
dc.relation.referencesA. Ortony, G. L. Clore, and A. Collins, “The cognitive structure of emotions” Cambridge: Cambridge University Press, 1988, https://doi.org/10.1017/CbO9780511571299spa
dc.relation.referencesR. A. Stevenson, J. A. Mikels, and T. W. Ja-mes, “Characterization of the Affective Nor-ms for English Words by discrete emotional categories”, Behavior Research Methods, vol. 39, no. 4, pp. 1020–1024, 2007, https://doi.org/10.3758/bF03192999spa
dc.relation.referencesP. D. Turney, “Thumbs Up or Thumbs Down? Semantic Orientation Applied to Unsupervised Classification of Reviews”, In Proceedings of the 40th Annual Meeting of the Association for Computational Linguistics (ACL), Philadelphia, july 2002, pp. 417-424.spa
dc.relation.referencesS. M. Kim and E. Hovy, “Identifying and Analyzing Judgment Opinions”, Association for Computatio-nal Linguistics Stroudsburg, pp. 200–207, 2006, https://doi.org/10.3115/1220835.1220861spa
dc.relation.referencesLiangxiao Jiang, H. Zhang, and Zhihua Cai, “A Novel bayes Model: Hidden Naive bayes”, IEEE Transactions on Knowledge and Data Enginee-ring, vol. 21, no. 10, pp. 1361–1371, 2009, https://doi.org/10.1109/TKDE.2008.234spa
dc.relation.referencesY. Yang and G. I. Webb, “A Comparative Study of Discretization Methods for Naive-bayes Clas-sifiers”, J. Res., vol. 2, p. 267-324, 2007.spa
dc.relation.referencesM. A. Hearst, S. T. Dumais, E. Osuna, J. Platt, and b. Scholkopf, “Support vector machines”, IEEE Intelligent Systems and their Applications, vol. 13, no. 4, pp. 18–28, 1998, https://doi.org/10.1109/5254.708428spa
dc.relation.referencesF. Sebastiani, “Machine Learning in Automated Text Categorization”, ACM Computing Sur-veys, vol. 34, no. 1, pp. 1–47, 1999, https://doi.org/10.1145/505282.505283spa
dc.relation.referencesb. Pang and L. Lee, “A Sentimental Education: Sentiment Analysis Using Subjectivity Sum-marization based on Minimum Cuts”, Proce-edings of ACL, pp. 271-278, 2004, https://doi.org/10.3115/1218955.1218990spa
dc.relation.referencesT. Wilson, J. Wiebe, and P. Hoffmann, “Recogni-zing contextual polarity in phrase-level sentiment analysis”, Proceedings of the conference on Hu-man Language Technology and Empirical Methods in Natural Language Processing, pp. 347–354, 2005, https://doi.org/10.3115/1220575.1220619spa
dc.relation.referencesH. Wang, D. Can, A. Kazemzadeh, F. bar and S. Narayanan, “A System for Real-time Twitter Sentiment Analysis of 2012 U.S. Presidential Election Cycl,”. In 50th Annual Meeting of the Association for Computational Linguistics, Jeju Island, july, 2012.spa
dc.relation.referencesC-SPAN, “Robert Mueller on Cyberse-curity” [En línea] Disponible en: ht-tps://www.c-span.org/video/?319726-3/robert-mueller-cybersecurity&start=1876spa
dc.relation.referencesDepartamento Nacional de Planeación, “CONPES 3701 - Lineamientos de Política para Ciberseguridad y Ciberdefensa. Colombia”. Consejo Nacional de Política Económica y So-cial, 2011.spa
dc.relation.referencesR. Rodríguez, “Guerra Asimétrica”. [En línea]. Disponible en: https://dialnet.unirioja.es/des-carga/articulo/4602435.pdfspa
dc.relation.referencesJ. Nye, “bound to Lead: The Changing Nature of American Power” Hachette U. basic books, 2016.spa
dc.relation.referencesG. S. Medero, “Ciberespacio y el crimen or-ganizado. Los nuevos desafíos del siglo XXI”, Revista Enfoques, vol.10, no. 16, pp. 71–87, 2012.spa
dc.relation.referencesR. Langner, “Stuxnet: Dissecting a cyberwarfare weapon”, IEEE Security and Privacy, vol. 9, no. 3, pp. 49–51, 2011, https://doi.org/10.1109/MSP.2011.67spa
dc.relation.referencesG. Friedman, “The next 100 years: a forecast for the 21st century”, Knopf Doubleday Publishing Group, 2009, pp. 193–212.spa
dc.relation.referencesR. Steele, “Handbook of Intelligence Studies” London: Routledge, 2007.spa
dc.rights.accessrightsinfo:eu-repo/semantics/openAccessspa
dc.rights.creativecommonsAtribución 4.0 Internacional (CC BY 4.0)spa
dc.subject.armarcOSINTeng
dc.subject.armarcCiberinteligencia (seguridad informática)spa
dc.subject.armarcSeguridad informáticaspa
dc.subject.proposalCyberintelligenceeng
dc.subject.proposalOpen source intelligenceeng
dc.subject.proposalAdversary profilingeng
dc.subject.proposalMachine learningeng
dc.subject.proposalSentiment analysiseng
dc.subject.proposalData scienceeng
dc.subject.proposalAnálisis de sentimientosspa
dc.subject.proposalAprendizaje automáticospa
dc.subject.proposalCiber inteligenciaspa
dc.subject.proposalCiencia de datosspa
dc.subject.proposalInteligencia de fuentes abiertasspa
dc.subject.proposalPerfilamiento de adversariosspa
dc.type.coarhttp://purl.org/coar/resource_type/c_2df8fbb1spa
dc.type.contentTextspa
dc.type.driverinfo:eu-repo/semantics/articlespa
dc.type.redcolhttp://purl.org/redcol/resource_type/ARTspa


Ficheros en el ítem

Thumbnail

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem

https://creativecommons.org/licenses/by/4.0/
Excepto si se señala otra cosa, la licencia del ítem se describe como https://creativecommons.org/licenses/by/4.0/