Cyber Warfare Assignment IV
Cyber Warfare Assignment IV
Prepared By: -
Adane Getnet | GSR/3704/15 [email protected]
PAGE 1
1. Abstract
Cybersecurity threat, vulnerability, and event information are systematically
gathered, analyzed, and disseminated as part of cyber intelligence management.
The main ideas and recommended procedures for handling cyber intelligence well
are outlined in this document, including everything from collection to
dissemination.
2. Objectives
This assignment aims to provide students with hands-on experience in cyber
intelligence management, focusing on the entire process from data collection to
disseminating actionable intelligence. I engaged in practical exercises that
simulated real-world scenarios, enhancing their skills in collecting data from
various sources, analyzing it for patterns and anomalies, and effectively sharing
intelligence with relevant stakeholders.
3. Introduction
To proactively detect and neutralize cyber risks, effective cyber intelligence
management necessitates a methodical and structured approach that makes use of
technologies, processes, and knowledgeable analysts. Through the smooth
integration of information gathering, analysis, interpretation, and distribution, the
institution can improve its cybersecurity posture and successfully counter changing
cyber threats.
PAGE 2
4. Information requirement
This is the first stage of the intelligence management process. Under this process,
all requirements of intelligence management were clearly stated. Defining the
need for Cyber Threat Intelligence (CTI) can indeed be difficult, particularly in
cases where cyber risk or CTI are unfamiliar. To begin conquering this obstacle, it
would be wise to instil a fundamental knowledge of CTI within the organisation's
leadership. Consider the following best practices:
IT Security Teams
Management
PAGE 3
High-level summaries of the current threat landscape and trends
Risk assessments and potential business impacts
Summarized reports of major incidents and their resolutions
Impact assessments and recovery status
Updates on regulatory requirements and compliance status
Reports on adherence to security standards and policies
Recommendations for resource allocation based on threat priorities and
Budget staffing needs for cybersecurity initiatives
External Partners
PAGE 4
4.4. CYBER THREAT PROFILE AND REQUIREMENT-
DRIVEN FRAMEWORK
By developing a comprehensive cyber threat profile and a requirement-driven
framework, organizations can effectively manage cyber risks and enhance their
overall security posture. In this assignment, I do not specify a specific profile of
threat because there is no given threat.
PAGE 5
I used an online dataset of botnet traffic that includes both normal
and malicious
traffic for analysis of public datasets for this assignment.
Gather relevant data sources, including malware samples, network
logs, system artefacts, and any other evidence related to the suspected
abnormal threat. Ensure that data collection follows proper forensic
procedures to maintain the integrity of the evidence.
MAWI Working Group Traffic Archive
I used one-day traffic for this assignment among 6 days of traced files
From the source the data were Collect network traffic data from the
transit link between WIDE and the upstream ISP. This can include
packet captures (PCAP files), NetFlow/sFlow data, or logs from
network devices such as routers or switches.
From this network-captured data I detect, respond to, and mitigate security
threats and performance issues affecting their network infrastructure.
The software used to view the data from the digitizers is Spectrum.
2. Electromagnetic Signal Interception Intercepting electromagnetic signals
emitted by target entities' communication systems, such as radio
transmissions, satellite communications, and microwave links. This involves
using specialized equipment and techniques to capture, decode, and analyze
electromagnetic signals to extract intelligence regarding the target's
communications, location, and operational activities.
The interception and analysis of radar signals IQ Files: These files
contain in-phase and quadrature components of the signals, typically
captured from SDRs. WAV Files: Audio files that may be intercepted
and analyzed for voice communications.
PAGE 6
GPX Files: GPS Exchange format files that store GPS data.
KML/KMZ Files: Files used in conjunction with mapping software like
Google Earth to visualize the locations of signal sources.
Here are some of open source sites for this assignment.
PAGE 7
3.1.2. OSINT Data Collection
PAGE 8
HXD editor for pattern analysis
Protocol
IP address
MAC address
Bytes of a packet
Application type
Timestamp
Average speed of traffic
Analysis network data collected from open source site stated on the above
collection phase. 202401011400.pcap.gz
Read the .pcap file using scapy:
Extract the relevant fields:
Convert to a Pandas DataFrame:
Since the file is large size it was difficult to analyzing using python code. So I split
in to multiple of file. Using CMD and command
PAGE 9
Analysis and Next Steps: - Once you have the DataFrame, I performed various
analyses, such as:
PAGE 10
Step 2: Statistical Analysis
Frequency Analysis
Identify the most frequent source and destination IPs to find the most active
devices on the network.
Protocol Distribution
PAGE 11
Understand the distribution of different protocols in your network traffic.
PAGE 12
Create a heatmap to visualize the communication between source and destination
IPs.
PAGE 13
Description
source_ip and dest_ip: These columns represent the source and destination IP
addresses involved in the network communication.
protocol: This column denotes the protocol used in the communication. In this
case, it's protocol number 6, which typically corresponds to TCP (Transmission
Control Protocol).
timestamp: This column shows the timestamp of each communication event.
timestamp_numeric: This appears to be a numerical representation of the
timestamp, possibly for ease of computation.
anomaly: This column indicates whether each communication event is
considered an anomaly or not. A value of -1 suggests that the event is an
anomaly according to the Isolation Forest algorithm.
PAGE 14
In conclusion all the entries are marked as anomalies (-1) for the given source
and destination IP addresses, protocol, and timestamp. This could imply that the
Isolation Forest algorithm has identified this particular communication pattern
as unusual or potentially suspicious.
Analyzing the top communication pairs can provide insights into which pairs of
devices are communicating most frequently in the network, helping you understand
the network behavior, detect any abnormalities, and optimize network performance
PAGE 15
Using open source tools listed in OSINT collection phase, I observed the anomaly
IP address.
PAGE 16
The tool used to:
o Apply filter to remove unwanted noise and interference
o Spectrum visualization
o Identify pattern
o Apply anomaly detection algorithms to identify unusual signal segments and
on the spectrogram and waterfall plots.
From this analysis process we got some findings
PAGE 17
7. Dissemination and Reporting
Dissemination of intelligence results to relevant stockholders, such as law
enforcement agencies, executives, and IT security teams, is the focus of the
dissemination phase.in this phase the following issues are essential for enabling
decision-making and response to cyber threats:-
Timely report
Accurate report
Relevance report
Clarity report
Dissemination methods can vary depending on the nature of the information and
the audience preferences. Common dissemination channels include emails,
newsletters, reports, presentations, websites, social media, conferences, workshops,
and more.
Network traffic and SIGINT data were examined in this assignment to ensure that
the entities listed below are the correct intelligence holders.
IT Operations Team
Security Operations Center (SOC)
Network Engineers/Administrators
Executive Management
Third-Party Vendors/Service Providers
End Users
Reporting is to provide insights, analysis, or updates to stakeholders to aid
decision-making or understanding of a particular subject matter. Reports can be
generated periodically (e.g., daily, weekly, monthly, quarterly) or on an ad-hoc
basis, depending on the requirements. From this perspective, this network and
SIGINT findings will be daily reported.
PAGE 18
8. Conclusion
In conclusion, cyber intelligence management is a critical component of modern
cybersecurity strategies, empowering organizations to stay ahead of cyber threats
and protect their digital assets. By adopting a systematic approach to collecting,
analyzing, and disseminating intelligence, organizations can enhance their
resilience to cyber-attacks and safeguard their information assets.
PAGE 19
9. Reference
1. http://mawi.wide.ad.jp/mawi/samplepoint-F/2024/202401121400.html
2. SDR# and Air spy Downloads - AIRSPY
3. (https://forums.radioreference.com/)
4. https://account.shodan.io/
5. https://whatismyipaddress.com
PAGE 20