Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectPublisherSourceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
87
result(s) for
"Cyber intelligence (Computer security) -- China"
Sort by:
Chinese cybersecurity and defense
by
Ventre, Daniel
in
Computer security
,
Computer security -- China
,
Cyber intelligence (Computer security)
2014,2015
Cyberdefense has become, over the past five years, a major issue on the international scene. China, by the place it occupies, is the subject of attention: it is observed, criticized, and designated by many states as a major player in the global cyber-insecurity. The United States is building their cyberdefense strategy against what they call the \"Chinese threat.\" It is therefore important to better understand today's challenges related to cyber dimension in regard of the rise of China. Contributions from international researchers provide cross perspectives on China, its strategies and policies for cybersecurity and cyberdefense. These issues have now gained major strategic dimension:
Is Cyberspace changing the scene of international relations?
How China does apprehend cybersecurity and cyberdefense?
What are the issues, challenges?
What is the role of China in the global cyberspace?
United States and China reach agreement regarding economic espionage and international cybersecurity norms
2015
On September 25, 2015, during Chinese President Xi Jinping's visit to the United States, Xi and President Barack Obama announced an agreement relating to certain aspects of cyber-relations. Pursuant to the agreement, \"[t]he United States and China agree that neither country's government will conduct or knowingly support cyber-enabled theft of intellectual property, including trade secrets or other confidential business information, with the intent of providing competitive advantages to companies or commercial sectors.\" The two countries also agreed to cooperate in addressing malicious cyberactivities. Specifically, the United States and China agreed to provide \"timely responses... to requests for information and assistance concerning malicious cyber activities\"; \"to cooperate, in a manner consistent with their respective national laws and relevant international obligations, with requests to investigate cyber-crimes, collect electronic evidence, and mitigate malicious cyber activity emanating from their territory\"; and \"to provide updates on the status and results of those investigation^] to the other side, as appropriate.\" Finally, the agreement indicated that \"[b]oth sides are committed to making common effort to further identify and promote appropriate norms of state behavior in cyberspace within the international community.\" This agreement addresses cyberactivity in the pursuit of economic advantage, rather than those associated with \"traditional intelligence-gathering functions\"; Obama has described such cyberespionage as a \"fundamentally different\" issue.
Journal Article
Finding our way in a transformed world
2014
Globalisation is transforming the world. The causes are varied, but they include destabilising repercussions of globalisation alongside regional, ethnic and religious hostility. The changes have placed an even higher premium on accepted rules to govern predictable international behaviour. New Zealand must adjust its external policies to this threshold moment. It must urge a greater role for growing powers like China in the management of the world economy and reaffirm the primacy of international law, especially as it seeks to tighten ties with the United States. New Zealand’s efforts to be a good international citizen will be tested later in the year when its bid for a Security Council seat is resolved.
Journal Article
Novel Application of Open-Source Cyber Intelligence
2023
The prevalence of cybercrime has emerged as a critical issue in contemporary society because of its far-reaching financial, social, and psychological implications. The negative effects of cyber-attacks extend beyond financial losses and disrupt people’s lives on social and psychological levels. Conventional practice involves cyber experts sourcing data from various outlets and applying personal discernment and rational inference to manually formulate cyber intelligence specific to a country. This traditional approach introduces personal bias towards the country-level cyber reports. However, this paper reports a novel approach where country-level cyber intelligence is automatically generated with artificial intelligence (AI), employing cyber-related social media posts and open-source cyber-attack statistics. Our innovative cyber threat intelligence solution examined 37,386 tweets from 30,706 users in 54 languages using sentiment analysis, translation, term frequency–inverse document frequency (TF-IDF), latent Dirichlet allocation (LDA), N-gram, and Porter stemming. Moreover, the presented study utilized 238,220 open-intelligence cyber-attack statistics from eight different web links, to create a historical cyber-attack dataset. Subsequently, AI-based algorithms, like convolutional neural network (CNN), and exponential smoothing were used for AI-driven insights. With the confluence of the voluminous Twitter-derived data and the array of open-intelligence cyber-attack statistics, orchestrated by the AI-driven algorithms, the presented approach generated seven-dimensional cyber intelligence for Australia and China in complete automation. Finally, the topic analysis on the cyber-related social media messages revealed seven main themes for both Australia and China. This methodology possesses the inherent capability to effortlessly engender cyber intelligence for any country, employing an autonomous modality within the realm of pervasive computational platforms.
Journal Article
Cyber Espionage and Illegitimate Information Retrieval
2016
One of the most serious threats to a modern country's trade, industry and long-term economic development is cyber espionage and insiders. The activities are directed against high-technological industries and companies with advanced basic research. The defence and telecoms sectors are of particular interest, just as biotechnics, medical and material technology. Behind this kind of espionage there may be individual states and security services as well as competing companies. One trend is that criminal players are getting involved both as thieves and fences of information. Computerisation and the development of the Internet drastically increase the possibility of procuring sensitive information through illegal means. This can be done in different ways. In the paper the convergence between industrial- and cyber espionage are discussed. A number of examples are provided of different kinds of espionage as well as some of the methods that is used to collect information over the Internet – such as signals intelligence, monitoring of traffic, penetration and overtaking of computers with the aid of trojans. Examples are given on succesful cybertheft operations such as the operation Buckshot Yankee and the Chinese Ghostnet. The paper ends with a discussion on how to improve information security in organisations in order to reduce the risks for illegitimate information drainage.
Journal Article
Research on Cyber ISR Visualization Method Based on BGP Archive Data through Hacking Case Analysis of North Korean Cyber-Attack Groups
2022
North Korean cyber-attack groups such as Kimsuky, Lazarus, Andariel, and Venus 121 continue to attempt spear-phishing APT attacks that exploit social issues, including COVID-19. Thus, along with the worldwide pandemic of COVID-19, related threats also persist in cyberspace. In January 2022, a hacking attack, presumed to be Kimsuky, a North Korean cyber-attack group, intending to steal research data related to COVID-19. The problem is that the activities of cyber-attack groups are continuously increasing, and it is difficult to accurately identify cyber-attack groups and attack origins only with limited analysis information. To solve this problem, it is necessary to expand the scope of data analysis by using BGP archive data. It is necessary to combine infrastructure and network information to draw correlations and to be able to classify infrastructure by attack group very accurately. Network-based infrastructure analysis is required in the fragmentary host area, such as malware or system logs. This paper studied cyber ISR and BGP and a case study of cyber ISR visualization for situational awareness, hacking trends of North Korean cyber-attack groups, and cyber-attack tracking. Through related research, we estimated the origin of the attack by analyzing hacking cases through cyber intelligence-based profiling techniques and correlation analysis using BGP archive data. Based on the analysis results, we propose an implementation of the cyber ISR visualization method based on BGP archive data. Future research will include a connection with research on a cyber command-and-control system, a study on the cyber battlefield area, cyber ISR, and a traceback visualization model for the origin of the attack. The final R&D goal is to develop an AI-based cyber-attack group automatic identification and attack-origin tracking platform by analyzing cyber-attack behavior and infrastructure lifecycle.
Journal Article
Information warfare
2016
Cyberspace is one of the major bases of the economic development of industrialized societies and developing.The dependence of modern society in this technological area is also one of its vulnerabilities.
Research on distributed intrusion detection system based on multi-living agent
by
WANG Yue TAO Ran ZHANG Hao
in
Agents (artificial intelligence)
,
China
,
Computer information security
2010
In this paper, we propose a novel distributed intrusion detection system based on multi-living agent inspired by the research method of multi-living agent complex information system for improving the security of distributed intrusion detection system using mobile agent. The previous two-layer distributed intrusion detection system has been expanded into a three-layer structure, the new layer of which can monitor the livelihood of each detection agent and utilize the negotiation-coordination mechanism to adjust the working way of each agent for protecting the security of system. In this paper, we propose a quantitative analysis method of agent livelihood in distributed intrusion detection system and further present the design method of living agent. Finally, through the analysis of system working flow and the detection effect of distributed denial of service attack, we have shown that the security and stability of the novel distributed intrusion detection system is effectively enhanced and the agent can work normally in strict restraint strong countermeasure environment.
Journal Article
Eleven years of cyberattacks on Chinese supply chains in an era of cyber warfare, a review and future research agenda
2022
Purpose
The contribution of this study aims to twofold: First, it provides an overview of the current state of research on cyberattacks on Chinese supply chains (SCs). Second, it offers a look at the Chinese Government’s approach to fighting cyberattacks on Chinese SCs and its calls for global governance.
Design/methodology/approach
A comprehensive literature review was conducted on Clarivate Analytics’ Web of Science, in Social Sciences Citation Index journals, Scopus and Google Scholar, published between 2010–2021. A systematic review of practitioner literature was also conducted.
Findings
Chinese SCs have become a matter of national security, especially in the era of cyber warfare. The risks to SC have been outlined. Cybersecurity regulations are increasing as China aims to build a robust environment for cyberspace development. Using the Technology-organization-environment (TOE) framework, the results show that the top five factors influencing the adoption process in firms are as follows: relative advantage and technological readiness (Technology context); top management support and firm size (Organization context) and government policy and regulations (Environment context).
Research limitations/implications
This review focuses on cyberattacks on Chinese SCs and great care was taken when selecting search terms. However, the author acknowledges that the choice of databases/terms may have excluded a few articles on cyberattacks from this review.
Practical implications
This review provides managerial insights for SC practitioners into how cyberattacks have the potential to disrupt the global SC network.
Originality/value
Past researchers proposed a taxonomic approach to evaluate progress with SC integration into Industry 4.0; in contrast, this study is one of the first steps toward an enhanced understanding of cyberattacks on Chinese SCs and their contribution to the global SC network using the TOE framework.
Journal Article