scispace - formally typeset
Search or ask a question
Institution

NATO Cooperative Cyber Defence Centre of Excellence

FacilityTallinn, Estonia
About: NATO Cooperative Cyber Defence Centre of Excellence is a facility organization based out in Tallinn, Estonia. It is known for research contribution in the topics: Cyberwarfare & Network security. The organization has 20 authors who have published 20 publications receiving 139 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: Certain critical choices, context, and events connected to the birth and growth of the Estonian e-society in terms of Privacy are discussed.
Abstract: The Republic of Estonia leads Europe in the provision of public digital services. The national communications and transactions platform allows for twenty-first century governance by allowing for transparency, e-safety (inter alia privacy), e-security, entrepreneurship and, among other things, rising levels of prosperity, and well-being for all its Citizens. However, a series of Information Infrastructure attacks against the Estonian e-society infrastructure in 2007 became one of best known incidents and experiences that fundamentally changed both Estonian and international discussions about Cyber Security and Privacy. Estonian experience shows that an open and transparent attitude provides a good foundation for trust between the Citizen and the State, and gives more control to the real owner of the data - the Citizen. Another important lesson is that the Citizen needs to be confident in the government’s ability to keep their data safe -- in terms of confidentiality, integrity and availability - establishing a strong link between privacy and information security. This paper discusses certain critical choices, context, and events connected to the birth and growth of the Estonian e-society in terms of Privacy.

27 citations

Proceedings ArticleDOI
06 Oct 2014
TL;DR: This paper will first focus on using log analysis techniques for collecting technical security metrics from security logs of common types (e.g., Network IDS alarm logs, workstation logs, and Net flow data sets), and describes a production framework for collecting and reportingTechnical security metrics which is based on novel open-source technologies for big data.
Abstract: During recent years, establishing proper metrics for measuring system security has received increasing attention. Security logs contain vast amounts of information which are essential for creating many security metrics. Unfortunately, security logs are known to be very large, making their analysis a difficult task. Furthermore, recent security metrics research has focused on generic concepts, and the issue of collecting security metrics with log analysis methods has not been well studied. In this paper, we will first focus on using log analysis techniques for collecting technical security metrics from security logs of common types (e.g., Network IDS alarm logs, workstation logs, and Net flow data sets). We will also describe a production framework for collecting and reporting technical security metrics which is based on novel open-source technologies for big data.

26 citations

Proceedings ArticleDOI
01 May 2016
TL;DR: In order to address questions: when does influencing the behaviour of an audience become the primary effect of a cyber operation, and which cyber operations might qualify as such, the term Influence Cyber Operations (ICOs) is introduced to describe these actions in cyberspace.
Abstract: Information Warfare and Influence Operations are, in principle, intended to get your own message across or to prevent your adversary from doing so. However, it is not just about developing a coherent and convincing storyline as it also involves confusing, distracting, dividing, and demoralising the adversary. From that perspective, cyberspace seems to be ideal for conducting such operations that will have disruptive, rather than destructive outcomes.

17 citations

Journal ArticleDOI
TL;DR: The human rights connotations of the anonymity provided by Tor are explored, coming to the conclusion that this anonymity is an integral part of certain human rights, particularly the right to privacy and theright to freedom of expression.

15 citations

Proceedings ArticleDOI
06 Jun 2013
TL;DR: This paper presents a study of traffic patterns in a corporate private network, and proposes two novel algorithms for detecting anomalous network traffic and node behavior in such networks.
Abstract: During the last decade, network monitoring and intrusion detection have become essential techniques of cyber security. Nowadays, many institutions are using advanced solutions for detecting malicious network traffic, discovering network anomalies, and preventing cyber attacks. However, most research in this area has not been conducted specifically for organizational private networks, and their special properties have not been considered. In this paper, we first present a study of traffic patterns in a corporate private network, and then propose two novel algorithms for detecting anomalous network traffic and node behavior in such networks.

12 citations


Authors

Showing all 21 results

Network Information
Related Institutions (5)
Elbit Systems
144 papers, 2.6K citations

74% related

Lockheed Martin Advanced Technology Laboratories
234 papers, 4.2K citations

72% related

University of New Haven
1.7K papers, 32.3K citations

71% related

Mitre Corporation
6K papers, 124.8K citations

71% related

NCS Pte Ltd
105 papers, 2.5K citations

70% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20231
20211
20202
20191
20182
20173