Institution
NATO Cooperative Cyber Defence Centre of Excellence
Facility•Tallinn, Estonia•
About: NATO Cooperative Cyber Defence Centre of Excellence is a facility organization based out in Tallinn, Estonia. It is known for research contribution in the topics: Cyberwarfare & Network security. The organization has 20 authors who have published 20 publications receiving 139 citations.
Papers
More filters
••
01 Jan 2018TL;DR: In this article, a case study of the Russo-Ukrainian crisis, from the protests at Euromaidan to the occupation of Crimea and the war in Eastern Ukraine, is presented to understand the effects and the strategic role of offensive cyber operations.
Abstract: This chapter looks at a prominent case study, the Russo-Ukrainian crisis— from the protests at Euromaidan to the occupation of Crimea and the war in Eastern Ukraine—with the aim to understand the effects and the strategic role of offensive cyber operations. An analysis of the cyber incidents in Ukraine supports the argument that the underlying nature of interstate armed conflict has not yet revolutionarily changed due to the use of offensive cyber operations. The chapter reveals that, whilst playing an important role, offensive cyber operations have not provided a decisive advantage for states.
4 citations
••
28 Dec 2015TL;DR: The anti-forensic techniques are viewed and a new taxonomy that relates them to the initial phase of a forensic process mainly affected by each technique is proposed, and mitigation techniques are introduced for these anti- Forensic techniques.
Abstract: During the last years, criminals have become awareof how digital evidences that lead them to courts and jail arecollected and analyzed. Hence, they have started to develop antiforensictechniques to evade, hamper, or nullify their evidences. Nowadays, these techniques are broadly used by criminals, causing the forensic analysis to be in a state of decay. To defeatagainst these techniques, forensic analyst need to first identifythem, and then to mitigate somehow their effects. In this paper, wereview the anti-forensic techniques and propose a new taxonomythat relates them to the initial phase of a forensic process mainlyaffected by each technique. Furthermore, we introduce mitigationtechniques for these anti-forensic techniques, considering thechance to overcome the anti-forensic techniques and the difficultyto apply them.
2 citations
••
26 Jul 2021
TL;DR: In this paper, the authors describe a situation awareness framework, Frankenstack, that is the result of a multi-faceted endeavor to enhance the expertise of cybersecurity specialists by providing them with real-time feedback during cybersecurity exercises and verifying the performance and applicability of monitoring tools during those exercises.
Abstract: This paper describes a situation awareness framework, Frankenstack, that is the result of a multi-faceted endeavor to enhance the expertise of cybersecurity specialists by providing them with real-time feedback during cybersecurity exercises and verifying the performance and applicability of monitoring tools during those exercises. Frankenstack has been recently redeveloped to improve data collection and processing functions as well as cyberattack detection capability. This extensive R&D effort has combined various system and network security monitoring tools into a single cyberattack detection and exercise feedback framework.Although Frankenstack was specifically developed for the NATO CCD COE’s Crossed Swords exercise, the architecture provides a clear point of reference for others who are building such monitoring frameworks. Thus, the paper contains many technical descriptions to reduce the gap between theoretical research and practitioners seeking advice on how to implement such complex systems.
2 citations
••
01 Oct 2016TL;DR: It is argued that in order to cope with the new situation and to deliver on the commitment NATO needs to consider establishing a Cyber Command within the NCS, this is a matter of urgency especially as within the new domain the Alliance will need to face an increasingly challenging cyber threat landscape.
Abstract: Cyber has been on NATO’s agenda since 2002, with clear mandates and taskings from Summits and Ministerials on how to develop its capacity in the area. Yet, despite an increasingly cyber-dependent world and visible progress on the Alliance’s civilian side, NATO has had no visible track record on how this change in the way the world does business has had an impact on its key military structure and enabler for collective defence - the NATO Command Structure (NCS). At their July 2016 Summit in Warsaw the NATO Heads of State and Government declared cyber to become an operational domain for the Alliance. The paper argues that in order to cope with the new situation and to deliver on the commitment NATO needs to consider establishing a Cyber Command within the NCS. This is a matter of urgency especially as within the new domain the Alliance will need to face an increasingly challenging cyber threat landscape. In addition, it will also need to live up to its current Strategic Concept by addressing all the three core areas – collective defence, crisis management and cooperative security – in cyber. Last but not least, it would play an increasing role for the Alliance in terms of its deterrence posture.
1 citations
••
15 Oct 2020TL;DR: It is demonstrated that it is possible to identify a driver’s activities without access to their personal content, and a minimum set of requirements to construct a timeline of events which can clarify the accident circumstances are proposed.
Abstract: Police officers investigating car accidents have to consider the driver’s interaction with a mobile device as a possible cause. The most common activities such as calling or texting can be identified directly via the user interface or from the traffic metadata acquired from the Internet Service Provider (ISP). However, ‘offline activities’, such as a simple home button touch to wake up the screen, are invisible to the ISP and leave no trace at the user interface. A possible way to detect this type of activity could be analysis of system level data. However, security countermeasures may limit the scope of the acquired artefacts.
Authors
Showing all 21 results
Name | H-index | Papers | Citations |
---|---|---|---|
Risto Vaarandi | 11 | 19 | 900 |
Rain Ottis | 8 | 11 | 131 |
Mauno Pihelgas | 7 | 13 | 191 |
Markus Kont | 5 | 7 | 58 |
Teemu Väisänen | 5 | 14 | 61 |
Liis Vihul | 4 | 6 | 79 |
Arturs Lavrenovs | 4 | 10 | 38 |
Bernhards Blumbergs | 4 | 10 | 52 |
Jaan Priisalu | 3 | 7 | 121 |
Matthijs A. Veenendaal | 2 | 2 | 17 |
Anna-Maria Osula | 1 | 1 | 13 |
Henry Rõigas | 1 | 1 | 2 |
Ludovica Glorioso | 1 | 1 | 5 |
Pascal Brangetto | 1 | 1 | 13 |
Markus Maybaum | 1 | 1 | 3 |