Developing a tool to provide for real time feeds of cyber incident pertaining to Indian Cyber Space

      

ABSTARCT :

Background: NCIIPC shares detail of cyber incidents to corresponding stakeholders in order to inform them about cyber activities related to their IT/OT infrastructure. This empowers them to take necessary actions to mitigate further risk. Description: In order to achieve objective of protecting Critical Information Infrastructure (CIIs) of the Nation, it is very vital to have real time information related to cyber threats and incidents specific to Indian Cyber space. This may enhance the Threat Assessment potential based on the incidents that have already happened or the ones that currently exists. Therefore, a framework to crawl/scrap/collect the cyber incident activities reported anywhere on the web related to Indian cyber space is required to be developed. Expected Solution: 1. Using Machine Learning, find platforms that publish or works as intermediate platform for sharing cyber incident activities related to cyber incidents. 2. Design a model framework for the cyber incidents feed generator which collects data from various forums, paste sites, social media, developer or any other platforms as identified by Machine learning model generated in accordance to point 1 above. 3. Creation of well-structured database of cyber incidents extracted by framework developed in accordance with point 2 above. 4. Generation of valuable insights from the data collected and its visual representation of cyber incidents specific to sectors, APTs and strategic issues. Note: Students are encouraged not to use paid APIs for solving the problem

EXISTING SYSTEM :

India has high stakes in the security and stability of cyberspace, not least because the government has made digitisation a priority, and is in the process of executing national flagship programs to improve governance and the delivery of essential services, which also includes securing world’s largest database holding the personal information of a billion plus Indians. Critical infrastructure, which underpins our economic and social well-being, has a lot more dependence on cyberspace, and any compromise may have a debilitating impact on the national economy and national security. In addition to security imperatives, cyber technologies have the potential to propel India’s development as a knowledge economy and the next generation of economic growth. Providing thought leadership in cybersecurity requires both clarity of vision, and an understanding of the history and evolution of cybersecurity. As India aspires to find a place on the policy high table of cyberspace governance to play a prominent role, thought leadership and technology innovation are some of the attributes which will embellish India’s credentials. cyberspace, as also to gauge India’s position. India has high stakes in the security and stability of cyberspace, not least because the government has made digitisation a priority, and is in the process of executing national flagship programs to improve governance and the delivery of essential services, which also includes securing world’s largest database holding the personal information of a billion plus Indians. This book is an attempt to unravel the vast changes in the processes of norms building, the emerging concepts shaping military thinking as well as the protection of critical infrastructure and the evolving technology sphere pertaining to cyberspace, as also to gauge India’s position.

DISADVANTAGE :

Data Privacy and Security Concerns: Real-time feeds might inadvertently expose sensitive information or details about ongoing incidents, which could be exploited by malicious actors. Ensuring that the data shared is anonymized and protected is crucial. Volume of Data: The sheer volume of data generated in real-time can be overwhelming. Filtering out relevant information from noise and ensuring the accuracy of the data is a major challenge. The tool must be capable of handling and processing large amounts of data efficiently. False Positives and False Negatives: Inaccurate detection and reporting of incidents can lead to false positives (reporting non-incidents as incidents) and false negatives (failing to report actual incidents). This can undermine the credibility of the tool and potentially lead to inappropriate responses or missed threats. Timeliness and Latency: Real-time feeds require extremely low latency to be effective. Delays in data collection, processing, or dissemination can diminish the tool's effectiveness in responding to and mitigating cyber threats.

PROPOSED SYSTEM :

Indian cyberspace is designed to enhance cybersecurity by delivering timely and actionable intelligence. The system comprises several integrated modules to ensure comprehensive coverage and effective management of cyber threats. At the core of the system is the Data Collection Module, which aggregates real-time data from diverse sources such as threat intelligence feeds, network monitoring tools, and system logs. This module ensures that all relevant information is captured, providing a robust foundation for subsequent analysis. The Data Processing and Analysis Module plays a crucial role in transforming raw data into actionable insights. It normalizes and parses data, integrates threat intelligence, and employs advanced algorithms and machine learning techniques to detect and classify incidents. This ensures that the data is not only accurate but also actionable. Once incidents are detected, the Incident Management Module takes over. It generates alerts based on the severity and potential impact of each incident, tracks ongoing cases, and manages incident response workflows. This module ensures that incidents are promptly addressed and that responses are well-coordinated.

ADVANTAGE :

Enhanced Threat Detection and Response: Real-time feeds enable quicker identification of cyber threats and incidents. This allows organizations and authorities to respond promptly, potentially mitigating damage and reducing the impact of attacks. Improved Situational Awareness: By providing up-to-date information about cyber incidents, the tool enhances situational awareness. This helps cybersecurity teams stay informed about emerging threats and trends specific to the Indian cyber landscape. Better Incident Management: Real-time information supports more effective incident management. It allows for quicker coordination and response among various stakeholders, including government agencies, private sector organizations, and cybersecurity professionals. Informed Decision-Making: Access to real-time data helps decision-makers make more informed choices regarding cybersecurity strategies, resource allocation, and policy development. It ensures that decisions are based on the most current and relevant information.

Download DOC Download PPT

We have more than 145000 Documents , PPT and Research Papers

Have a question ?

Chat on WhatsApp