Enhancing detection & identification of hybrid warfare from cyber security perspective

Hybrid warfare has surfaced in recent years in media and scientific literature, as the western world has noticed its challenges and possibilities. Hybrid warfare and its operations are by nature constantly evolving and changing while attempting to cause the wished effect on the victim. This causes t...

Full description

Bibliographic Details
Main Author: Lindfors, Tomi
Other Authors: Informaatioteknologian tiedekunta, Faculty of Information Technology, Informaatioteknologia, Information Technology, Jyväskylän yliopisto, University of Jyväskylä
Format: Master's thesis
Language:eng
Published: 2022
Subjects:
Online Access: https://jyx.jyu.fi/handle/123456789/84912
_version_ 1826225717664284672
author Lindfors, Tomi
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_facet Lindfors, Tomi Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Lindfors, Tomi Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_sort Lindfors, Tomi
datasource_str_mv jyx
description Hybrid warfare has surfaced in recent years in media and scientific literature, as the western world has noticed its challenges and possibilities. Hybrid warfare and its operations are by nature constantly evolving and changing while attempting to cause the wished effect on the victim. This causes the complications behind the detection of hybrid warfare. Often the amount of data gathered for analysis can cause issues because of its size as the resources for detecting hybrid warfare are limited. Finding anomalies from such large data sets can be problematic even if the target of the analysis is well known to the analyst. This creates a need for research to improve the detection of hybrid warfare. The terms behind hybrid warfare are also used differently by different parties and could use unification. The unification of terminology also helps to clarify communications between organizations and can directly benefit operational efficiency. The goal of this research is to clarify the terms used in the discussion about detection of hybrid warfare and to find at least preliminary future research topics for it from cyber security research point of view.
first_indexed 2023-01-11T21:04:57Z
format Pro gradu
free_online_boolean 1
fullrecord [{"key": "dc.contributor.advisor", "value": "Lehto, Martti", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Lindfors, Tomi", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2023-01-11T07:28:37Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2023-01-11T07:28:37Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2022", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/84912", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Hybrid warfare has surfaced in recent years in media and scientific literature, as the western world has noticed its challenges and possibilities. Hybrid warfare and its operations are by nature constantly evolving and changing while attempting to cause the wished effect on the victim. This causes the complications behind the detection of hybrid warfare. Often the amount of data gathered for analysis can cause issues because of its size as the resources for detecting hybrid warfare are limited. Finding anomalies from such large data sets can be problematic even if the target of the analysis is well known to the analyst. This creates a need for research to improve the detection of hybrid warfare. The terms behind hybrid warfare are also used differently by different parties and could use unification. The unification of terminology also helps to clarify communications between organizations and can directly benefit operational efficiency. The goal of this research is to clarify the terms used in the discussion about detection of hybrid warfare and to find at least preliminary future research topics for it from cyber security research point of view.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2023-01-11T07:28:37Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2023-01-11T07:28:37Z (GMT). No. of bitstreams: 0\n Previous issue date: 2022", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "57", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "eng", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "detection", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "detection of hybrid warfare", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Enhancing detection & identification of hybrid warfare from cyber security perspective", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202301111245", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Kyberturvallisuus", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Kyberturvallisuus", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "hybridisota", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kyberturvallisuus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "informaatiosodank\u00e4ynti", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "sodank\u00e4ynti", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "hybridivaikuttaminen", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kybersodank\u00e4ynti", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "hybrid warfare", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "cyber security", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "information warfare", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "warfare", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "hybrid influencing", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "cyberwarfare", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
id jyx.123456789_84912
language eng
last_indexed 2025-02-18T10:55:47Z
main_date 2022-01-01T00:00:00Z
main_date_str 2022
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstreams\/b02c7ca3-f022-4d0f-9a03-932b58c66ae4\/download","text":"URN:NBN:fi:jyu-202301111245.pdf","source":"jyx","mediaType":"application\/pdf"}
publishDate 2022
record_format qdc
source_str_mv jyx
spellingShingle Lindfors, Tomi Enhancing detection & identification of hybrid warfare from cyber security perspective detection detection of hybrid warfare Kyberturvallisuus 601 hybridisota kyberturvallisuus informaatiosodankäynti sodankäynti hybridivaikuttaminen kybersodankäynti hybrid warfare cyber security information warfare warfare hybrid influencing cyberwarfare
title Enhancing detection & identification of hybrid warfare from cyber security perspective
title_full Enhancing detection & identification of hybrid warfare from cyber security perspective
title_fullStr Enhancing detection & identification of hybrid warfare from cyber security perspective Enhancing detection & identification of hybrid warfare from cyber security perspective
title_full_unstemmed Enhancing detection & identification of hybrid warfare from cyber security perspective Enhancing detection & identification of hybrid warfare from cyber security perspective
title_short Enhancing detection & identification of hybrid warfare from cyber security perspective
title_sort enhancing detection identification of hybrid warfare from cyber security perspective
title_txtP Enhancing detection & identification of hybrid warfare from cyber security perspective
topic detection detection of hybrid warfare Kyberturvallisuus 601 hybridisota kyberturvallisuus informaatiosodankäynti sodankäynti hybridivaikuttaminen kybersodankäynti hybrid warfare cyber security information warfare warfare hybrid influencing cyberwarfare
topic_facet 601 Kyberturvallisuus cyber security cyberwarfare detection detection of hybrid warfare hybrid influencing hybrid warfare hybridisota hybridivaikuttaminen informaatiosodankäynti information warfare kybersodankäynti kyberturvallisuus sodankäynti warfare
url https://jyx.jyu.fi/handle/123456789/84912 http://www.urn.fi/URN:NBN:fi:jyu-202301111245
work_keys_str_mv AT lindforstomi enhancingdetectionidentificationofhybridwarfarefromcybersecurityperspective