Gaining cyber security insight through an analysis of open source intelligence data: an East African case study

dc.contributor.advisorIrwin, Barry
dc.contributor.authorChindipha, Stones Dalitso
dc.date.accessioned2026-03-09T07:19:06Z
dc.date.issued2018
dc.description.abstractWith each passing year the number of Internet users and connected devices grows, and this is particularly so in Africa. This growth brings with it an increase in the prevalence cyber-attacks. Looking at the current state of affairs, cybersecurity incidents are more likely to increase in African countries mainly due to the increased prevalence and affordability of broadband connectivity which is coupled with lack of online security awareness. The adoption of mobile banking has aggravated the situation making the continent more attractive to hackers who bank on the malpractices of users. Using Open Source Intelligence (OSINT) data sources like Sentient Hvper-Optimised Data Access Network (SHODAN) and Internet Background Radiation (IBR), this research explores the prevalence of vulnerabilities and their accessibility to evber threat actors. The research focuses on the East African Community (EAC) comprising of Tanzania, Kenya, Malawi, and Uganda, An IBR data set collected by a Rhodes University network telescope spanning over 72 months was used in this research, along with two snapshot period of data from the SHODAN project. The findings shows that there is a significant risk to systems within the EAC, particularly using the SHODAN data. The MITRE CVSS threat scoring system was applied to this research using FREAK and Heartbleed as sample vulnerabilities identified in EAC, When looking at IBR, the research has shown that attackers can use either destination ports or IP source addresses to perform an attack which if not attended to may be reused yearly until later on move to the allocated IP address space once it starts making random probes. The moment it finds one vulnerable client on the network it spreads throughout like a worm, DDoS is one the attacks that can be generated from IBR, Since the SHODAN dataset had two collection points, the study has shown the changes that have occurred in Malawi and Tanzania for a period of 14 months by using three variables i.e, device type, operating systems, and ports. The research has also identified vulnerable devices in all the four countries. Apart from that, the study identified operating systems, products, OpenSSL, ports and ISPs as some of the variables that can be used to identify vulnerabilities in systems. In the ease of OpenSSL and products, this research went further by identifying the type of attack that can occur and its associated CVE-ID.
dc.description.degreeMaster's thesis
dc.description.degreeMSc
dc.format.extent160 pages
dc.format.mimetypeapplication/pdf
dc.identifier.otherhttp://hdl.handle.net/10962/60618
dc.identifier.urihttps://researchrepository.ru.ac.za/handle/123456789/9303
dc.languageEnglish
dc.publisherRhodes University, Faculty of Science, Department of Computer Science
dc.rightsChindipha, Stones Dalitso
dc.subjectOpen source intelligence -- Africa, East
dc.subjectComputer security -- Africa, East
dc.subjectComputer networks -- Security measures -- Africa, East
dc.subjectDenial of service attacks -- Africa, East
dc.subjectSentient Hvper-Optimised Data Access Network (SHODAN)
dc.subjectInternet Background Radiation (IBR)
dc.titleGaining cyber security insight through an analysis of open source intelligence data: an East African case study
dc.typeAcademic thesis

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
vital_27805+SOURCE1+SOURCE1.1.pdf
Size:
3.02 MB
Format:
Adobe Portable Document Format