Abstract
Open-source intelligence (OSINT) tools are used for gathering information using different publicly available sources. With the rapid advancement in information technology and excessive use of social media in our daily lives, more public information sources are available than ever before. The access to public information from different sources can be used for unlawful purposes. Extracting relevant information from pools of massive public information sources is a large task. Multiple tools and techniques have been developed for this task, which can be used to identify people, aircraft, ships, satellites, and more. In this paper, we identify the tools used for extracting the OSINT information and their effectiveness concerning each other in different test cases. We mapped the identified tools with Cyber Kill Chain and used them in realistic cybersecurity scenarios to check their effusiveness in gathering OSINT.
Funder
Norwegian University of Science and Technology
Subject
General Mathematics,Engineering (miscellaneous),Computer Science (miscellaneous)
Reference106 articles.
1. The art of war;Tzu,2014
2. Current Status and Security Trend of OSINT
3. Military Information Leak Response Technology through OSINT Information Analysis Using SNSes
4. Cyber Kill Chain®
https://www.lockheedmartin.com/content/dam/lockheed-martin/rms/documents/cyber/Gaining_the_Advantage_Cyber_Kill_Chain.pdf
5. OSINT in the Context of Cyber-Security;Tabatabaei,2016
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献