Mapping Tools for Open Source Intelligence with Cyber Kill Chain for Adversarial Aware Security
Muhammad Mudassar Yamin,
Mohib Ullah,
Habib Ullah,
Basel Katt,
Mohammad Hijji and
Khan Muhammad
Additional contact information
Muhammad Mudassar Yamin: Faculty of Information Technology and Electrical Engineering, Norwegian Univeristy of Science and Technology, 2815 Gjøvik, Norway
Mohib Ullah: Faculty of Information Technology and Electrical Engineering, Norwegian Univeristy of Science and Technology, 2815 Gjøvik, Norway
Habib Ullah: Faculty of Science and Technology, Norwegian University of Life Sciences, 1430 Ås, Norway
Basel Katt: Faculty of Information Technology and Electrical Engineering, Norwegian Univeristy of Science and Technology, 2815 Gjøvik, Norway
Mohammad Hijji: Industrial Innovation and Robotic Center (IIRC), University of Tabuk, Tabuk 47711, Saudi Arabia
Khan Muhammad: Visual Analytics for Knowledge Laboratory (VIS2KNOW Lab), Department of Applied Artificial Intelligence, School of Convergence, College of Computing and Informatics, Sungkyunkwan University, Seoul 03063, Korea
Mathematics, 2022, vol. 10, issue 12, 1-25
Abstract:
Open-source intelligence (OSINT) tools are used for gathering information using different publicly available sources. With the rapid advancement in information technology and excessive use of social media in our daily lives, more public information sources are available than ever before. The access to public information from different sources can be used for unlawful purposes. Extracting relevant information from pools of massive public information sources is a large task. Multiple tools and techniques have been developed for this task, which can be used to identify people, aircraft, ships, satellites, and more. In this paper, we identify the tools used for extracting the OSINT information and their effectiveness concerning each other in different test cases. We mapped the identified tools with Cyber Kill Chain and used them in realistic cybersecurity scenarios to check their effusiveness in gathering OSINT.
Keywords: OSINT; cybersecurity; AI; Cyber Kill Chain; public information misuse (search for similar items in EconPapers)
JEL-codes: C (search for similar items in EconPapers)
Date: 2022
References: View references in EconPapers View complete reference list from CitEc
Citations:
Downloads: (external link)
https://www.mdpi.com/2227-7390/10/12/2054/pdf (application/pdf)
https://www.mdpi.com/2227-7390/10/12/2054/ (text/html)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:gam:jmathe:v:10:y:2022:i:12:p:2054-:d:838416
Access Statistics for this article
Mathematics is currently edited by Ms. Emma He
More articles in Mathematics from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().