IDEAS home Printed from https://ideas.repec.org/a/gam/jmathe/v10y2022i12p2054-d838416.html
   My bibliography  Save this article

Mapping Tools for Open Source Intelligence with Cyber Kill Chain for Adversarial Aware Security

Author

Listed:
  • Muhammad Mudassar Yamin

    (Faculty of Information Technology and Electrical Engineering, Norwegian Univeristy of Science and Technology, 2815 Gjøvik, Norway)

  • Mohib Ullah

    (Faculty of Information Technology and Electrical Engineering, Norwegian Univeristy of Science and Technology, 2815 Gjøvik, Norway)

  • Habib Ullah

    (Faculty of Science and Technology, Norwegian University of Life Sciences, 1430 Ås, Norway)

  • Basel Katt

    (Faculty of Information Technology and Electrical Engineering, Norwegian Univeristy of Science and Technology, 2815 Gjøvik, Norway)

  • Mohammad Hijji

    (Industrial Innovation and Robotic Center (IIRC), University of Tabuk, Tabuk 47711, Saudi Arabia)

  • Khan Muhammad

    (Visual Analytics for Knowledge Laboratory (VIS2KNOW Lab), Department of Applied Artificial Intelligence, School of Convergence, College of Computing and Informatics, Sungkyunkwan University, Seoul 03063, Korea)

Abstract

Open-source intelligence (OSINT) tools are used for gathering information using different publicly available sources. With the rapid advancement in information technology and excessive use of social media in our daily lives, more public information sources are available than ever before. The access to public information from different sources can be used for unlawful purposes. Extracting relevant information from pools of massive public information sources is a large task. Multiple tools and techniques have been developed for this task, which can be used to identify people, aircraft, ships, satellites, and more. In this paper, we identify the tools used for extracting the OSINT information and their effectiveness concerning each other in different test cases. We mapped the identified tools with Cyber Kill Chain and used them in realistic cybersecurity scenarios to check their effusiveness in gathering OSINT.

Suggested Citation

  • Muhammad Mudassar Yamin & Mohib Ullah & Habib Ullah & Basel Katt & Mohammad Hijji & Khan Muhammad, 2022. "Mapping Tools for Open Source Intelligence with Cyber Kill Chain for Adversarial Aware Security," Mathematics, MDPI, vol. 10(12), pages 1-25, June.
  • Handle: RePEc:gam:jmathe:v:10:y:2022:i:12:p:2054-:d:838416
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/2227-7390/10/12/2054/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/2227-7390/10/12/2054/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Hayes, Darren R. & Cappa, Francesco, 2018. "Open-source intelligence for risk assessment," Business Horizons, Elsevier, vol. 61(5), pages 689-697.
    2. Sejun Jang & Shuyu Li & Yunsick Sung, 2020. "FastText-Based Local Feature Visualization Algorithm for Merged Image-Based Malware Classification Framework for Cyber Security and Cyber Defense," Mathematics, MDPI, vol. 8(3), pages 1-13, March.
    3. Lu Xu & Yanhui Li & Jing Fu, 2019. "Cybersecurity Investment Allocation for a Multi-Branch Firm: Modeling and Optimization," Mathematics, MDPI, vol. 7(7), pages 1-20, July.
    4. Ozbay, Feyza Altunbey & Alatas, Bilal, 2020. "Fake news detection within online social media using supervised artificial intelligence algorithms," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 540(C).
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Maria Federica Cordova & Andrea Celone, 2019. "SDGs and Innovation in the Business Context Literature Review," Sustainability, MDPI, vol. 11(24), pages 1-14, December.
    2. Zhou, Hongli & Zhang, Xiaodong & Hu, Yang, 2020. "Robustness of open source product innovation community’s knowledge collaboration network under the dynamic environment," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 540(C).
    3. Frank Cremer & Barry Sheehan & Michael Fortmann & Arash N. Kia & Martin Mullins & Finbarr Murphy & Stefan Materne, 2022. "Cyber risk and cybersecurity: a systematic review of data availability," The Geneva Papers on Risk and Insurance - Issues and Practice, Palgrave Macmillan;The Geneva Association, vol. 47(3), pages 698-736, July.
    4. Kim, Jong Min & Park, Keeyeon Ki-cheon & Mariani, Marcello & Wamba, Samuel Fosso, 2024. "Investigating reviewers' intentions to post fake vs. authentic reviews based on behavioral linguistic features," Technological Forecasting and Social Change, Elsevier, vol. 198(C).
    5. Li, Ziqi & Shi, Chaoyi & Zhang, Qi & Chu, Tianguang, 2024. "Inferring the source of diffusion in networks under weak observation condition," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 637(C).
    6. Mohammad Zubair Khan & Omar Hussain Alhazmi, 0. "Study and analysis of unreliable news based on content acquired using ensemble learning (prevalence of fake news on social media)," International Journal of System Assurance Engineering and Management, Springer;The Society for Reliability, Engineering Quality and Operations Management (SREQOM),India, and Division of Operation and Maintenance, Lulea University of Technology, Sweden, vol. 0, pages 1-9.
    7. Cano-Marin, Enrique & Mora-Cantallops, Marçal & Sanchez-Alonso, Salvador, 2023. "The power of big data analytics over fake news: A scientometric review of Twitter as a predictive system in healthcare," Technological Forecasting and Social Change, Elsevier, vol. 190(C).
    8. Mohammad Zubair Khan & Omar Hussain Alhazmi, 2020. "Study and analysis of unreliable news based on content acquired using ensemble learning (prevalence of fake news on social media)," International Journal of System Assurance Engineering and Management, Springer;The Society for Reliability, Engineering Quality and Operations Management (SREQOM),India, and Division of Operation and Maintenance, Lulea University of Technology, Sweden, vol. 11(2), pages 145-153, July.
    9. Alessandro Mazzoccoli, 2023. "Optimal Cyber Security Investment in a Mixed Risk Management Framework: Examining the Role of Cyber Insurance and Expenditure Analysis," Risks, MDPI, vol. 11(9), pages 1-14, August.
    10. Andrea Stevens Karnyoto & Chengjie Sun & Bingquan Liu & Xiaolong Wang, 2022. "TB-BCG: Topic-Based BART Counterfeit Generator for Fake News Detection," Mathematics, MDPI, vol. 10(4), pages 1-17, February.
    11. Alessandro Mazzoccoli & Maurizio Naldi, 2022. "An Overview of Security Breach Probability Models," Risks, MDPI, vol. 10(11), pages 1-29, November.
    12. Balasubramanian Palani & Sivasankar Elango, 2023. "CTrL-FND: content-based transfer learning approach for fake news detection on social media," International Journal of System Assurance Engineering and Management, Springer;The Society for Reliability, Engineering Quality and Operations Management (SREQOM),India, and Division of Operation and Maintenance, Lulea University of Technology, Sweden, vol. 14(3), pages 903-918, June.
    13. Francesco Cappa & Michele Pinelli & Riccardo Maiolini & Maria Isabella Leone, 2021. "“Pledge” me your ears! The role of narratives and narrator experience in explaining crowdfunding success," Small Business Economics, Springer, vol. 57(2), pages 953-973, August.
    14. Loretta Mastroeni & Alessandro Mazzoccoli & Maurizio Naldi, 2023. "Cyber Insurance Premium Setting for Multi-Site Companies under Risk Correlation," Risks, MDPI, vol. 11(10), pages 1-18, September.
    15. Francesco Cappa & Federica Rosso & Darren Hayes, 2019. "Monetary and Social Rewards for Crowdsourcing," Sustainability, MDPI, vol. 11(10), pages 1-14, May.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jmathe:v:10:y:2022:i:12:p:2054-:d:838416. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.