2016
DOI: 10.1007/978-3-319-47671-1_14
|View full text |Cite
|
Sign up to set email alerts
|

OSINT in the Context of Cyber-Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
21
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(21 citation statements)
references
References 53 publications
0
21
0
Order By: Relevance
“…Curation is an essential element for finding the most valuable information by efficiently using a limited "time resource" in the Big Data era. Data curation is provided for the goals of data search, data quality assurance, value addition, reuse, and preservation over time, which includes the creators/recorders and the selection and evaluation of record repositories [16]. In the past, the curation process was carried out using simple information collection.…”
Section: Osint General Requirements and Security Threatsmentioning
confidence: 99%
See 1 more Smart Citation
“…Curation is an essential element for finding the most valuable information by efficiently using a limited "time resource" in the Big Data era. Data curation is provided for the goals of data search, data quality assurance, value addition, reuse, and preservation over time, which includes the creators/recorders and the selection and evaluation of record repositories [16]. In the past, the curation process was carried out using simple information collection.…”
Section: Osint General Requirements and Security Threatsmentioning
confidence: 99%
“…If anyone accesses and modifies data in an open space, the reliability of data may degrade. In addition, users may accept and spread incorrect information because of the tempered data, laying a cornerstone for cybercrimes like fake news [16]. erefore, a guarantee of data integrity is an essential requirement in the OSINT process.…”
Section: Osint General Requirements and Security Threatsmentioning
confidence: 99%
“…Data collection, aggregation and analysis are techniques already exploited in the security field for a long time, with Open Source Intelligence (OSINT) techniques [23] as a representative example, where data from public sources, is aggregated to generate insights and detect attacks. Network traffic related information is essential to leverage advanced machine learning techniques in the cybersecurity area [24], where the quality in the data collected and how it is aggregated impacts in the performance of the detection.…”
Section: Applying Data Aggregation To 5g Securitymentioning
confidence: 99%
“…OSINT is useful throughout many phases of cyberattacks, but it is a primary tool used for reconnaissance, one of the first stages of an attack. Contrary to information technology (IT) systems, the application of OSINT is not restricted to specific data sources [8]. Therefore, OSINT can provide an abundance of information on a wide range of subjects that are synthesized to launch attacks.…”
Section: Open Source Intelligence (Osint) Usementioning
confidence: 99%
“…Specifically, in targeted attack models, OSINT is a vital component of the reconnaissance stage to gather as much intelligence as possible on the chosen target [4]. The OSINT process encompasses data collection, data enrichment, data analysis, and dissemination [8]. During analysis, the raw data is used to create a profile of the target and establish general trajectories to initiate an intrusion [4].…”
Section: Open Source Intelligence (Osint) Usementioning
confidence: 99%