Open-source intelligence: a comprehensive review of the current state, applications and future perspectives in cyber security
The volume of data generated by today’s digitally connected world is enormous, and a significant portion of it is publicly available. These data sources are web archives, public databases, and social networks such as Facebook, Twitter, LinkedIn, Emails, Telegrams, etc. Open-source intelligence (OSIN...
Gespeichert in:
Veröffentlicht in: | The Artificial intelligence review 2023-11, Vol.56 (11), p.12407-12438 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 12438 |
---|---|
container_issue | 11 |
container_start_page | 12407 |
container_title | The Artificial intelligence review |
container_volume | 56 |
creator | Yadav, Ashok Kumar, Atul Singh, Vrijendra |
description | The volume of data generated by today’s digitally connected world is enormous, and a significant portion of it is publicly available. These data sources are web archives, public databases, and social networks such as Facebook, Twitter, LinkedIn, Emails, Telegrams, etc. Open-source intelligence (OSINT) extracts information from a collection of publicly available and accessible data. OSINT can provide a solution to the challenges in extracting and gathering intelligence from various publicly available information and social networks. OSINT is currently expanding at an incredible rate, bringing new artificial intelligence-based approaches to address issues of national security, political campaign, the cyber industry, criminal profiling, and society, as well as cyber threats and crimes. In this paper, we have described the current state of OSINT tools/techniques and the state of the art for various applications of OSINT in cyber security. In addition, we have discussed the challenges and future directions to develop autonomous models. These models can provide solutions for different social network-based security, digital forensics, and cyber crime-based problems using various machine learning (ML), deep learning (DL) and artificial intelligence (AI) with OSINT. |
doi_str_mv | 10.1007/s10462-023-10454-y |
format | Article |
fullrecord | <record><control><sourceid>gale_pubme</sourceid><recordid>TN_cdi_pubmedcentral_primary_oai_pubmedcentral_nih_gov_10014398</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A766307682</galeid><sourcerecordid>A766307682</sourcerecordid><originalsourceid>FETCH-LOGICAL-c514t-89527293f49a0480a426fcf05a21aa0c3616a0ec612947a1c69382aceffb8f343</originalsourceid><addsrcrecordid>eNp9UstuFDEQtBCILIEf4IAsceGQCX6NPcMliqLwkCLlAmfL623vOpq1B9uzaA78O14mhMcB-WCru6pc3SqEXlJyTglRbzMlQrKGMN7UVyua-RFa0VbxRtX6Y7QiTPYN6xg9Qc9yviOEtEzwp-iEKy5ZT8gKfb8dITQ5TskC9qHAMPgtBAvvsME27scEOwjZHwAnOHj4hqPDZQfYTilBKDgXU-AMm3EcvDXFx5CxCRvspjIlwCOkPIItVSBXfWznNSScodJ9mZ-jJ84MGV7c36foy_vrz1cfm5vbD5-uLm8a21JRmq5vmWI9d6I3RHTECCaddaQ1jBpDLJdUGgJWUtYLZaiVPe-YseDcunNc8FN0seiO03oPG1uNJzPoMfm9SbOOxuu_O8Hv9DYedN0zFbzvqsKbe4UUv06Qi977bOu2TIA4Zc06ThjtOTtCX_8DvavrDXW-ipJKUNl2R9T5gtqaAbQPLtaPbT0b2HsbAzhf65dKSk6U7FglsIVgU8w5gXuwT8nRp9JLHnTNg_6ZBz1X0qs_B3-g_ApABfAFkGsrbCH9Nvsf2R_eGsN4</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2867416588</pqid></control><display><type>article</type><title>Open-source intelligence: a comprehensive review of the current state, applications and future perspectives in cyber security</title><source>SpringerNature Journals</source><creator>Yadav, Ashok ; Kumar, Atul ; Singh, Vrijendra</creator><creatorcontrib>Yadav, Ashok ; Kumar, Atul ; Singh, Vrijendra</creatorcontrib><description>The volume of data generated by today’s digitally connected world is enormous, and a significant portion of it is publicly available. These data sources are web archives, public databases, and social networks such as Facebook, Twitter, LinkedIn, Emails, Telegrams, etc. Open-source intelligence (OSINT) extracts information from a collection of publicly available and accessible data. OSINT can provide a solution to the challenges in extracting and gathering intelligence from various publicly available information and social networks. OSINT is currently expanding at an incredible rate, bringing new artificial intelligence-based approaches to address issues of national security, political campaign, the cyber industry, criminal profiling, and society, as well as cyber threats and crimes. In this paper, we have described the current state of OSINT tools/techniques and the state of the art for various applications of OSINT in cyber security. In addition, we have discussed the challenges and future directions to develop autonomous models. These models can provide solutions for different social network-based security, digital forensics, and cyber crime-based problems using various machine learning (ML), deep learning (DL) and artificial intelligence (AI) with OSINT.</description><identifier>ISSN: 0269-2821</identifier><identifier>EISSN: 1573-7462</identifier><identifier>DOI: 10.1007/s10462-023-10454-y</identifier><identifier>PMID: 37362900</identifier><language>eng</language><publisher>Dordrecht: Springer Netherlands</publisher><subject>Artificial Intelligence ; Computational linguistics ; Computer forensics ; Computer Science ; Crime ; Cybersecurity ; Cyberterrorism ; Data security ; Deep learning ; Digital archives ; Digital libraries ; Forensic computing ; Language processing ; Machine learning ; Natural language interfaces ; Open source software ; Social media ; Social networks</subject><ispartof>The Artificial intelligence review, 2023-11, Vol.56 (11), p.12407-12438</ispartof><rights>The Author(s), under exclusive licence to Springer Nature B.V. 2023. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.</rights><rights>The Author(s), under exclusive licence to Springer Nature B.V. 2023, Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.</rights><rights>COPYRIGHT 2023 Springer</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c514t-89527293f49a0480a426fcf05a21aa0c3616a0ec612947a1c69382aceffb8f343</citedby><cites>FETCH-LOGICAL-c514t-89527293f49a0480a426fcf05a21aa0c3616a0ec612947a1c69382aceffb8f343</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s10462-023-10454-y$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s10462-023-10454-y$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>230,315,782,786,887,27931,27932,41495,42564,51326</link.rule.ids><backlink>$$Uhttps://www.ncbi.nlm.nih.gov/pubmed/37362900$$D View this record in MEDLINE/PubMed$$Hfree_for_read</backlink></links><search><creatorcontrib>Yadav, Ashok</creatorcontrib><creatorcontrib>Kumar, Atul</creatorcontrib><creatorcontrib>Singh, Vrijendra</creatorcontrib><title>Open-source intelligence: a comprehensive review of the current state, applications and future perspectives in cyber security</title><title>The Artificial intelligence review</title><addtitle>Artif Intell Rev</addtitle><addtitle>Artif Intell Rev</addtitle><description>The volume of data generated by today’s digitally connected world is enormous, and a significant portion of it is publicly available. These data sources are web archives, public databases, and social networks such as Facebook, Twitter, LinkedIn, Emails, Telegrams, etc. Open-source intelligence (OSINT) extracts information from a collection of publicly available and accessible data. OSINT can provide a solution to the challenges in extracting and gathering intelligence from various publicly available information and social networks. OSINT is currently expanding at an incredible rate, bringing new artificial intelligence-based approaches to address issues of national security, political campaign, the cyber industry, criminal profiling, and society, as well as cyber threats and crimes. In this paper, we have described the current state of OSINT tools/techniques and the state of the art for various applications of OSINT in cyber security. In addition, we have discussed the challenges and future directions to develop autonomous models. These models can provide solutions for different social network-based security, digital forensics, and cyber crime-based problems using various machine learning (ML), deep learning (DL) and artificial intelligence (AI) with OSINT.</description><subject>Artificial Intelligence</subject><subject>Computational linguistics</subject><subject>Computer forensics</subject><subject>Computer Science</subject><subject>Crime</subject><subject>Cybersecurity</subject><subject>Cyberterrorism</subject><subject>Data security</subject><subject>Deep learning</subject><subject>Digital archives</subject><subject>Digital libraries</subject><subject>Forensic computing</subject><subject>Language processing</subject><subject>Machine learning</subject><subject>Natural language interfaces</subject><subject>Open source software</subject><subject>Social media</subject><subject>Social networks</subject><issn>0269-2821</issn><issn>1573-7462</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp9UstuFDEQtBCILIEf4IAsceGQCX6NPcMliqLwkCLlAmfL623vOpq1B9uzaA78O14mhMcB-WCru6pc3SqEXlJyTglRbzMlQrKGMN7UVyua-RFa0VbxRtX6Y7QiTPYN6xg9Qc9yviOEtEzwp-iEKy5ZT8gKfb8dITQ5TskC9qHAMPgtBAvvsME27scEOwjZHwAnOHj4hqPDZQfYTilBKDgXU-AMm3EcvDXFx5CxCRvspjIlwCOkPIItVSBXfWznNSScodJ9mZ-jJ84MGV7c36foy_vrz1cfm5vbD5-uLm8a21JRmq5vmWI9d6I3RHTECCaddaQ1jBpDLJdUGgJWUtYLZaiVPe-YseDcunNc8FN0seiO03oPG1uNJzPoMfm9SbOOxuu_O8Hv9DYedN0zFbzvqsKbe4UUv06Qi977bOu2TIA4Zc06ThjtOTtCX_8DvavrDXW-ipJKUNl2R9T5gtqaAbQPLtaPbT0b2HsbAzhf65dKSk6U7FglsIVgU8w5gXuwT8nRp9JLHnTNg_6ZBz1X0qs_B3-g_ApABfAFkGsrbCH9Nvsf2R_eGsN4</recordid><startdate>20231101</startdate><enddate>20231101</enddate><creator>Yadav, Ashok</creator><creator>Kumar, Atul</creator><creator>Singh, Vrijendra</creator><general>Springer Netherlands</general><general>Springer</general><general>Springer Nature B.V</general><scope>NPM</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ALSLI</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>CNYFK</scope><scope>DWQXO</scope><scope>E3H</scope><scope>F2A</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M0N</scope><scope>M1O</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PSYQQ</scope><scope>Q9U</scope><scope>7X8</scope><scope>5PM</scope></search><sort><creationdate>20231101</creationdate><title>Open-source intelligence: a comprehensive review of the current state, applications and future perspectives in cyber security</title><author>Yadav, Ashok ; Kumar, Atul ; Singh, Vrijendra</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c514t-89527293f49a0480a426fcf05a21aa0c3616a0ec612947a1c69382aceffb8f343</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Artificial Intelligence</topic><topic>Computational linguistics</topic><topic>Computer forensics</topic><topic>Computer Science</topic><topic>Crime</topic><topic>Cybersecurity</topic><topic>Cyberterrorism</topic><topic>Data security</topic><topic>Deep learning</topic><topic>Digital archives</topic><topic>Digital libraries</topic><topic>Forensic computing</topic><topic>Language processing</topic><topic>Machine learning</topic><topic>Natural language interfaces</topic><topic>Open source software</topic><topic>Social media</topic><topic>Social networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Yadav, Ashok</creatorcontrib><creatorcontrib>Kumar, Atul</creatorcontrib><creatorcontrib>Singh, Vrijendra</creatorcontrib><collection>PubMed</collection><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>Access via ABI/INFORM (ProQuest)</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Social Science Premium Collection</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>Library & Information Science Collection</collection><collection>ProQuest Central Korea</collection><collection>Library & Information Sciences Abstracts (LISA)</collection><collection>Library & Information Science Abstracts (LISA)</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>Library Science Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest One Psychology</collection><collection>ProQuest Central Basic</collection><collection>MEDLINE - Academic</collection><collection>PubMed Central (Full Participant titles)</collection><jtitle>The Artificial intelligence review</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Yadav, Ashok</au><au>Kumar, Atul</au><au>Singh, Vrijendra</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Open-source intelligence: a comprehensive review of the current state, applications and future perspectives in cyber security</atitle><jtitle>The Artificial intelligence review</jtitle><stitle>Artif Intell Rev</stitle><addtitle>Artif Intell Rev</addtitle><date>2023-11-01</date><risdate>2023</risdate><volume>56</volume><issue>11</issue><spage>12407</spage><epage>12438</epage><pages>12407-12438</pages><issn>0269-2821</issn><eissn>1573-7462</eissn><abstract>The volume of data generated by today’s digitally connected world is enormous, and a significant portion of it is publicly available. These data sources are web archives, public databases, and social networks such as Facebook, Twitter, LinkedIn, Emails, Telegrams, etc. Open-source intelligence (OSINT) extracts information from a collection of publicly available and accessible data. OSINT can provide a solution to the challenges in extracting and gathering intelligence from various publicly available information and social networks. OSINT is currently expanding at an incredible rate, bringing new artificial intelligence-based approaches to address issues of national security, political campaign, the cyber industry, criminal profiling, and society, as well as cyber threats and crimes. In this paper, we have described the current state of OSINT tools/techniques and the state of the art for various applications of OSINT in cyber security. In addition, we have discussed the challenges and future directions to develop autonomous models. These models can provide solutions for different social network-based security, digital forensics, and cyber crime-based problems using various machine learning (ML), deep learning (DL) and artificial intelligence (AI) with OSINT.</abstract><cop>Dordrecht</cop><pub>Springer Netherlands</pub><pmid>37362900</pmid><doi>10.1007/s10462-023-10454-y</doi><tpages>32</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0269-2821 |
ispartof | The Artificial intelligence review, 2023-11, Vol.56 (11), p.12407-12438 |
issn | 0269-2821 1573-7462 |
language | eng |
recordid | cdi_pubmedcentral_primary_oai_pubmedcentral_nih_gov_10014398 |
source | SpringerNature Journals |
subjects | Artificial Intelligence Computational linguistics Computer forensics Computer Science Crime Cybersecurity Cyberterrorism Data security Deep learning Digital archives Digital libraries Forensic computing Language processing Machine learning Natural language interfaces Open source software Social media Social networks |
title | Open-source intelligence: a comprehensive review of the current state, applications and future perspectives in cyber security |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-04T12%3A16%3A44IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_pubme&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Open-source%20intelligence:%20a%20comprehensive%20review%20of%20the%20current%20state,%20applications%20and%20future%20perspectives%20in%20cyber%20security&rft.jtitle=The%20Artificial%20intelligence%20review&rft.au=Yadav,%20Ashok&rft.date=2023-11-01&rft.volume=56&rft.issue=11&rft.spage=12407&rft.epage=12438&rft.pages=12407-12438&rft.issn=0269-2821&rft.eissn=1573-7462&rft_id=info:doi/10.1007/s10462-023-10454-y&rft_dat=%3Cgale_pubme%3EA766307682%3C/gale_pubme%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2867416588&rft_id=info:pmid/37362900&rft_galeid=A766307682&rfr_iscdi=true |