Open-source intelligence: a comprehensive review of the current state, applications and future perspectives in cyber security

The volume of data generated by today’s digitally connected world is enormous, and a significant portion of it is publicly available. These data sources are web archives, public databases, and social networks such as Facebook, Twitter, LinkedIn, Emails, Telegrams, etc. Open-source intelligence (OSIN...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:The Artificial intelligence review 2023-11, Vol.56 (11), p.12407-12438
Hauptverfasser: Yadav, Ashok, Kumar, Atul, Singh, Vrijendra
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 12438
container_issue 11
container_start_page 12407
container_title The Artificial intelligence review
container_volume 56
creator Yadav, Ashok
Kumar, Atul
Singh, Vrijendra
description The volume of data generated by today’s digitally connected world is enormous, and a significant portion of it is publicly available. These data sources are web archives, public databases, and social networks such as Facebook, Twitter, LinkedIn, Emails, Telegrams, etc. Open-source intelligence (OSINT) extracts information from a collection of publicly available and accessible data. OSINT can provide a solution to the challenges in extracting and gathering intelligence from various publicly available information and social networks. OSINT is currently expanding at an incredible rate, bringing new artificial intelligence-based approaches to address issues of national security, political campaign, the cyber industry, criminal profiling, and society, as well as cyber threats and crimes. In this paper, we have described the current state of OSINT tools/techniques and the state of the art for various applications of OSINT in cyber security. In addition, we have discussed the challenges and future directions to develop autonomous models. These models can provide solutions for different social network-based security, digital forensics, and cyber crime-based problems using various machine learning (ML), deep learning (DL) and artificial intelligence (AI) with OSINT.
doi_str_mv 10.1007/s10462-023-10454-y
format Article
fullrecord <record><control><sourceid>gale_pubme</sourceid><recordid>TN_cdi_pubmedcentral_primary_oai_pubmedcentral_nih_gov_10014398</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A766307682</galeid><sourcerecordid>A766307682</sourcerecordid><originalsourceid>FETCH-LOGICAL-c514t-89527293f49a0480a426fcf05a21aa0c3616a0ec612947a1c69382aceffb8f343</originalsourceid><addsrcrecordid>eNp9UstuFDEQtBCILIEf4IAsceGQCX6NPcMliqLwkCLlAmfL623vOpq1B9uzaA78O14mhMcB-WCru6pc3SqEXlJyTglRbzMlQrKGMN7UVyua-RFa0VbxRtX6Y7QiTPYN6xg9Qc9yviOEtEzwp-iEKy5ZT8gKfb8dITQ5TskC9qHAMPgtBAvvsME27scEOwjZHwAnOHj4hqPDZQfYTilBKDgXU-AMm3EcvDXFx5CxCRvspjIlwCOkPIItVSBXfWznNSScodJ9mZ-jJ84MGV7c36foy_vrz1cfm5vbD5-uLm8a21JRmq5vmWI9d6I3RHTECCaddaQ1jBpDLJdUGgJWUtYLZaiVPe-YseDcunNc8FN0seiO03oPG1uNJzPoMfm9SbOOxuu_O8Hv9DYedN0zFbzvqsKbe4UUv06Qi977bOu2TIA4Zc06ThjtOTtCX_8DvavrDXW-ipJKUNl2R9T5gtqaAbQPLtaPbT0b2HsbAzhf65dKSk6U7FglsIVgU8w5gXuwT8nRp9JLHnTNg_6ZBz1X0qs_B3-g_ApABfAFkGsrbCH9Nvsf2R_eGsN4</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2867416588</pqid></control><display><type>article</type><title>Open-source intelligence: a comprehensive review of the current state, applications and future perspectives in cyber security</title><source>SpringerNature Journals</source><creator>Yadav, Ashok ; Kumar, Atul ; Singh, Vrijendra</creator><creatorcontrib>Yadav, Ashok ; Kumar, Atul ; Singh, Vrijendra</creatorcontrib><description>The volume of data generated by today’s digitally connected world is enormous, and a significant portion of it is publicly available. These data sources are web archives, public databases, and social networks such as Facebook, Twitter, LinkedIn, Emails, Telegrams, etc. Open-source intelligence (OSINT) extracts information from a collection of publicly available and accessible data. OSINT can provide a solution to the challenges in extracting and gathering intelligence from various publicly available information and social networks. OSINT is currently expanding at an incredible rate, bringing new artificial intelligence-based approaches to address issues of national security, political campaign, the cyber industry, criminal profiling, and society, as well as cyber threats and crimes. In this paper, we have described the current state of OSINT tools/techniques and the state of the art for various applications of OSINT in cyber security. In addition, we have discussed the challenges and future directions to develop autonomous models. These models can provide solutions for different social network-based security, digital forensics, and cyber crime-based problems using various machine learning (ML), deep learning (DL) and artificial intelligence (AI) with OSINT.</description><identifier>ISSN: 0269-2821</identifier><identifier>EISSN: 1573-7462</identifier><identifier>DOI: 10.1007/s10462-023-10454-y</identifier><identifier>PMID: 37362900</identifier><language>eng</language><publisher>Dordrecht: Springer Netherlands</publisher><subject>Artificial Intelligence ; Computational linguistics ; Computer forensics ; Computer Science ; Crime ; Cybersecurity ; Cyberterrorism ; Data security ; Deep learning ; Digital archives ; Digital libraries ; Forensic computing ; Language processing ; Machine learning ; Natural language interfaces ; Open source software ; Social media ; Social networks</subject><ispartof>The Artificial intelligence review, 2023-11, Vol.56 (11), p.12407-12438</ispartof><rights>The Author(s), under exclusive licence to Springer Nature B.V. 2023. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.</rights><rights>The Author(s), under exclusive licence to Springer Nature B.V. 2023, Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.</rights><rights>COPYRIGHT 2023 Springer</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c514t-89527293f49a0480a426fcf05a21aa0c3616a0ec612947a1c69382aceffb8f343</citedby><cites>FETCH-LOGICAL-c514t-89527293f49a0480a426fcf05a21aa0c3616a0ec612947a1c69382aceffb8f343</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s10462-023-10454-y$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s10462-023-10454-y$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>230,315,782,786,887,27931,27932,41495,42564,51326</link.rule.ids><backlink>$$Uhttps://www.ncbi.nlm.nih.gov/pubmed/37362900$$D View this record in MEDLINE/PubMed$$Hfree_for_read</backlink></links><search><creatorcontrib>Yadav, Ashok</creatorcontrib><creatorcontrib>Kumar, Atul</creatorcontrib><creatorcontrib>Singh, Vrijendra</creatorcontrib><title>Open-source intelligence: a comprehensive review of the current state, applications and future perspectives in cyber security</title><title>The Artificial intelligence review</title><addtitle>Artif Intell Rev</addtitle><addtitle>Artif Intell Rev</addtitle><description>The volume of data generated by today’s digitally connected world is enormous, and a significant portion of it is publicly available. These data sources are web archives, public databases, and social networks such as Facebook, Twitter, LinkedIn, Emails, Telegrams, etc. Open-source intelligence (OSINT) extracts information from a collection of publicly available and accessible data. OSINT can provide a solution to the challenges in extracting and gathering intelligence from various publicly available information and social networks. OSINT is currently expanding at an incredible rate, bringing new artificial intelligence-based approaches to address issues of national security, political campaign, the cyber industry, criminal profiling, and society, as well as cyber threats and crimes. In this paper, we have described the current state of OSINT tools/techniques and the state of the art for various applications of OSINT in cyber security. In addition, we have discussed the challenges and future directions to develop autonomous models. These models can provide solutions for different social network-based security, digital forensics, and cyber crime-based problems using various machine learning (ML), deep learning (DL) and artificial intelligence (AI) with OSINT.</description><subject>Artificial Intelligence</subject><subject>Computational linguistics</subject><subject>Computer forensics</subject><subject>Computer Science</subject><subject>Crime</subject><subject>Cybersecurity</subject><subject>Cyberterrorism</subject><subject>Data security</subject><subject>Deep learning</subject><subject>Digital archives</subject><subject>Digital libraries</subject><subject>Forensic computing</subject><subject>Language processing</subject><subject>Machine learning</subject><subject>Natural language interfaces</subject><subject>Open source software</subject><subject>Social media</subject><subject>Social networks</subject><issn>0269-2821</issn><issn>1573-7462</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp9UstuFDEQtBCILIEf4IAsceGQCX6NPcMliqLwkCLlAmfL623vOpq1B9uzaA78O14mhMcB-WCru6pc3SqEXlJyTglRbzMlQrKGMN7UVyua-RFa0VbxRtX6Y7QiTPYN6xg9Qc9yviOEtEzwp-iEKy5ZT8gKfb8dITQ5TskC9qHAMPgtBAvvsME27scEOwjZHwAnOHj4hqPDZQfYTilBKDgXU-AMm3EcvDXFx5CxCRvspjIlwCOkPIItVSBXfWznNSScodJ9mZ-jJ84MGV7c36foy_vrz1cfm5vbD5-uLm8a21JRmq5vmWI9d6I3RHTECCaddaQ1jBpDLJdUGgJWUtYLZaiVPe-YseDcunNc8FN0seiO03oPG1uNJzPoMfm9SbOOxuu_O8Hv9DYedN0zFbzvqsKbe4UUv06Qi977bOu2TIA4Zc06ThjtOTtCX_8DvavrDXW-ipJKUNl2R9T5gtqaAbQPLtaPbT0b2HsbAzhf65dKSk6U7FglsIVgU8w5gXuwT8nRp9JLHnTNg_6ZBz1X0qs_B3-g_ApABfAFkGsrbCH9Nvsf2R_eGsN4</recordid><startdate>20231101</startdate><enddate>20231101</enddate><creator>Yadav, Ashok</creator><creator>Kumar, Atul</creator><creator>Singh, Vrijendra</creator><general>Springer Netherlands</general><general>Springer</general><general>Springer Nature B.V</general><scope>NPM</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ALSLI</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>CNYFK</scope><scope>DWQXO</scope><scope>E3H</scope><scope>F2A</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M0N</scope><scope>M1O</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PSYQQ</scope><scope>Q9U</scope><scope>7X8</scope><scope>5PM</scope></search><sort><creationdate>20231101</creationdate><title>Open-source intelligence: a comprehensive review of the current state, applications and future perspectives in cyber security</title><author>Yadav, Ashok ; Kumar, Atul ; Singh, Vrijendra</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c514t-89527293f49a0480a426fcf05a21aa0c3616a0ec612947a1c69382aceffb8f343</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Artificial Intelligence</topic><topic>Computational linguistics</topic><topic>Computer forensics</topic><topic>Computer Science</topic><topic>Crime</topic><topic>Cybersecurity</topic><topic>Cyberterrorism</topic><topic>Data security</topic><topic>Deep learning</topic><topic>Digital archives</topic><topic>Digital libraries</topic><topic>Forensic computing</topic><topic>Language processing</topic><topic>Machine learning</topic><topic>Natural language interfaces</topic><topic>Open source software</topic><topic>Social media</topic><topic>Social networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Yadav, Ashok</creatorcontrib><creatorcontrib>Kumar, Atul</creatorcontrib><creatorcontrib>Singh, Vrijendra</creatorcontrib><collection>PubMed</collection><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>Access via ABI/INFORM (ProQuest)</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Social Science Premium Collection</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>Library &amp; Information Science Collection</collection><collection>ProQuest Central Korea</collection><collection>Library &amp; Information Sciences Abstracts (LISA)</collection><collection>Library &amp; Information Science Abstracts (LISA)</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>Library Science Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest One Psychology</collection><collection>ProQuest Central Basic</collection><collection>MEDLINE - Academic</collection><collection>PubMed Central (Full Participant titles)</collection><jtitle>The Artificial intelligence review</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Yadav, Ashok</au><au>Kumar, Atul</au><au>Singh, Vrijendra</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Open-source intelligence: a comprehensive review of the current state, applications and future perspectives in cyber security</atitle><jtitle>The Artificial intelligence review</jtitle><stitle>Artif Intell Rev</stitle><addtitle>Artif Intell Rev</addtitle><date>2023-11-01</date><risdate>2023</risdate><volume>56</volume><issue>11</issue><spage>12407</spage><epage>12438</epage><pages>12407-12438</pages><issn>0269-2821</issn><eissn>1573-7462</eissn><abstract>The volume of data generated by today’s digitally connected world is enormous, and a significant portion of it is publicly available. These data sources are web archives, public databases, and social networks such as Facebook, Twitter, LinkedIn, Emails, Telegrams, etc. Open-source intelligence (OSINT) extracts information from a collection of publicly available and accessible data. OSINT can provide a solution to the challenges in extracting and gathering intelligence from various publicly available information and social networks. OSINT is currently expanding at an incredible rate, bringing new artificial intelligence-based approaches to address issues of national security, political campaign, the cyber industry, criminal profiling, and society, as well as cyber threats and crimes. In this paper, we have described the current state of OSINT tools/techniques and the state of the art for various applications of OSINT in cyber security. In addition, we have discussed the challenges and future directions to develop autonomous models. These models can provide solutions for different social network-based security, digital forensics, and cyber crime-based problems using various machine learning (ML), deep learning (DL) and artificial intelligence (AI) with OSINT.</abstract><cop>Dordrecht</cop><pub>Springer Netherlands</pub><pmid>37362900</pmid><doi>10.1007/s10462-023-10454-y</doi><tpages>32</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 0269-2821
ispartof The Artificial intelligence review, 2023-11, Vol.56 (11), p.12407-12438
issn 0269-2821
1573-7462
language eng
recordid cdi_pubmedcentral_primary_oai_pubmedcentral_nih_gov_10014398
source SpringerNature Journals
subjects Artificial Intelligence
Computational linguistics
Computer forensics
Computer Science
Crime
Cybersecurity
Cyberterrorism
Data security
Deep learning
Digital archives
Digital libraries
Forensic computing
Language processing
Machine learning
Natural language interfaces
Open source software
Social media
Social networks
title Open-source intelligence: a comprehensive review of the current state, applications and future perspectives in cyber security
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-04T12%3A16%3A44IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_pubme&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Open-source%20intelligence:%20a%20comprehensive%20review%20of%20the%20current%20state,%20applications%20and%20future%20perspectives%20in%20cyber%20security&rft.jtitle=The%20Artificial%20intelligence%20review&rft.au=Yadav,%20Ashok&rft.date=2023-11-01&rft.volume=56&rft.issue=11&rft.spage=12407&rft.epage=12438&rft.pages=12407-12438&rft.issn=0269-2821&rft.eissn=1573-7462&rft_id=info:doi/10.1007/s10462-023-10454-y&rft_dat=%3Cgale_pubme%3EA766307682%3C/gale_pubme%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2867416588&rft_id=info:pmid/37362900&rft_galeid=A766307682&rfr_iscdi=true