Accès libre

Automated Target Profiling: Leveraging Artificial Intelligence for Open-Source Intelligence Collection

,  et   
05 juil. 2025
À propos de cet article

Citez
Télécharger la couverture

Dawson ME Jr. Cyber Warfare: Threats and Opportunities [Internet]. Porto, Portugal: Universidade Fernando Pessoa; 2020 [cited 2025 Apr 20]. Available from: https://bdigital.ufp.pt/entities/publication/5e93c236-588a-4564-bfb6-982d33fe11b4. Search in Google Scholar

Dawson M. Integrating intelligence paradigms into cyber security curriculum for advanced threat mitigation. In: Information Technology – New Generations. Cham, Switzerland: Springer Nature; 2024. pp. 77–81. Search in Google Scholar

Oerlemans JJ, Langenhuijzen S. Balancing national security and privacy: examining the use of commercially available information in OSINT practices. Int J Intell CounterIntell. 2025;38(2):579–597. Search in Google Scholar

Browne TO, Abedin M, Chowdhury MJM. A systematic review on research utilising artificial intelligence for open source intelligence (OSINT) applications. Int J Inf Secur. 2024;23(4):2911–2938. Search in Google Scholar

Stryker C, Kavlakoglu E. What is Artificial Intelligence (AI)? [Internet]. Armonk, NY: IBM; 2024 Aug 9 [cited 2025 Apr 20]. Available from: https://www.ibm.com/think/topics/artificial-intelligence. Search in Google Scholar

Sevilla J, Heim L, Ho A, Besiroglu T, Hobbhahn M, Villalobos P. Compute trends across three eras of machine learning. In: International Joint Conference on Neural Networks (IJCNN). [Place unknown]: IEEE; 2022. pp. 1–8. Search in Google Scholar

IBM. What are large language models (LLMs)? [Internet]. Armonk, NY: IBM; 2023 Nov 2 [cited 2025 Apr 20]. Available from: https://www.ibm.com/think/topics/large-language-models. Search in Google Scholar

OpenAI. GPT-4 technical report [Internet]. [Place unknown]: arXiv; 2023 [cited 2025 Apr 20]. Available from: https://arxiv.org/abs/2303.08774. Search in Google Scholar

EuRepoC. Dashboard - EuRepoC: European Repository of Cyber Incidents [Internet]. [Place unknown]: EuRepoC; 2023 Oct 13 [cited 2025 Apr 20]. Available from: https://eurepoc.eu/dashboard/. Search in Google Scholar

Kost E. What is an advanced persistent threat (APT)? [Internet]. Mountain View, CA: UpGuard; 2024 Nov 17 [cited 2025 Apr 20]. Available from: https://www.upguard.com/blog/what-is-an-advanced-persistent-threat. Search in Google Scholar

Conti M, Dargahi T, Dehghantanha A. Cyber threat intelligence: Challenges and opportunities. Adv Inf Secur. 2018;1–6. Search in Google Scholar

Baker K. What is Cyber Threat Intelligence? [Internet]. Austin, TX: CrowdStrike; 2025 Mar 4 [cited 2025 Apr 20]. Available from: https://www.crowdstrike.com/enus/cybersecurity-101/threat-intelligence/. Search in Google Scholar

Hwang YW, Lee IY, Kim H, Lee H, Kim D. Current status and security trend of OSINT. Wirel Commun Mob Comput. 2022;2022:1–14. Search in Google Scholar

MITRE ATT&CK®. APT Groups [Internet]. [Place unknown]: MITRE; [cited 2025 Apr 20]. Available from: https://attack.mitre.org/groups/. Search in Google Scholar

United States. Cybersecurity Act of 2015, 6 U.S.C. §§ 1501–1533, 2015. Search in Google Scholar

United States. Cybersecurity Enhancement Act of 2014, 15 U.S.C. §§ 7421–7430, 2014. Search in Google Scholar

Sun N, Ding M, Jiang J, Xu W, Mo X, Tai Y, Zhang J. Cyber Threat Intelligence Mining for Proactive Cybersecurity defense: A survey and new perspectives. IEEE Commun Surv Tutor. 2023;25(3):1748–1774. Search in Google Scholar

Evangelista JR, Sassi RJ, Romero M, Napolitano D. Systematic literature review to investigate the application of Open Source Intelligence (OSINT) with Artificial Intelligence. J Appl Secur Res. 2020;16(3):345–369. Search in Google Scholar

RapidAPI. RapidAPI [Internet]. [Place unknown]: RapidAPI; [cited 2025 Apr 20]. Available from: https://rapidapi.com/. Search in Google Scholar

RealtimeAPI. Facebook RealtimeAPI [Internet]. [Place unknown]: RapidAPI; [cited 2025 Apr 20]. Available from: https://rapidapi.com/realtimeapi-realtimeapi-default/api/facebook-realtimeapi. Search in Google Scholar

RockApis. LinkedIn API8 [Internet]. [Place unknown]: RapidAPI; [cited 2025 Apr 20]. Available from: https://rapidapi.com/rockapis-rockapis-default/api/linkedin-api8. Search in Google Scholar

AhnKiet N. Facebook Data API2 [Internet]. [Place unknown]: RapidAPI; [cited 2025 Apr 20]. Available from: https://rapidapi.com/tml25092004/api/facebook-data-api2. Search in Google Scholar

davethebeast. Twitter241 [Internet]. [Place unknown]: RapidAPI; [cited 2025 Apr 20]. Available from: https://rapidapi.com/davethebeast/api/twitter241. Search in Google Scholar

Meta. React [Internet]. [Place unknown]: Meta; [cited 2025 Apr 20]. Available from: https://reactjs.org/. Search in Google Scholar

Grinberg M. Flask [Internet]. [Place unknown]: [Publisher unknown]; [cited 2025 Apr 20]. Available from: https://flask.palletsprojects.com/. Search in Google Scholar

Jocher G, et al. YOLOv8 [Internet]. [Place unknown]: Ultralytics; [cited 2025 Apr 20]. Available from: https://docs.ultralytics.com/. Search in Google Scholar

Serengil SI. DeepFace [Internet]. [Place unknown]: [Publisher unknown]; [cited 2025 Apr 20]. Available from: https://github.com/serengil/deepface. Search in Google Scholar

Amazon Web Services, Inc. Amazon Web Services (AWS) [Internet]. [Place unknown]: AWS; [cited 2025 Apr 20]. Available from: https://aws.amazon.com/. Search in Google Scholar

Bier EA, Card SK, Bodnar JW. Entity-based collaboration tools for intelligence analysis. In: IEEE Symposium on Visual Analytics Science and Technology. Columbus, OH, USA: IEEE; 2008. pp. 99–106. Search in Google Scholar

Dawson M, Lieble M, Adeboje A. Open source intelligence: Performing data mining and link analysis to track terrorist activities. In: Information Technology – New Generations. Cham, Switzerland: Springer International Publishing; 2018. pp. 159–163. Search in Google Scholar