Publication Type : Conference Paper
Publisher : Springer
Source : Cyber Security in Intelligent Computing and Communications
Url : https://link.springer.com/chapter/10.1007/978-981-16-8012-0_3
Campus : Coimbatore
Center : TIFAC CORE in Cyber Security
Department : TIFAC-CORE in Cyber Security
Year : 2022
Abstract : The paper’s goal is to explore what reconnaissance in cybersecurity is, the strategies and methodologies used in reconnaissance, meaning and its applications, description of the tools used for reconnaissance. The Open-Source Intelligence (OSINT) methodology involves specific methods of reconnaissance, gathering and analyzing information. Analysts need to have the tools that allow them to flexibly, tentatively and creatively generate foundations to start a line of inquiry, create and test their ideas, and to fluidly switch between approaches and analytical and reasoning techniques to build important and robust arguments as that particular line of inquiry is finalized. We have performed a survey of the most common open-source recon tools used to conduct reconnaissance activities, identified the missing features of each tool, conducted a study on the design consideration required to develop a reconnaissance tool and proposed a new framework to develop such a tool.
Cite this Research Publication : Vishnu, V., Praveen, K., Identifying Key Strategies for Reconnaissance in Cyber Security, Studies in Computational Intelligence (2022), Springer.