Back close

Identifying Key Strategies for Reconnaissance in Cyber Security

Publication Type : Conference Paper

Publisher : Springer

Source : Cyber Security in Intelligent Computing and Communications

Url : https://link.springer.com/chapter/10.1007/978-981-16-8012-0_3

Campus : Coimbatore

Center : TIFAC CORE in Cyber Security

Department : TIFAC-CORE in Cyber Security

Year : 2022

Abstract : The paper’s goal is to explore what reconnaissance in cybersecurity is, the strategies and methodologies used in reconnaissance, meaning and its applications, description of the tools used for reconnaissance. The Open-Source Intelligence (OSINT) methodology involves specific methods of reconnaissance, gathering and analyzing information. Analysts need to have the tools that allow them to flexibly, tentatively and creatively generate foundations to start a line of inquiry, create and test their ideas, and to fluidly switch between approaches and analytical and reasoning techniques to build important and robust arguments as that particular line of inquiry is finalized. We have performed a survey of the most common open-source recon tools used to conduct reconnaissance activities, identified the missing features of each tool, conducted a study on the design consideration required to develop a reconnaissance tool and proposed a new framework to develop such a tool.

Cite this Research Publication : Vishnu, V., Praveen, K., Identifying Key Strategies for Reconnaissance in Cyber Security, Studies in Computational Intelligence (2022), Springer. 

Admissions Apply Now