Analysis of software for the implementation of OSINT in the field of information security
Abstract
Relevance. The global modern cyberspace is characterized by a rapid increase in risks and threats to important information of government agencies, business and society. In such circumstances, open source intelligence (OSINT) is gaining importance as a tool for monitoring the information space, identifying potential threats and ensuring information security. OSINT software allows you to effectively collect, analyze and interpret data from open sources, including social networks, public databases and web resources. This facilitates timely response to cyber threats, identification of vulnerabilities and decision-making to protect information systems and critical infrastructure of the state's information relations entities.
Objective. To analyze the characteristics and capabilities of modern specialized software with a view to their effective use as open source intelligence (OSINT) tools in the context of identifying potential threats and ensuring information security of subjects of information relations.
Research methods. In the process of writing this article, the author used the methods of technical analysis, comparative and descriptive approach, systematization and classification to study the functionality of OSINT tools, to predict their effectiveness and development prospects.
Results. Based on the analysis, the key characteristics of software solutions such as Maltego, TheHarvester, Shodan, ZoomEye, LeakIX, Sublist3r and SubFinder are identified, their suitability for monitoring the information space, identifying risks and vulnerabilities, as well as timely response to eliminate negative consequences are assessed. Recommendations for the optimal use of these tools on modern computers are proposed, taking into account the requirements for hardware, security and process automation.
Consideration of the applied aspects of OSINT use makes it possible to formulate practical recommendations for cybersecurity professionals. The analysis makes it possible to integrate the results into training programs for information security specialists. It has been established that the effectiveness of OSINT largely depends on the level of user training and his/her ability to interpret the information received. The material reviewed demonstrates the prospects for using machine learning to automate data collection and filtering processes. The author emphasizes the need to continuously update the knowledge bases and algorithms used in OSINT. The results of the study can be used to create integrated solutions to ensure the cyber resilience of organizations.
Conclusions. Open source intelligence (OSINT) is based on the collection, systematization and analysis of data from publicly available sources, such as social networks, websites, public databases and media. The basis of OSINT software is the use of automated tools that allow you to efficiently process large amounts of information, detect connections between data, and identify potential threats to information security. Tools such as Maltego, TheHarvester, Shodan, ZoomEye, LeakIX, Sublist3r, and SubFinder provide tasks ranging from passive data collection to active analysis of network infrastructure, which allows identifying vulnerabilities, monitoring cyberspace, and supporting timely decision-making in the field of information security and information protection.
The author classifies OSINT software by functional purpose, allocating three main categories: tools for detection, extraction and aggregation of data. A comparative analysis of such tools as Maltego, TheHarvester, Shodan, ZoomEye, LeakIX, Sublist3r and SubFinder is proposed, with the definition of their key characteristics, including compatibility with operating systems, methods of information collection, process automation and security level, which helps to choose the optimal tool for solving the problems of monitoring cyberspace and countering information threats.
Promising directions for further development of OSINT software in the field of cybersecurity of the State are presented.
Downloads
References
/References
National Defense Authorization Act for Fiscal Year 2006 : Public Law of 01.06.2006 no. No. 109-163. https://www.congress.gov/bill/109th-congress/house-bill/1815/text/statute
Y. Honcharenko, К. Kanishev. Tools of information warfare: OSINT, IPSO and counteracting disinformation. Information and psychological operation (ІPSO). How to avoid becoming a victim of other people's manipulations. [in Ukrainian] https://infolight.in.ua/wp-content/uploads/2023/02/brochure-2.pdf
On the national security of Ukraine : Law of Ukraine No. 2469-VIII of June 21, 2018: as of March 31, 2023. [in Ukrainian] https://zakon.rada.gov.ua/laws/show/2469-19#Text
On the intelligence agencies of Ukraine : Law of Ukraine No. 2331-III of March 22, 2001: as of October 24, 2020. [in Ukrainian] https://zakon.rada.gov.ua/laws/show/2331-14#Text
Williams H., Blum I. Defining second generation open source intelligence (OSINT) for the defense enterprise. RAND Corporation, 2018. https://doi.org/10.7249/rr1964
Unver A. Digital open source intelligence and international security: a primer. EDAM, Oxford CTGA & Kadir Has Üniversitesi, 2018. 28 p. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3331638
Schwarz K., Schwarz F., Creutzburg R. Conception and implementation of professional laboratory exercises in the field of open source intelligence (OSINT). Electronic imaging. 2020. Vol. 2020, no.3. P.278 https://library.imaging.org/admin/apis/public/api/ist/website/downloadArticle/ei/33/3/art00010
Analysis of intelligence gathering tools from open sources / А. Кarpenko et al. Communication and information systems : Bulletin. Kyiv, 2022. P. 21. [in Ukrainian] https://www.viti.edu.ua/files/zbk/2022/2022-1.pdf#page=18
Duffy M., Pan X., Wilson S. Information reconnaissance by accumulating public information data sources. OALib. 2024. Vol. 11, no. 04. P. 1–25. https://doi.org/10.4236/oalib.1111463
Shodan Products. https://www.shodan.io/about/products
ZoomEye - cyberspace search engine. ZoomEye - Cyberspace Search Engine. https://www.zoomeye.hk/doc
LeakIX docs. LeakIX documentation | LeakIX Docs. https://docs.leakix.net/docs/
What is Sublist3r and How to Use it? - GeeksforGeeks. GeeksforGeeks. https://www.geeksforgeeks.org/what-is-sublist3r-and-how-to-use-it/
The not yet exploited goldmine of OSINT: opportunities, open challenges and future trends / J. Pastor-Galindo et al. IEEE access. 2020. Vol. 8. P. 10282–10304. https://doi.org/10.1109/access.2020.2965257
National Defense Authorization Act for Fiscal Year 2006 : Public Law of 01.06.2006 no. No. 109-163. https://www.congress.gov/bill/109th-congress/house-bill/1815/text/statute
Гончаренко Ю., Канішев К. Інструменти інформаційної боротьби: ОСІНТ, ІПСО та протидія дезінформації. Інформаційно-психологічна операція (ІПСО). Як не стати жертвою чужих маніпуляцій. https://infolight.in.ua/wp-content/uploads/2023/02/brochure-2.pdf
Про національну безпеку України : Закон України від 21.06.2018 р. № 2469-VIII: станом на 31 берез. 2023 р. https://zakon.rada.gov.ua/laws/show/2469-19#Text
Про розвідувальні органи України : Закон України від 22.03.2001 р. № 2331-III : станом на 24 жовт. 2020 р. https://zakon.rada.gov.ua/laws/show/2331-14#Text
Williams H., Blum I. Defining second generation open source intelligence (OSINT) for the defense enterprise. RAND Corporation, 2018. https://doi.org/10.7249/rr1964
Unver A. Digital open source intelligence and international security: a primer. EDAM, Oxford CTGA & Kadir Has Üniversitesi, 2018. 28 p. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3331638
Schwarz K., Schwarz F., Creutzburg R. Conception and implementation of professional laboratory exercises in the field of open source intelligence (OSINT). Electronic imaging. 2020. Vol. 2020, no.3. P.278 https://library.imaging.org/admin/apis/public/api/ist/website/downloadArticle/ei/33/3/art00010
Аналіз інструментів збору розвідувальної інформації з відкритих джерел / А. Карпенко та ін. Комунікаційні та інформаційні системи : Вісник. Київ, 2022. С. 21. https://www.viti.edu.ua/files/zbk/2022/2022-1.pdf#page=18
Duffy M., Pan X., Wilson S. Information reconnaissance by accumulating public information data sources. OALib. 2024. Vol. 11, no. 04. P. 1–25. https://doi.org/10.4236/oalib.1111463
Shodan Products. https://www.shodan.io/about/products
ZoomEye - cyberspace search engine. ZoomEye - Cyberspace Search Engine. https://www.zoomeye.hk/doc
LeakIX docs. LeakIX documentation | LeakIX Docs. https://docs.leakix.net/docs/
What is Sublist3r and How to Use it? - GeeksforGeeks. GeeksforGeeks. https://www.geeksforgeeks.org/what-is-sublist3r-and-how-to-use-it/
The not yet exploited goldmine of OSINT: opportunities, open challenges and future trends / J. Pastor-Galindo et al. IEEE access. 2020. Vol. 8. P. 10282–10304. https://doi.org/10.1109/access.2020.2965257