Systematically Searching for Identity-Related Information in the Internet with OSINT Tools
- URL: http://arxiv.org/abs/2407.16251v1
- Date: Tue, 23 Jul 2024 07:40:25 GMT
- Title: Systematically Searching for Identity-Related Information in the Internet with OSINT Tools
- Authors: Marcus Walkow, Daniela Pöhn,
- Abstract summary: This paper proposes a classification of data and open-source intelligence (OSINT) tools related to identities.
In the next step, the data can be analyzed and countermeasures can be taken.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: The increase of Internet services has not only created several digital identities but also more information available about the persons behind them. The data can be collected and used for attacks on digital identities as well as on identity management systems, which manage digital identities. In order to identify possible attack vectors and take countermeasures at an early stage, it is important for individuals and organizations to systematically search for and analyze the data. This paper proposes a classification of data and open-source intelligence (OSINT) tools related to identities. This classification helps to systematically search for data. In the next step, the data can be analyzed and countermeasures can be taken. Last but not least, an OSINT framework approach applying this classification for searching and analyzing data is presented and discussed.
Related papers
- IDNet: A Novel Dataset for Identity Document Analysis and Fraud Detection [25.980165854663145]
IDNet is a benchmark dataset designed to advance privacy-preserving fraud detection efforts.
It comprises 837,060 images of synthetically generated identity documents, totaling approximately 490 gigabytes.
We evaluate the utility and present use cases of the dataset, illustrating how it can aid in training privacy-preserving fraud detection methods.
arXiv Detail & Related papers (2024-08-03T07:05:40Z) - Towards an Improved Taxonomy of Attacks related to Digital Identities and Identity Management Systems [0.0]
We propose the improved framework taxonomy for Identity Management related to Attacks (TaxIdMA)
The purpose of TaxIdMA is to classify existing attacks, attack vectors, and vulnerabilities associated with system identities, identity management systems, and end-user identities.
The combination of TaxIdMA, which allows a structured way to outline attacks and is applicable to different scenarios, and a description language for threat intelligence help to improve the security identity management systems and processes.
arXiv Detail & Related papers (2024-07-23T07:46:40Z) - Investigative Pattern Detection Framework for Counterterrorism [0.09999629695552192]
Automated tools are required to extract information to respond queries from analysts, continually scan new information, integrate them with past events, and then alert about emerging threats.
We address challenges in investigative pattern detection and develop an Investigative Pattern Detection Framework for Counterterrorism (INSPECT)
The framework integrates numerous computing tools that include machine learning techniques to identify behavioral indicators and graph pattern matching techniques to detect risk profiles/groups.
arXiv Detail & Related papers (2023-10-30T00:45:05Z) - Privacy-Preserving Graph Machine Learning from Data to Computation: A
Survey [67.7834898542701]
We focus on reviewing privacy-preserving techniques of graph machine learning.
We first review methods for generating privacy-preserving graph data.
Then we describe methods for transmitting privacy-preserved information.
arXiv Detail & Related papers (2023-07-10T04:30:23Z) - A new Privacy Preserving and Scalable Revocation Method for Self
Sovereign Identity -- The Perfect Revocation Method does not exist yet [0.0]
Most of the issued credentials need the possibility of revocation.
This paper gives an overview about the available revocation methods, including a survey to define requirements.
It highlights shortcomings of the methods and introduces a new revocation method called Linked Validity Verifiable Credentials.
arXiv Detail & Related papers (2022-11-23T15:49:57Z) - Finding Facial Forgery Artifacts with Parts-Based Detectors [73.08584805913813]
We design a series of forgery detection systems that each focus on one individual part of the face.
We use these detectors to perform detailed empirical analysis on the FaceForensics++, Celeb-DF, and Facebook Deepfake Detection Challenge datasets.
arXiv Detail & Related papers (2021-09-21T16:18:45Z) - Identifying Non-Control Security-Critical Data through Program Dependence Learning [9.764831771725952]
In data-oriented attacks, a fundamental step is to identify non-control, security-critical data.
We propose a novel approach that combines traditional program analysis with deep learning.
The toolchain uncovers 80 potential critical variables in Google FuzzBench.
arXiv Detail & Related papers (2021-08-27T00:28:06Z) - Wizard of Search Engine: Access to Information Through Conversations
with Search Engines [58.53420685514819]
We make efforts to facilitate research on CIS from three aspects.
We formulate a pipeline for CIS with six sub-tasks: intent detection (ID), keyphrase extraction (KE), action prediction (AP), query selection (QS), passage selection (PS) and response generation (RG)
We release a benchmark dataset, called wizard of search engine (WISE), which allows for comprehensive and in-depth research on all aspects of CIS.
arXiv Detail & Related papers (2021-05-18T06:35:36Z) - Data Mining with Big Data in Intrusion Detection Systems: A Systematic
Literature Review [68.15472610671748]
Cloud computing has become a powerful and indispensable technology for complex, high performance and scalable computation.
The rapid rate and volume of data creation has begun to pose significant challenges for data management and security.
The design and deployment of intrusion detection systems (IDS) in the big data setting has, therefore, become a topic of importance.
arXiv Detail & Related papers (2020-05-23T20:57:12Z) - Bias in Multimodal AI: Testbed for Fair Automatic Recruitment [73.85525896663371]
We study how current multimodal algorithms based on heterogeneous sources of information are affected by sensitive elements and inner biases in the data.
We train automatic recruitment algorithms using a set of multimodal synthetic profiles consciously scored with gender and racial biases.
Our methodology and results show how to generate fairer AI-based tools in general, and in particular fairer automated recruitment systems.
arXiv Detail & Related papers (2020-04-15T15:58:05Z) - Survey of Network Intrusion Detection Methods from the Perspective of
the Knowledge Discovery in Databases Process [63.75363908696257]
We review the methods that have been applied to network data with the purpose of developing an intrusion detector.
We discuss the techniques used for the capture, preparation and transformation of the data, as well as, the data mining and evaluation methods.
As a result of this literature review, we investigate some open issues which will need to be considered for further research in the area of network security.
arXiv Detail & Related papers (2020-01-27T11:21:05Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.