reconCTI A Proactive Approach to Cyber Threat Intelligence
Conference paper
Rahman, M. M., Memon, S., Ahmed, T. and Al-Nemrat, A. 2025. reconCTI A Proactive Approach to Cyber Threat Intelligence. 1st Future International Conference on AI and Cybersecurity (FICAC25). Cairo, Egypt 05 - 06 Nov 2025 IEEE.
Authors | Rahman, M. M., Memon, S., Ahmed, T. and Al-Nemrat, A. |
---|---|
Type | Conference paper |
Abstract | The rapid advancement of information technology has introduced a noticeable shift from traditional offline practices to more efficient and interconnected online environments. This transition, while offering convenience, has also increased exposure to various cyber threats such as identity theft, impersonation, and phishing scams. Reconnaissance, or briefly known as information gathering, is a key stage for threat actors, often relying on open-source intelligence (OSINT) to collect sensitive and extensive data on targets. In response to this challenge, this study introduces reconCTI, a command-line tool built using Python for Linux systems. The tool is designed to search for sensitive data leaks across both surface web and dark web platforms. It allows users to input specific keywords, scan multiple sites at once, and then assess the findings by referencing the MITRE ATT&CK framework. The results are compiled into a threat report that also includes possible mitigation strategies. reconCTI is intended to support both cybersecurity professionals and individuals in identifying risks early and taking appropriate action. |
Year | 2025 |
Conference | 1st Future International Conference on AI and Cybersecurity (FICAC25) |
Publisher | IEEE |
Accepted author manuscript | License File Access Level Anyone |
Publication process dates | |
Accepted | 16 May 2025 |
Deposited | 19 Jun 2025 |
Journal citation | p. In press |
Web address (URL) of conference proceedings | https://www.fue.edu.eg/ficac25/ |
Copyright holder | © 2025 IEEE |
Copyright information | Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. |
https://repository.uel.ac.uk/item/8z971
Download files
Accepted author manuscript
IEEE-FICAC25-reconCTI A Proactive Approach to Cyber-Threat Intelligence - AAM.pdf | ||
License: All rights reserved | ||
File access level: Anyone |
3
total views2
total downloads3
views this month2
downloads this month