reconCTI A Proactive Approach to Cyber Threat Intelligence

Conference paper


Rahman, M. M., Memon, S., Ahmed, T. and Al-Nemrat, A. 2025. reconCTI A Proactive Approach to Cyber Threat Intelligence. 1st Future International Conference on AI and Cybersecurity (FICAC25). Cairo, Egypt 05 - 06 Nov 2025 IEEE.
AuthorsRahman, M. M., Memon, S., Ahmed, T. and Al-Nemrat, A.
TypeConference paper
Abstract

The rapid advancement of information technology has introduced a noticeable shift from traditional offline practices to more efficient and interconnected online environments. This transition, while offering convenience, has also increased exposure to various cyber threats such as identity theft, impersonation, and phishing scams. Reconnaissance, or briefly known as information gathering, is a key stage for threat actors, often relying on open-source intelligence (OSINT) to collect sensitive and extensive data on targets. In response to this challenge, this study introduces reconCTI, a command-line tool built using Python for Linux systems. The tool is designed to search for sensitive data leaks across both surface web and dark web platforms. It allows users to input specific keywords, scan multiple sites at once, and then assess the findings by referencing the MITRE ATT&CK framework. The results are compiled into a threat report that also includes possible mitigation strategies. reconCTI is intended to support both cybersecurity professionals and individuals in identifying risks early and taking appropriate action.

Year2025
Conference1st Future International Conference on AI and Cybersecurity (FICAC25)
PublisherIEEE
Accepted author manuscript
License
File Access Level
Anyone
Publication process dates
Accepted16 May 2025
Deposited19 Jun 2025
Journal citationp. In press
Web address (URL) of conference proceedingshttps://www.fue.edu.eg/ficac25/
Copyright holder© 2025 IEEE
Copyright informationPersonal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
Permalink -

https://repository.uel.ac.uk/item/8z971

Download files


Accepted author manuscript
  • 3
    total views
  • 2
    total downloads
  • 3
    views this month
  • 2
    downloads this month

Export as

Related outputs

Enhancing Cybersecurity with AI-Based Threat Classification
Ali, M. S., Adhikar, B., Memon, S. and Al-Nemrat, A. 2025. Enhancing Cybersecurity with AI-Based Threat Classification. The 3rd International Conference on Emerging Trends & Innovation (ICETI) . Online 30 - 31 Jul 2025 Springer.
Enhanced Bone Fracture Diagnosis in X-rays Using Fine-Tuned DenseNet169 Deep Learning Model
Panhwar, A. O., Memon, S., Dhomeja, L. D., Prasad, M. and Chandio, A. A. 2025. Enhanced Bone Fracture Diagnosis in X-rays Using Fine-Tuned DenseNet169 Deep Learning Model. 2024 26th International Multi-Topic Conference (INMIC). IEEE. https://doi.org/10.1109/INMIC64792.2024.11004340
URL Spam Detection Using Machine Learning Classifiers
Almomani, O., Alsaaidah, O., Abualhaj, M. M., Almaiah, M. A., Almomani, A. and Memon, S. 2025. URL Spam Detection Using Machine Learning Classifiers. 1st International Conference on Computational Intelligence Approaches and Applications (ICCIAA). Jordan Apr - May 2025 IEEE. https://doi.org/10.1109/ICCIAA65327.2025.11013448
Building a Human-Centric SOC: A New Framework for Success
Mwangi, J., Wall, J., Ismail, U. and Al-Nemrat, A. 2025. Building a Human-Centric SOC: A New Framework for Success. 16th International Conference on Global Security, Safety & Sustainability, ICGS3-24. Online 25 - 27 Nov 2024 Springer.
The impact of GDPR infringement fines on the market value of firms
Ford, A., Al-Nemrat, A., Ghorashi, S. and Davidson, J. 2023. The impact of GDPR infringement fines on the market value of firms. Information and Computer Security. 31 (1), pp. 51-64. https://doi.org/10.1108/ICS-03-2022-0049
Comparative Analysis of Cryptographic Algorithms in Context of Communication: A Systematic Review
Ahmed, S. and Ahmed, T. 2022. Comparative Analysis of Cryptographic Algorithms in Context of Communication: A Systematic Review. International Journal of Scientific and Research Publications. 12 (7), pp. 161-173. https://doi.org/10.29322/IJSRP.12.07.2022.p12720
The Impact of CISO Appointment Announcements on the Market Value of Firms
Ford, A., Al-Nemrat, A., Ghorashi, S. and Davidson, J. 2022. The Impact of CISO Appointment Announcements on the Market Value of Firms. 17th International Conference on Cyber Warfare and Security (ICCWS 2022). Albany, New York, USA 17 - 18 Mar 2022 Academic Conferences International (ACI).
The Impact of Data Breach Announcements on Company Value in European Markets
Ford, A., Al-Nemrat, A., Ghorashi, S. and Davidson, J. 2021. The Impact of Data Breach Announcements on Company Value in European Markets. WEIS 2021: The 20th Annual Workshop on the Economics of Information Security. 28 - 29 Jun 2021
The Impact of GDPR Infringement Fines on the Market Value of Firms
Ford, A., Al-Nemrat, A., Ghorashi, S. and Davidson, J. 2021. The Impact of GDPR Infringement Fines on the Market Value of Firms. ECCWS 2021- Proceeding of the 20th European Conference on Cyber Warfare and Security. 24 - 25 Jun 2021 Academic Conferences International (ACI). https://doi.org/10.34190/EWS.21.088
Variance Ranking for Multi-Classed Imbalanced Datasets: A Case Study of One-Versus-All
Ebenuwa, S., Sharif, S., Al-Nemrat, A., Al-Bayatti, A. H., Alalwan, N., Alzahrani, A. I. and Alfarraj, O. 2019. Variance Ranking for Multi-Classed Imbalanced Datasets: A Case Study of One-Versus-All. Symmetry. 11 (Art. 1504). https://doi.org/10.3390/sym11121504
A Dynamic Access Control Model Using Authorising Workflow and Task-Role-Based Access Control
Uddin, M., Islam, S. and Al-Nemrat, A. 2019. A Dynamic Access Control Model Using Authorising Workflow and Task-Role-Based Access Control. IEEE Access. 7 (Art. 166676). https://doi.org/10.1109/ACCESS.2019.2947377
Variance Ranking Attributes Selection Techniques for Binary Classification Problem in Imbalance Data
Ebenuwa, S., Sharif, M., Alazab, Mamoun and Al-Nemrat, A. 2019. Variance Ranking Attributes Selection Techniques for Binary Classification Problem in Imbalance Data. IEEE Access. 7, pp. 24649-24666. https://doi.org/10.1109/ACCESS.2019.2899578
Deep Learning Approach for Intelligent Intrusion Detection System
Vinayakumar, R., Alazab, Mamoun, Soman, K. P., Poornachandran, Prabaharan, Al-Nemrat, A. and Venkatraman, Sitalakshmi 2019. Deep Learning Approach for Intelligent Intrusion Detection System. IEEE Access. 7, pp. 41525-41550. https://doi.org/10.1109/ACCESS.2019.2895334
Content Discovery Advertisements: An Explorative Analysis
Jadhav Balaji, R., Baravalle, Andres, Al-Nemrat, A. and Falcarin, P. 2017. Content Discovery Advertisements: An Explorative Analysis. in: Jahankhani, Hamid, Carlile, Alex, Emmett, David, Hosseinian-Far, Amin, Brown, Guy, Sexton, Graham and Jamal, Arshad (ed.) Global Security, Safety and Sustainability - The Security Challenges of the Connected World Springer Verlag.
Integration operators for generating RDF/OWL-based user defined mediator views in a grid environment
Tawil, Abdel-Rahman H., Taweel, Adel, Naeem, U., Montebello, Matthew, Bashroush, R. and Al-Nemrat, A. 2014. Integration operators for generating RDF/OWL-based user defined mediator views in a grid environment. Journal of Intelligent Information Systems. 43 (1), pp. 1-32. https://doi.org/10.1007/s10844-013-0300-5
Security countermeasures in the cyber-world
Bendovschi, Andreea and Al-Nemrat, A. 2016. Security countermeasures in the cyber-world. in: 2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF) IEEE. pp. 1-7
Measuring sustainability for an effective Information System audit from public organization perspective
Lope Abdul Rahman, Alifah Aida, Islam, S. and Al-Nemrat, A. 2015. Measuring sustainability for an effective Information System audit from public organization perspective. in: Research Challenges in Information Science (RCIS), 2015 IEEE 9th International Conference on IEEE. pp. 42-51
ARP cache poisoning mitigation and forensics investigation
Mangut, Heman Awang, Al-Nemrat, A., Benzaid, Chafika and Tawil, Abdel-Rahman H. 2015. ARP cache poisoning mitigation and forensics investigation. in: 2015 IEEE Trustcom/BigDataSE/ISPA IEEE. pp. 1392-1397
Cybercrime Profiling: Decision-Tree Induction, Examining Perceptions of Internet Risk and Cybercrime Victimisation
Al-Nemrat, A. and Benzaid, Chafika 2015. Cybercrime Profiling: Decision-Tree Induction, Examining Perceptions of Internet Risk and Cybercrime Victimisation. in: 2015 IEEE Trustcom/BigDataSE/ISPA IEEE. pp. 1380-1385
Intelligent Detection of MAC Spoofing Attack in 802.11 Network
Benzaid, Chafika, Boulgheraif, Abderrahman, Dahmane, Fatma Zohra, Al-Nemrat, A. and Zeraoulia, Khaled 2016. Intelligent Detection of MAC Spoofing Attack in 802.11 Network. in: Proceedings of the 17th International Conference on Distributed Computing and Networking Association for Computing Machinery (ACM).
Forensic Malware Analysis: The Value of Fuzzy Hashing Algorithms in Identifying Similarities
Sarantinos, Nikolaos, Benzaid, Chafika, Arabiat, Omar and Al-Nemrat, A. 2017. Forensic Malware Analysis: The Value of Fuzzy Hashing Algorithms in Identifying Similarities. in: 2016 IEEE Trustcom/BigDataSE/ISPA IEEE. pp. 1782-1787
A Scalable Malware Classification based on Integrated Static and Dynamic Features
Bounouh, Tewfik, Brahimi, Zakaria, Al-Nemrat, A. and Benzaid, Chafika 2017. A Scalable Malware Classification based on Integrated Static and Dynamic Features. 11th International Conference on Global Security, Safety, and Sustainability (ICGS3) 2017. London, UK 18 - 20 Jan 2017 Springer International Publishing. https://doi.org/10.1007/978-3-319-51064-4_10
Fast authentication in wireless sensor networks
Benzaid, Chafika, Lounis, Karim, Al-Nemrat, A., Badache, Nadjib and Alazab, Mamoun 2014. Fast authentication in wireless sensor networks. Future Generation Computer Systems. 55, pp. 362-375.
An Analysis of Honeypot Programs and the Attack Data Collected
Moore, C. and Al-Nemrat, A. 2015. An Analysis of Honeypot Programs and the Attack Data Collected. in: Jahankhani, Hamid, Carlile, Alex, Akhgar, Babak, Taal, Amie, Hessami, Ali G. and Hosseinian-Far, Amin (ed.) Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security Springer International Publishing.
Statistical Sampling Approach to Investigate Child Pornography Cases
Sarantinos, N., Al-Nemrat, A. and Naeem, U. 2013. Statistical Sampling Approach to Investigate Child Pornography Cases. 2013 Fourth Cybercrime and Trustworthy Computing Workshop (CTC). Sydney NSW, Australia 21 - 22 Nov 2013 IEEE. https://doi.org/10.1109/CTC.2013.14