Darknet and Deepnet Mining for Proactive Cybersecurity Threat Intelligence

07/28/2016
by   Eric Nunes, et al.
0

In this paper, we present an operational system for cyber threat intelligence gathering from various social platforms on the Internet particularly sites on the darknet and deepnet. We focus our attention to collecting information from hacker forum discussions and marketplaces offering products and services focusing on malicious hacking. We have developed an operational system for obtaining information from these sites for the purposes of identifying emerging cyber threats. Currently, this system collects on average 305 high-quality cyber threat warnings each week. These threat warnings include information on newly developed malware and exploits that have not yet been deployed in a cyber-attack. This provides a significant service to cyber-defenders. The system is significantly augmented through the use of various data mining and machine learning techniques. With the use of machine learning models, we are able to recall 92 relating to malicious hacking with high precision. We perform preliminary analysis on the data collected, demonstrating its application to aid a security expert for better threat analysis.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/03/2018

Cyber Threat Intelligence : Challenges and Opportunities

The ever increasing number of cyber attacks requires the cyber security ...
research
03/13/2023

A data-driven analysis of UK cyber defence

Our research addresses the question: What are the conditions of the UK's...
research
10/30/2018

Finding Cryptocurrency Attack Indicators Using Temporal Logic and Darkweb Data

With the recent prevalence of darkweb/deepweb (D2web) sites specializing...
research
03/04/2022

In the Service of Online Order: Tackling Cyber-Bullying with Machine Learning and Affect Analysis

One of the burning problems lately in Japan has been cyber-bullying, or ...
research
12/08/2021

ESAFE: Enterprise Security and Forensics at Scale

Securing enterprise networks presents challenges in terms of both their ...
research
09/14/2021

A Crawler Architecture for Harvesting the Clear, Social, and Dark Web for IoT-Related Cyber-Threat Intelligence

The clear, social, and dark web have lately been identified as rich sour...
research
04/06/2007

Empirical analysis and statistical modeling of attack processes based on honeypots

Honeypots are more and more used to collect data on malicious activities...

Please sign up or login with your details

Forgot password? Click here to reset