Finding Cryptocurrency Attack Indicators Using Temporal Logic and Darkweb Data

10/30/2018
by   Mohammed Almukaynizi, et al.
0

With the recent prevalence of darkweb/deepweb (D2web) sites specializing in the trade of exploit kits and malware, malicious actors have easy-access to a wide-range of tools that can empower their offensive capability. In this study, we apply concepts from causal reasoning, itemset mining, and logic programming on historical cryptocurrency-related cyber incidents with intelligence collected from over 400 D2web hacker forums. Our goal was to find indicators of cyber threats targeting cryptocurrency traders and exchange platforms from hacker activity. Our approach found interesting activities that, when observed together in the D2web, subsequent cryptocurrency-related incidents are at least twice as likely to occur than they would if no activity was observed. We also present an algorithmic extension to a previously-introduced algorithm called APT-Extract that allows to model new semantic structures that are specific to our application.

READ FULL TEXT

page 1

page 2

page 3

research
07/28/2016

Darknet and Deepnet Mining for Proactive Cybersecurity Threat Intelligence

In this paper, we present an operational system for cyber threat intelli...
research
08/05/2015

Mining for Causal Relationships: A Data-Driven Study of the Islamic State

The Islamic State of Iraq and al-Sham (ISIS) is a dominant insurgent gro...
research
11/14/2018

A Knowledge Representation Perspective on Activity Theory

Intelligent technologies, in particular systems to promote health and we...
research
11/10/2021

A framework for comprehensible multi-modal detection of cyber threats

Detection of malicious activities in corporate environments is a very co...
research
08/26/2020

SIGL: Securing Software Installations Through Deep Graph Learning

Many users implicitly assume that software can only be exploited after i...
research
04/27/2014

An Argumentation-Based Framework to Address the Attribution Problem in Cyber-Warfare

Attributing a cyber-operation through the use of multiple pieces of tech...

Please sign up or login with your details

Forgot password? Click here to reset