European Parliament Library

Darkweb cyber threat intelligence mining, John Robertson, Arizona State University, [and six others].

Label
Darkweb cyber threat intelligence mining, John Robertson, Arizona State University, [and six others].
Language
eng
Index
index present
Literary Form
non fiction
Main title
Darkweb cyber threat intelligence mining
Medium
electronic resource
Nature of contents
dictionaries
Oclc number
983730395
Responsibility statement
John Robertson, Arizona State University, [and six others].
Summary
The important and rapidly emerging new field known as 'cyber threat intelligence' explores the paradigm that defenders of computer networks gain a better understanding of their adversaries by understanding what assets they have available for an attack. In this book, a team of experts examines a new type of cyber threat intelligence from the heart of the malicious hacking underworld - the dark web. These highly secure sites have allowed anonymous communities of malicious hackers to exchange ideas and techniques, and to buy/sell malware and exploits. Aimed at both cybersecurity practitioners and researchers, this book represents a first step toward a better understanding of malicious hacking communities on the dark web and what to do about them. The authors examine real-world darkweb data through a combination of human and automated techniques to gain insight into these communities, describing both methodology and results
Table Of Contents
Cover -- Half title -- Title -- Copyright -- Contents -- Foreword -- Preface -- 1 Introduction -- 2 Moving to Proactive Cyber Threat Intelligence -- 2.1 Introduction -- 2.2 Proactive Intelligence beyond the Deepweb and Darkweb -- 2.3 Showing Value -- 3 Understanding Darkweb Malicious Hacker Forums -- 3.1 Introduction -- 3.2 Background -- 3.3 Methodology and Scope -- 3.4 Forum Structure and Community Social Organization -- 3.5 The Content of Observed Forums -- 3.6 Conclusion -- 4 Automatic Mining of Cyber Intelligence from the Darkweb -- 4.1 Introduction -- 4.2 System Overview -- 4.3 Evaluation -- 4.4 Related Work -- 4.5 Conclusion -- 5 Analyzing Products and Vendors in Malicious Hacking Markets -- 5.1 Introduction -- 5.2 Marketplace Data Characteristics -- 5.3 Users Having Presence in Markets/Forums -- 5.4 Discovery of Zero-Day Exploits -- 5.5 Exploits Targeting Known Vulnerabilities -- 5.6 Identifying Specific Product Categories -- 5.7 Conclusion -- 6 Using Game Theory for Threat Intelligence -- 6.1 Introduction -- 6.2 Security Game Framework -- 6.3 Computational Complexity -- 6.4 Algorithms -- 6.5 Evaluation and Discussion -- 6.6 Conclusion -- 7 Application: Protecting Industrial Control Systems -- 7.1 Introduction -- 7.2 Background -- 7.3 Model -- 7.4 Computational Complexity -- 7.5 Algorithms -- 7.6 Experimental Results -- 7.7 Related Work -- 7.8 Conclusion -- 8 Conclusion -- 8.1 Introduction -- 8.2 Environmental Characteristics -- 8.3 Challenges -- 8.4 Conclusion -- Glossary -- References -- Index
Classification
Content
Other version
Mapped to

Incoming Resources

Outgoing Resources