Darkweb Cyber Threat Intelligence Mining

The important and rapidly emerging new field known as 'cyber threat intelligence' explores the paradigm that defenders of computer networks gain a better understanding of their adversaries by understanding what assets they have available for an attack. In this book, a team of experts examines a new type of cyber threat intelligence from the heart of the malicious hacking underworld - the dark web. These highly secure sites have allowed anonymous communities of malicious hackers to exchange ideas and techniques, and to buy/sell malware and exploits. Aimed at both cybersecurity practitioners and researchers, this book represents a first step toward a better understanding of malicious hacking communities on the dark web and what to do about them. The authors examine real-world darkweb data through a combination of human and automated techniques to gain insight into these communities, describing both methodology and results.

[1]  R. Kozinets Netnography: Doing Ethnographic Research Online , 2009 .

[2]  Véronique Cortier,et al.  Measuring vote privacy, revisited , 2012, CCS.

[3]  John Liederbach,et al.  Digital Crime and Digital Terrorism , 2005 .

[4]  Paulo Shakarian,et al.  The 2008 Russian Cyber Campaign against Georgia , 2011 .

[5]  Harry Eugene Stanley,et al.  The cost of attack in competing networks , 2015, Journal of The Royal Society Interface.

[6]  Martin C. Libicki,et al.  Markets for Cybercrime Tools and Stolen Data: Hackers' Bazaar , 2014 .

[7]  Tom Boellstorff Coming of Age in Second Life: An Anthropologist Explores the Virtually Human , 2008 .

[8]  Andrea Locatelli The Offense/Defense Balance in Cyberspace , 2013 .

[9]  Paul A. Taylor,et al.  From hackers to hacktivists: speed bumps on the global superhighway? , 2005, New Media Soc..

[10]  Thomas J. Holt Crime On-line: Correlates, Causes, and Context , 2010 .

[11]  Hsinchun Chen,et al.  Identifying Top Sellers In Underground Economy Using Deep Learning-Based Sentiment Analysis , 2014, 2014 IEEE Joint Intelligence and Security Informatics Conference.

[12]  Roberto Nardone,et al.  Vulnerability modeling and analysis for critical infrastructure protection applications , 2013, Int. J. Crit. Infrastructure Prot..

[13]  Thomas J. Holt,et al.  Examining the social networks of malware writers and hackers , 2012 .

[14]  Peter Holtz,et al.  Analyzing Internet Forums , 2012, J. Media Psychol. Theor. Methods Appl..

[15]  David Harris,et al.  Engineering Psychology and Cognitive Ergonomics , 2014, Lecture Notes in Computer Science.

[16]  William J. Lynn,et al.  Defending a New Domain: The Pentagon's Cyberstrategy , 2010 .

[17]  M. L. Fisher,et al.  An analysis of approximations for maximizing submodular set functions—I , 1978, Math. Program..

[18]  Siddharth Sridhar,et al.  Model-Based Attack Detection and Mitigation for Automatic Generation Control , 2014, IEEE Transactions on Smart Grid.

[19]  Hsinchun Chen Dark Web: Exploring and Data Mining the Dark Side of the Web , 2011 .

[20]  Jeffrey Carr,et al.  Inside Cyber Warfare: Mapping the Cyber Underworld , 2009 .

[21]  D. Wall Cybercrime: The Transformation of Crime in the Information Age , 2007 .

[22]  Neil D. Lawrence,et al.  Deterministic and Statistical Methods in Machine Learning, First International Workshop, Sheffield, UK, September 7-10, 2004, Revised Lectures , 2005, Deterministic and Statistical Methods in Machine Learning.

[23]  Ahmad Diab,et al.  Product offerings in malicious hacker markets , 2016, 2016 IEEE Conference on Intelligence and Security Informatics (ISI).

[24]  Ronald L. Rivest,et al.  Introduction to Algorithms , 1990 .

[25]  Keshnee Padayachee,et al.  A survey of honeypot research: Trends and opportunities , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).

[26]  John Yen,et al.  Proceedings of the 9th WebKDD and 1st SNA-KDD 2007 workshop on Web mining and social network analysis , 2007, KDD 2007.

[27]  Hsinchun Chen,et al.  Uncovering the dark Web: A case study of Jihad on the Web , 2008 .

[28]  Sushil Jajodia,et al.  Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats , 2011, Moving Target Defense.

[29]  Avrim Blum,et al.  Planning in the Presence of Cost Functions Controlled by an Adversary , 2003, ICML.

[30]  E. G. Coleman,et al.  Coding Freedom: The Ethics and Aesthetics of Hacking , 2012 .

[31]  Steven Levy,et al.  Hackers: Heroes of the Computer Revolution , 1984 .

[32]  Paulo Shakarian,et al.  Introduction to Cyber-Warfare: A Multidisciplinary Approach , 2013 .

[33]  Michael I. Jordan,et al.  Latent Dirichlet Allocation , 2001, J. Mach. Learn. Res..

[34]  Kevin F. Steinmetz Craft(y)ness An Ethnographic Study of Hacking , 2015 .

[35]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.

[36]  Karen A. Scarfone,et al.  Guide to Industrial Control Systems (ICS) Security , 2015 .

[37]  Filippo Menczer,et al.  Topical web crawlers: Evaluating adaptive algorithms , 2004, TOIT.

[38]  Jeannette M. Wing,et al.  Game strategies in network security , 2005, International Journal of Information Security.

[39]  B. Loader,et al.  Cyberprotest: New Media, Citizens and Social Movements , 2004 .

[40]  Sushil Jajodia,et al.  Moving Target Defense II , 2013, Advances in Information Security.

[41]  Yossi Azar,et al.  Efficient Submodular Function Maximization under Linear Packing Constraints , 2012, ICALP.

[42]  Sushil Jajodia,et al.  Cyber Warfare: Building the Scientific Foundation , 2015 .

[43]  Corinna Cortes,et al.  Support-Vector Networks , 1995, Machine Learning.

[44]  Dana S. Nau,et al.  Evolution of state-dependent risk preferences , 2010, TIST.

[45]  Sherry Turkle,et al.  The second self: computers and the human spirit , 1984 .

[46]  Martin van den Berg,et al.  Focused Crawling: A New Approach to Topic-Specific Web Resource Discovery , 1999, Comput. Networks.

[47]  Milind Tambe,et al.  Security and Game Theory - Algorithms, Deployed Systems, Lessons Learned , 2011 .

[48]  H. Bernard,et al.  Handbook of Methods in Cultural Anthropology , 2000 .

[49]  J. Juris Reflections on #Occupy Everywhere: Social media, public space, and emerging logics of aggregation , 2012 .

[50]  William M. Rand,et al.  Objective Criteria for the Evaluation of Clustering Methods , 1971 .

[51]  Katarzyna Musial-Gabrys,et al.  Hybrid structure-based link prediction model , 2016, 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).

[52]  Hsinchun Chen,et al.  A focused crawler for Dark Web forums , 2010 .

[53]  Frank Schmalleger,et al.  Crimes of the Internet , 2008 .

[54]  Danny Bradbury,et al.  Unveiling the dark web , 2014, Netw. Secur..

[55]  T. Holt,et al.  A Crime Script Analysis of the Online Stolen Data Market , 2015 .