Darknet and deepnet mining for proactive cybersecurity threat intelligence

@article{Nunes2016DarknetAD,
  title={Darknet and deepnet mining for proactive cybersecurity threat intelligence},
  author={Eric Nunes and Ahmad Diab and Andrew Gunn and Ericsson Marin and Vineet Mishra and Vivin Paliath and John Robertson and Jana Shakarian and Amanda Thart and Paulo Shakarian},
  journal={2016 IEEE Conference on Intelligence and Security Informatics (ISI)},
  year={2016},
  pages={7-12}
}
In this paper, we present an operational system for cyber threat intelligence gathering from various social platforms on the Internet particularly sites on the darknet and deepnet. We focus our attention to collecting information from hacker forum discussions and marketplaces offering products and services focusing on malicious hacking. We have developed an operational system for obtaining information from these sites for the purposes of identifying emerging cyber threats. Currently, this… CONTINUE READING
Highly Cited
This paper has 35 citations. REVIEW CITATIONS
24 Citations
22 References
Similar Papers

Citations

Publications citing this paper.
Showing 1-10 of 24 extracted citations

References

Publications referenced by this paper.
Showing 1-10 of 22 references

Examining the social networks of malware writers and hackers

  • T. J. Holt, D. Strumsky, O. Smirnova, M. Kilger
  • International Journal of Cyber Criminology,
  • 2012
1 Excerpt

Exploring stolen data markets online: products and market forces

  • T. J. Holt, E. Lampke
  • Criminal Justice Studies,
  • 2010
1 Excerpt

Similar Papers

Loading similar papers…