Our systems are now restored following recent technical disruption, and we’re working hard to catch up on publishing. We apologise for the inconvenience caused. Find out more

Recommended product

Popular links

Popular links


Darkweb Cyber Threat Intelligence Mining

Darkweb Cyber Threat Intelligence Mining

Darkweb Cyber Threat Intelligence Mining

John Robertson, Arizona State University
Ahmad Diab, Arizona State University
Ericsson Marin, Arizona State University
Eric Nunes, Arizona State University
Vivin Paliath, Arizona State University
Jana Shakarian, Arizona State University
Paulo Shakarian, Arizona State University
April 2017
Hardback
9781107185777
$77.99
USD
Hardback
USD
eBook

    The important and rapidly emerging new field known as 'cyber threat intelligence' explores the paradigm that defenders of computer networks gain a better understanding of their adversaries by understanding what assets they have available for an attack. In this book, a team of experts examines a new type of cyber threat intelligence from the heart of the malicious hacking underworld - the dark web. These highly secure sites have allowed anonymous communities of malicious hackers to exchange ideas and techniques, and to buy/sell malware and exploits. Aimed at both cybersecurity practitioners and researchers, this book represents a first step toward a better understanding of malicious hacking communities on the dark web and what to do about them. The authors examine real-world darkweb data through a combination of human and automated techniques to gain insight into these communities, describing both methodology and results.

    • Describes methods for automatically analyzing cyber threat intelligence, providing ideas for practical use by operational cybersecurity professionals
    • Allows for data-driven decision support to cyber-defenders and the modeling of worst-case scenarios
    • Melds cyber security, social science and data mining in an integrative fashion, paving the way for future research

    Reviews & endorsements

    'Darkweb Cyber Threat Intelligence Mining represents a tipping point in cyber security. It is a must-read for anyone involved in the modern cyber struggle.' George Cybenko, Dartmouth College, New Hampshire, from the Foreword

    'The book is well written and well structured. The authors provide interesting facts on the darknet economy, its community, and its underling rules, such as trust-based platforms and the related problems of its participants.' Steffen Wendzel, Computing Reviews

    See more reviews

    Product details

    March 2017
    Adobe eBook Reader
    9781316952870
    0 pages
    0kg
    This ISBN is for an eBook version which is distributed on our behalf by a third party.

    Table of Contents

    • 1. Introduction
    • 2. Moving to proactive cyber threat intelligence
    • 3. Understanding darkweb malicious hacker forums
    • 4. Automatic mining of cyber intelligence from the dark web
    • 5. Analyzing products and vendors in malicious hacking markets
    • 6. Using game theory for threat intelligence
    • 7. Application – protecting industrial control systems
    • 8. Conclusion – the future of darkweb cyber threat intelligence.
      Authors
    • John Robertson , Arizona State University

      John Robertson is a student at Arizona State University pursuing undergraduate degrees in both Computer Science and Electrical Engineering, where his work was nominated for the Computing Research Association's Outstanding Undergraduate Researcher award. He is a recipient of an ARO Undergraduate Research Apprenticeship Program grant as well as two Fulton Undergraduate Research Initiative grants for his work involving the application of artificial intelligence techniques to cyber-security problems in the Cyber-Socio Intelligent System Laboratory with Dr Paulo Shakarian. Robertson also has industry experience as a software engineering intern with Microsoft on the Windows Core Development team.

    • Ahmad Diab , Arizona State University

      Ahmad Diab is a Computer Engineering Ph.D. student at Arizona State University. His current work in the Cyber-Socio Intelligent System Laboratory focuses on the application of AI techniques to cyber-security problems. Diab is a recipient of the SIPGA award from ASTAR agency, Singapore. Previously, he was a Java developer at EtQ compliance Company. He holds a B.Sc. in computer engineering from Jordan University of Science and Technology.

    • Ericsson Marin , Arizona State University

      Ericsson Marin is a Computer Science Ph.D. student at Arizona State University. He works at the Cyber-Socio Intelligent System Laboratory under the guidance of Dr Paulo Shakarian, with research projects in the intersection of Social Network Analysis, AI and Cyber-Security. He received his M.Sc. in Computer Science from the Federal University of Goias, Brazil and has published numerous papers in the area of social network analysis. He also has real-world experience as a software designer managing different software factories. In 2015, Marin was awarded with a Brazilian Science without Borders scholarship to pursue his Ph.D.

    • Eric Nunes , Arizona State University

      Eric Nunes is a Ph.D. student in the computer engineering program at Arizona State University. His research focuses on the intelligence techniques to cyber security problems. Previously, he was a Research Associate at the Brain Engineering Lab at Dartmouth College, New Hampshire. Nunes holds an M.Sc. in Electrical Engineering from Syracuse University, New York.

    • Vivin Paliath , Arizona State University

      Vivin Paliath is a Computer Science Ph.D. student at Arizona State University. His research at ASU focuses on the application of artificial intelligence and game-theoretic techniques to cyber-security problems. Paliath received both his B.Sc. in Computer Engineering and M.Sc. in Computer Science from Arizona State University. He has over a decade of industry experience and is also currently working as a Senior Software Engineer at Infusionsoft, a company that develops marketing-automation software for small businesses.

    • Jana Shakarian , Arizona State University
    • Paulo Shakarian , Arizona State University