MIT Logo

Darknet and deepnet mining for proactive cybersecurity threat intelligence

Abstract:

This paper explores the idea of mining social platforms on the darknet and deepnet for information that may help in preventing a future cyberattack. The main problem to overcome is how to go about mining for this information, and how to identify what information may be valuable in preventing future attacks. Because many cyber-attacks are the result of tools built by large communities of hackers. Monitoring the forums those individuals communicate on may yield useful information. Looking at what tools are available on underground markets may also be useful in identifying what types of attacks to watch out for. A Classifier has been built to identify whether information is valid or not. Data from 10 marketplaces were used to train and test the model. The system is operational and the results are available for security professionals to view.

Author:
Eric Nunes, Ahmad Diab, Andrew Gunn, Ericsson Marin , Vineet Mishra, Vivin Paliath, John Robertson, Jana Shakarian, Amanda Thart, Paulo Shakarian
Year:
2016
Domain:
Dimension:
Region:
Data Type:
Keywords: , , ,
MIT Political Science
MIT Political Science
ECIR
GSS