TY - BOOK
T1 - Darkweb cyber threat intelligence mining
AU - Robertson, John
AU - Diab, Ahmad
AU - Marin, Ericsson
AU - Nunes, Eric
AU - Paliath, Vivin
AU - Shakarian, Jana
AU - Shakarian, Paulo
N1 - Publisher Copyright:
© John Robertson, Ahmad Diab, Ericsson Marin, Eric Nunes, Vivin Paliath, Jana Shakarian, and Paulo Shakarian 2017.
PY - 2017/1/1
Y1 - 2017/1/1
N2 - The important and rapidly emerging new field known as ‘cyber threat intelligence’ explores the paradigm that defenders of computer networks gain a better understanding of their adversaries by understanding what assets they have available for an attack. In this book, a team of experts examines a new type of cyber threat intelligence from the heart of the malicious hacking underworld - the dark web. These highly secure sites have allowed anonymous communities of malicious hackers to exchange ideas and techniques, and to buy/sell malware and exploits. Aimed at both cybersecurity practitioners and researchers, this book represents a first step toward a better understanding of malicious hacking communities on the dark web and what to do about them. The authors examine real-world darkweb data through a combination of human and automated techniques to gain insight into these communities, describing both methodology and results.
AB - The important and rapidly emerging new field known as ‘cyber threat intelligence’ explores the paradigm that defenders of computer networks gain a better understanding of their adversaries by understanding what assets they have available for an attack. In this book, a team of experts examines a new type of cyber threat intelligence from the heart of the malicious hacking underworld - the dark web. These highly secure sites have allowed anonymous communities of malicious hackers to exchange ideas and techniques, and to buy/sell malware and exploits. Aimed at both cybersecurity practitioners and researchers, this book represents a first step toward a better understanding of malicious hacking communities on the dark web and what to do about them. The authors examine real-world darkweb data through a combination of human and automated techniques to gain insight into these communities, describing both methodology and results.
UR - http://www.scopus.com/inward/record.url?scp=85028690960&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85028690960&partnerID=8YFLogxK
U2 - 10.1017/9781316888513
DO - 10.1017/9781316888513
M3 - Book
AN - SCOPUS:85028690960
SN - 9781107185777
BT - Darkweb cyber threat intelligence mining
PB - Cambridge University Press
ER -