Enthusiastic Cyber Surveillance for Intimidation Comprehension on the Dark Web and the Deep Web

Enthusiastic Cyber Surveillance for Intimidation Comprehension on the Dark Web and the Deep Web

Vinod Mahor, Sadhna Bijrothiya, Rakesh Kumar Bhujade, Jasvant Mandloi, Harshita Mandloi, Stuti Asthana
DOI: 10.4018/978-1-6684-6444-1.ch014
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The authors offer an operational method for obtaining cyber intimidation intelligence from diverse social platforms on the internet, notably dark-web and deep-web sites with Tor, in this study. They concentrate their efforts on gathering information from hacker forums and marketplaces that sell harmful hacking-related items and services. They've established an operational mechanism for gathering information from these sites. This system now collects 400 high-quality cyber-intimidation notifications every week on average. These danger alerts provide details on newly generated malware and exploits that have yet to be used in a cyber-attack. This is a valuable service for cyber-surveillance. Various machine learning approaches are used to dramatically improve the system. They can recall 93% of items in marketplaces and 85% of comments on forums about harmful hacking with great precision using machine learning models. They do preliminary analysis on the data gathered, illustrating how it might be used to assist a security professional in improved intimidation analysis.
Chapter Preview
Top

Introduction

Pre-reconnaissance cyber intimidation info is info received before an adverse entity engages with the protected personal computer. Table 1 provides an illustration of the relevance of cyber intimidation intelligence. In February of 2015 and 2016, Microsoft Windows vulnerability was discovered. The vulnerability's disclosure was basically Microsoft's way of alerting users to a surveillance problem. It's worth noting that there was no publicly known technique of exploiting this issue in a cyber-intrusion at the time (i.e. an available exploit). However, a month later, an exploit was discovered for sale on the dark-web market and deep-web market. A large cyber surveillance firm, (V. Benjamin, W. Li, 2015) discovered that the “Dyre Banking Trojan”, which was meant to “steal credit cards, exploited this flaw - the first time an intrusion had been revealed”. This vignette shows how danger alerts gleaned from the dark-web may be extremely useful to surveillance experts. The “Dyre Banking Trojan”, together with another banking virus called Dridex1, had a global average exposure of 57.3 percent. It indicates that approximately six out of ten companies throughout the world have been impacted, which is a disproportionately large figure on a global scale (T. Fu, A. Abbasi, and H. Chen., 2010).

Table 1.
Give a specific example and current database status
S.N.StagesProceedings
1.Jan –June 2015“Microsoft has identified the remote code execution vulnerability MS15-010/CVE 2015-0057 in Windows. At the time the vulnerability was disclosed, there was no publicly known exploit”.
2.July –Dec 2015“On a darknet market, an exploit for MS15-010/CVE 2015-0057 was uncovered and sold for 48 BTC (“about $10,000-15,000 USD”)”.
3.Jan –June 2016“The Dyre Banking Trojan, which was meant to collect credit card numbers, actually exploited this vulnerability, according to FireEye”.
4.July –Dec 2016“At the time the vulnerability was disclosed, there was no publicly known exploit”.

In this study, we look at how such intelligence might be obtained and evaluated on the Internet's many social stages, notably on the dark-web and deep-web (T. J. Holt and E. Lampke., 2010). We ran across a few issues while doing so, which we solved using a variety of data mining approaches. Our present system is up and running, gathering roughly 305 cyber intimidations every week.

Table 2.
The condition of the information environments
MarketsM1-Total Number18
M2-Total products11981
M3-Hacking related1563
M4-Vendors453
EnvironmentsE1-Total Number22
E2-Topics/Posts22870/165897
E3-Hacking related4425/32115
E4-Users5549

Complete Chapter List

Search this Book:
Reset