Darkweb Cyber Threat Intelligence Mining

Author:   John Robertson (Arizona State University) ,  Ahmad Diab (Arizona State University) ,  Ericsson Marin (Arizona State University) ,  Eric Nunes (Arizona State University)
Publisher:   Cambridge University Press
ISBN:  

9781107185777


Pages:   146
Publication Date:   04 April 2017
Format:   Hardback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $155.22 Quantity:  
Add to Cart

Share |

Darkweb Cyber Threat Intelligence Mining


Add your own review!

Overview

The important and rapidly emerging new field known as 'cyber threat intelligence' explores the paradigm that defenders of computer networks gain a better understanding of their adversaries by understanding what assets they have available for an attack. In this book, a team of experts examines a new type of cyber threat intelligence from the heart of the malicious hacking underworld - the dark web. These highly secure sites have allowed anonymous communities of malicious hackers to exchange ideas and techniques, and to buy/sell malware and exploits. Aimed at both cybersecurity practitioners and researchers, this book represents a first step toward a better understanding of malicious hacking communities on the dark web and what to do about them. The authors examine real-world darkweb data through a combination of human and automated techniques to gain insight into these communities, describing both methodology and results.

Full Product Details

Author:   John Robertson (Arizona State University) ,  Ahmad Diab (Arizona State University) ,  Ericsson Marin (Arizona State University) ,  Eric Nunes (Arizona State University)
Publisher:   Cambridge University Press
Imprint:   Cambridge University Press
Dimensions:   Width: 15.60cm , Height: 1.50cm , Length: 23.50cm
Weight:   0.380kg
ISBN:  

9781107185777


ISBN 10:   1107185777
Pages:   146
Publication Date:   04 April 2017
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Hardback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

1. Introduction; 2. Moving to proactive cyber threat intelligence; 3. Understanding darkweb malicious hacker forums; 4. Automatic mining of cyber intelligence from the dark web; 5. Analyzing products and vendors in malicious hacking markets; 6. Using game theory for threat intelligence; 7. Application – protecting industrial control systems; 8. Conclusion – the future of darkweb cyber threat intelligence.

Reviews

'Darkweb Cyber Threat Intelligence Mining represents a tipping point in cyber security. It is a must-read for anyone involved in the modern cyber struggle.' George Cybenko, Dartmouth College, New Hampshire, from the Foreword


Advance praise: 'Darkweb Cyber Threat Intelligence Mining represents a tipping point in cyber security. It is a must-read for anyone involved in the modern cyber struggle.' George Cybenko, Dartmouth College, New Hampshire, from the Foreword


'Darkweb Cyber Threat Intelligence Mining represents a tipping point in cyber security. It is a must-read for anyone involved in the modern cyber struggle.' George Cybenko, Dartmouth College, New Hampshire, from the Foreword 'The book is well written and well structured. The authors provide interesting facts on the darknet economy, its community, and its underling rules, such as trust-based platforms and the related problems of its participants.' Steffen Wendzel, Computing Reviews


Author Information

John Robertson is a student at Arizona State University pursuing undergraduate degrees in both Computer Science and Electrical Engineering, where his work was nominated for the Computing Research Association's Outstanding Undergraduate Researcher award. He is a recipient of an ARO Undergraduate Research Apprenticeship Program grant as well as two Fulton Undergraduate Research Initiative grants for his work involving the application of artificial intelligence techniques to cyber-security problems in the Cyber-Socio Intelligent System Laboratory with Dr Paulo Shakarian. Robertson also has industry experience as a software engineering intern with Microsoft on the Windows Core Development team. Ahmad Diab is a Computer Engineering Ph.D. student at Arizona State University. His current work in the Cyber-Socio Intelligent System Laboratory focuses on the application of AI techniques to cyber-security problems. Diab is a recipient of the SIPGA award from ASTAR agency, Singapore. Previously, he was a Java developer at EtQ compliance Company. He holds a B.Sc. in computer engineering from Jordan University of Science and Technology. Ericsson Marin is a Computer Science Ph.D. student at Arizona State University. He works at the Cyber-Socio Intelligent System Laboratory under the guidance of Dr Paulo Shakarian, with research projects in the intersection of Social Network Analysis, AI and Cyber-Security. He received his M.Sc. in Computer Science from the Federal University of Goias, Brazil and has published numerous papers in the area of social network analysis. He also has real-world experience as a software designer managing different software factories. In 2015, Marin was awarded with a Brazilian Science without Borders scholarship to pursue his Ph.D. Eric Nunes is a Ph.D. student in the computer engineering program at Arizona State University. His research focuses on the intelligence techniques to cyber security problems. Previously, he was a Research Associate at the Brain Engineering Lab at Dartmouth College, New Hampshire. Nunes holds an M.Sc. in Electrical Engineering from Syracuse University, New York. Vivin Paliath is a Computer Science Ph.D. student at Arizona State University. His research at ASU focuses on the application of artificial intelligence and game-theoretic techniques to cyber-security problems. Paliath received both his B.Sc. in Computer Engineering and M.Sc. in Computer Science from Arizona State University. He has over a decade of industry experience and is also currently working as a Senior Software Engineer at Infusionsoft, a company that develops marketing-automation software for small businesses.

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

wl

Shopping Cart
Your cart is empty
Shopping cart
Mailing List