Threats from the Dark: A Review over Dark Web Investigation Research for Cyber Threat Intelligence

被引:24
作者
Basheer, Randa [1 ]
Alkhatib, Bassel [1 ,2 ]
机构
[1] Syrian Virtual Univ, Fac Informat Technol & Commun, Damascus, Syria
[2] Al Sham Private Univ, Fac Informat Engn, Damascus, Syria
关键词
KEY HACKERS;
D O I
10.1155/2021/1302999
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
From proactive detection of cyberattacks to the identification of key actors, analyzing contents of the Dark Web plays a significant role in deterring cybercrimes and understanding criminal minds. Researching in the Dark Web proved to be an essential step in fighting cybercrime, whether with a standalone investigation of the Dark Web solely or an integrated one that includes contents from the Surface Web and the Deep Web. In this review, we probe recent studies in the field of analyzing Dark Web content for Cyber Threat Intelligence (CTI), introducing a comprehensive analysis of their techniques, methods, tools, approaches, and results, and discussing their possible limitations. In this review, we demonstrate the significance of studying the contents of different platforms on the Dark Web, leading new researchers through state-of-the-art methodologies. Furthermore, we discuss the technical challenges, ethical considerations, and future directions in the domain.
引用
收藏
页数:21
相关论文
共 61 条
[1]  
Akhgar B., 2017, P EST AC SEC SCI 16
[2]  
Almukaynizi Mohammed, 2017, 2017 International Conference on Cyber-Conflict (CyCon U.S.), P82, DOI 10.1109/CYCONUS.2017.8167501
[3]  
Almukaynizi M, 2018, 2018 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), P31, DOI 10.1109/ISI.2018.8587334
[4]  
Alsmadi I., 2019, The NICE Cyber Security Framework: Cyber Security Intelligence and Analytics
[5]   Labeling Hacker Exploits for Proactive Cyber Threat Intelligence: A Deep Transfer Learning Approach [J].
Ampel, Benjamin ;
Samtani, Sagar ;
Zhu, Hongyi ;
Ullman, Steven ;
Chen, Hsinchun .
2020 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2020, :144-149
[6]  
Arnold Nolan, 2019, 2019 IEEE International Conference on Intelligence and Security Informatics (ISI), P92, DOI 10.1109/ISI.2019.8823501
[7]  
Biswas B, 2018, PROCEEDINGS OF THE 51ST ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), P1752
[8]  
Chayal N.M., 2020, DATA SCI INTELLIGENT
[9]  
Cherqi O, 2018, 2018 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), P79, DOI 10.1109/ISI.2018.8587311
[10]   Predicting Cyber-Events by Leveraging Hacker Sentiment [J].
Deb, Ashok ;
Lerman, Kristina ;
Ferrara, Emilio .
INFORMATION, 2018, 9 (11)