Threats from the Dark: A Review over Dark Web Investigation Research for Cyber Threat Intelligence

被引:16
|
作者
Basheer, Randa [1 ]
Alkhatib, Bassel [1 ,2 ]
机构
[1] Syrian Virtual Univ, Fac Informat Technol & Commun, Damascus, Syria
[2] Al Sham Private Univ, Fac Informat Engn, Damascus, Syria
关键词
KEY HACKERS;
D O I
10.1155/2021/1302999
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
From proactive detection of cyberattacks to the identification of key actors, analyzing contents of the Dark Web plays a significant role in deterring cybercrimes and understanding criminal minds. Researching in the Dark Web proved to be an essential step in fighting cybercrime, whether with a standalone investigation of the Dark Web solely or an integrated one that includes contents from the Surface Web and the Deep Web. In this review, we probe recent studies in the field of analyzing Dark Web content for Cyber Threat Intelligence (CTI), introducing a comprehensive analysis of their techniques, methods, tools, approaches, and results, and discussing their possible limitations. In this review, we demonstrate the significance of studying the contents of different platforms on the Dark Web, leading new researchers through state-of-the-art methodologies. Furthermore, we discuss the technical challenges, ethical considerations, and future directions in the domain.
引用
收藏
页数:21
相关论文
共 50 条
  • [22] Exploring Dark Web Crawlers: A Systematic Literature Review of Dark Web Crawlers and Their Implementation
    Bergman, Jesper
    Popov, Oliver B.
    IEEE ACCESS, 2023, 11 : 35914 - 35933
  • [23] "When the Code becomes a Crime Scene" Towards Dark Web Threat Intelligence with Software Quality Metrics
    Cascavilla, G.
    Catolino, G.
    Ebert, F.
    Tamburri, D. A.
    van den Heuvel, W. J.
    2022 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME 2022), 2022, : 439 - 443
  • [24] A System for Efficiently Hunting for Cyber Threats in Computer Systems Using Threat Intelligence
    Gao, Peng
    Shao, Fei
    Liu, Xiaoyuan
    Xiao, Xusheng
    Liu, Haoyuan
    Qin, Zheng
    Xu, Fengyuan
    Mittal, Prateek
    Kulkarni, Sanjeev R.
    Song, Dawn
    2021 IEEE 37TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2021), 2021, : 2705 - 2708
  • [25] Cyber threat intelligence sharing: Survey and research directions
    Wagner, Thomas D.
    Mahbub, Khaled
    Palomar, Esther
    Abdallah, Ali E.
    COMPUTERS & SECURITY, 2019, 87
  • [26] Keep the dark web close and your cyber security tighter
    Mador Z.
    Computer Fraud and Security, 2021, 2021 (01): : 6 - 8
  • [27] Cyber Threat Intelligence on Blockchain: A Systematic Literature Review
    Chatziamanetoglou, Dimitrios
    Rantos, Konstantinos
    COMPUTERS, 2024, 13 (03)
  • [28] TorBot: Open Source Intelligence Tool for Dark Web
    Narayanan, P. S.
    Ani, R.
    King, Akeem T. L.
    INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES, ICICCT 2019, 2020, 89 : 187 - 195
  • [29] Evolution of Dark Web Threat Analysis and Detection: A Systematic Approach
    Nazah, Saiba
    Huda, Shamsul
    Abawajy, Jemal
    Hassan, Mohammad Mehedi
    IEEE ACCESS, 2020, 8 : 171796 - 171819
  • [30] Unveiling Challenges and Solutions with Intelligence in the Dark and Deep Web
    Tubaishat, Abdallah
    Aljouhi, Mariam
    Maramara, April
    INTELLIGENT AND FUZZY SYSTEMS, INFUS 2024 CONFERENCE, VOL 1, 2024, 1088 : 372 - 380