UID:
almafu_9960117815602883
Format:
1 online resource (ix, 137 pages) :
,
digital, PDF file(s).
ISBN:
1-316-94664-9
,
1-316-95287-8
,
1-316-88851-7
Content:
The important and rapidly emerging new field known as 'cyber threat intelligence' explores the paradigm that defenders of computer networks gain a better understanding of their adversaries by understanding what assets they have available for an attack. In this book, a team of experts examines a new type of cyber threat intelligence from the heart of the malicious hacking underworld - the dark web. These highly secure sites have allowed anonymous communities of malicious hackers to exchange ideas and techniques, and to buy/sell malware and exploits. Aimed at both cybersecurity practitioners and researchers, this book represents a first step toward a better understanding of malicious hacking communities on the dark web and what to do about them. The authors examine real-world darkweb data through a combination of human and automated techniques to gain insight into these communities, describing both methodology and results.
Note:
Title from publisher's bibliographic system (viewed on 21 Apr 2017).
,
Cover -- Half title -- Title -- Copyright -- Contents -- Foreword -- Preface -- 1 Introduction -- 2 Moving to Proactive Cyber Threat Intelligence -- 2.1 Introduction -- 2.2 Proactive Intelligence beyond the Deepweb and Darkweb -- 2.3 Showing Value -- 3 Understanding Darkweb Malicious Hacker Forums -- 3.1 Introduction -- 3.2 Background -- 3.3 Methodology and Scope -- 3.4 Forum Structure and Community Social Organization -- 3.5 The Content of Observed Forums -- 3.6 Conclusion -- 4 Automatic Mining of Cyber Intelligence from the Darkweb -- 4.1 Introduction -- 4.2 System Overview -- 4.3 Evaluation -- 4.4 Related Work -- 4.5 Conclusion -- 5 Analyzing Products and Vendors in Malicious Hacking Markets -- 5.1 Introduction -- 5.2 Marketplace Data Characteristics -- 5.3 Users Having Presence in Markets/Forums -- 5.4 Discovery of Zero-Day Exploits -- 5.5 Exploits Targeting Known Vulnerabilities -- 5.6 Identifying Specific Product Categories -- 5.7 Conclusion -- 6 Using Game Theory for Threat Intelligence -- 6.1 Introduction -- 6.2 Security Game Framework -- 6.3 Computational Complexity -- 6.4 Algorithms -- 6.5 Evaluation and Discussion -- 6.6 Conclusion -- 7 Application: Protecting Industrial Control Systems -- 7.1 Introduction -- 7.2 Background -- 7.3 Model -- 7.4 Computational Complexity -- 7.5 Algorithms -- 7.6 Experimental Results -- 7.7 Related Work -- 7.8 Conclusion -- 8 Conclusion -- 8.1 Introduction -- 8.2 Environmental Characteristics -- 8.3 Challenges -- 8.4 Conclusion -- Glossary -- References -- Index.
Additional Edition:
ISBN 1-107-18577-7
Language:
English
Subjects:
Computer Science
URL:
Volltext
(lizenzpflichtig)
URL:
https://doi.org/10.1017/9781316888513
URL:
https://doi.org/10.1017/9781316888513
Bookmarklink