2019 IEEE World Congress on Services (SERVICES) 2019
DOI: 10.1109/services.2019.00016
|View full text |Cite
|
Sign up to set email alerts
|

A Crawler Architecture for Harvesting the Clear, Social, and Dark Web for IoT-Related Cyber-Threat Intelligence

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 31 publications
(14 citation statements)
references
References 32 publications
0
13
0
Order By: Relevance
“…The Cyber Threat Intelligence (CTI) is based on the information gathered about robotic threats and threat actors which would help in mitigating harmful cyber-events based on the Advanced Persistent Threat (APT) concept through early detection and prevention. In fact, CTI sources include information gathered from HUMman INTelligence (HUMINT), Open Source INTelligence (OSINT), TECHnical INTelligence (TECHINT) and intelligence gathered from the dark web (silk road) [232,233]. This allows an enhancement in the robotic domain via an evidence-based malware analy- CIT includes three intelligence types that can be described as follows:…”
Section: Cyber Threat Intelligencementioning
confidence: 99%
“…The Cyber Threat Intelligence (CTI) is based on the information gathered about robotic threats and threat actors which would help in mitigating harmful cyber-events based on the Advanced Persistent Threat (APT) concept through early detection and prevention. In fact, CTI sources include information gathered from HUMman INTelligence (HUMINT), Open Source INTelligence (OSINT), TECHnical INTelligence (TECHINT) and intelligence gathered from the dark web (silk road) [232,233]. This allows an enhancement in the robotic domain via an evidence-based malware analy- CIT includes three intelligence types that can be described as follows:…”
Section: Cyber Threat Intelligencementioning
confidence: 99%
“…Methodologically we followed a four-stage approach to developing INTIME: (i) in the analysis phase we explored the state-of-the-art in cyber-security and CTI management, defined use case scenarios and gathered end-user requirements, (ii) in the research phase we designed advanced novel methods that allowed INTIME to achieve its mission regarding proactive technologies and cyber-attack detection, (iii) in the development phase we implemented, integrated, and tested the tools, components, and services of the platform, and (iv) in the validation phase we developed initial evaluation plans on real-world datasets and scenarios, and designed the more detailed evaluation of the individual components. The first iteration of this architecture was initially developed by Koloveas et al [96], while specifically focusing on the crawling and ranking tasks. In this section, we outline the architecture of the proposed system, as illustrated in Figure 1.…”
Section: System Architecturementioning
confidence: 99%
“…Koloveas et al [46] used classification and language modeling methods to support the crawling tasks by representing the collected information in a latent low-dimensional feature space, to analyze the content relevant to a specific hacking topic (IoT in the proposed study).…”
Section: Performance and Optimization Deliu Et Al [44]mentioning
confidence: 99%