2022
DOI: 10.48550/arxiv.2202.01448
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Deep Learning Algorithm for Threat Detection in Hackers Forum (Deep Web)

Abstract: In our current society, the inter-connectivity of devices provides easy access for netizens to utilize cyberspace technology for illegal activities. The deep web platform is a consummative ecosystem shielded by boundaries of trust, information sharing, trade-off, and review systems. Domain knowledge is shared among experts in hackers forums which contain indicators of compromise that can be explored for cyberthreat intelligence. Developing tools that can be deployed for threat detection is integral in securing… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 31 publications
(41 reference statements)
0
3
0
Order By: Relevance
“…Threat actors persistently combine many techniques such as social engineering attack, dictionary attack, or brute force attacks to extract login credentials which include usernames and passwords in many cases [31], [32]. Millions of user login credentials have been compromised in the last decade with usernames and passwords exposed into the dark web [33]. In April 2020 for example, an estimate of 500,000 stolen zoom passwords including login credentials, victim personal meeting URLs, and host keys were available for sale in darknet markets while some account credentials were made available for free [33].…”
Section: ) Password Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…Threat actors persistently combine many techniques such as social engineering attack, dictionary attack, or brute force attacks to extract login credentials which include usernames and passwords in many cases [31], [32]. Millions of user login credentials have been compromised in the last decade with usernames and passwords exposed into the dark web [33]. In April 2020 for example, an estimate of 500,000 stolen zoom passwords including login credentials, victim personal meeting URLs, and host keys were available for sale in darknet markets while some account credentials were made available for free [33].…”
Section: ) Password Attacksmentioning
confidence: 99%
“…Millions of user login credentials have been compromised in the last decade with usernames and passwords exposed into the dark web [33]. In April 2020 for example, an estimate of 500,000 stolen zoom passwords including login credentials, victim personal meeting URLs, and host keys were available for sale in darknet markets while some account credentials were made available for free [33].…”
Section: ) Password Attacksmentioning
confidence: 99%
“…A criminal offense is committed when a technical device is used to gain unauthorized access to a system. The Electronic Communications Privacy Act (ECPA) was passed to address such offenses enacted to protect electronic communications in storage and transit [21,22].…”
Section: Vulnerabilities On Biometricsmentioning
confidence: 99%