2018 IEEE International Conference on Intelligence and Security Informatics (ISI) 2018
DOI: 10.1109/isi.2018.8587334
|View full text |Cite
|
Sign up to set email alerts
|

DARKMENTION: A Deployed System to Predict Enterprise-Targeted External Cyberattacks

Abstract: Recent incidents of data breaches call for organizations to proactively identify cyber attacks on their systems. Darkweb/Deepweb (D2web) forums and marketplaces provide environments where hackers anonymously discuss existing vulnerabilities and commercialize malicious software to exploit those vulnerabilities. These platforms offer security practitioners a threat intelligence environment that allows to mine for patterns related to organization-targeted cyber attacks. In this paper, we describe a system (called… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…Recommender systems are also considered in vulnerability assessment and scoring [13], [14]. Identification of systems at risk via analysis of discussion on the darkweb can be found in work by Almukaynizi, et al [15]. Nevertheless, network defense and incident handling are lacking recommender systems or similar tools.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Recommender systems are also considered in vulnerability assessment and scoring [13], [14]. Identification of systems at risk via analysis of discussion on the darkweb can be found in work by Almukaynizi, et al [15]. Nevertheless, network defense and incident handling are lacking recommender systems or similar tools.…”
Section: Background and Related Workmentioning
confidence: 99%
“…• Security software: SIEM systems [80], intrusion detection/prevention systems [37], [103], [107], [128], [162], [173], [174], firewalls [37], [104], [127], [128], [174], anti-virus software [37], [111], [127], vulnerability scanners [173], identity and access management [104] • Network assets: Switches [104], [173], routers [104], [128], [173], servers [104], [127], [173], hosts [104], [173], proxies [174] • Virtualization environments: Hypervisor, virtual machine introspection, cloud environments [80] • Operational technology: Sensors, actuators, PLCs • Other Software: Open-Source Big Data Analytics [80], databases [173], identity and access management [173], mailserver [174], operating systems [111], [174] • Physical security assets: Security cameras, access control • External (Threat) Intelligence: Geolocation and DNS lookup [80], open source intelligence (OSINT) [47], [129], intelligence from threat sharing platforms or other organizations [130]- [132] • People:…”
Section: ) Data Collectionmentioning
confidence: 99%
“…In another work, Almukaynizi et al [26] introduced the DARKMENTION system that employs association rules to find correlations between threats mentioned on Dark and Deep Webs and real-world cyber incidents. By using the discovered correlations, the system generates warnings to cybersecurity organizations promptly.…”
Section: Detecting and Predictingmentioning
confidence: 99%