2016
DOI: 10.1109/comst.2015.2497690
|View full text |Cite
|
Sign up to set email alerts
|

Darknet as a Source of Cyber Intelligence: Survey, Taxonomy, and Characterization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
50
0
1

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 103 publications
(52 citation statements)
references
References 143 publications
1
50
0
1
Order By: Relevance
“…Benjamin et al proposed a method for extracting information from hacker forums, IRC channels, and carding shops to identify threats [14]. In addition, Fachkha and Debbabi characterized the darknet and compared several methods for extracting threat information there [15].…”
Section: Collectionmentioning
confidence: 99%
“…Benjamin et al proposed a method for extracting information from hacker forums, IRC channels, and carding shops to identify threats [14]. In addition, Fachkha and Debbabi characterized the darknet and compared several methods for extracting threat information there [15].…”
Section: Collectionmentioning
confidence: 99%
“…There are significant challenges in assessing possible threats and in keeping such assessments accurate, given advances in technologies and in their uses, such as the evolving "dark net" (Fachkha & Debbabi, 2016;Lacson & Jones, 2016), and the growing offensive capabilities of a few countries and of groups of individuals, including terrorists (Liff, 2012;Lindsay, 2015), plus a great many everyday cybercriminals (Akamai, 2016;Cisco, 2017). South Africa has been the country most often attacked in Africa (Wolfpack, 2013;TMG Digital, 2016;Van Heerden, Von Soms, & Mooi, 2016), with an estimated cost in 2014 of ZAR5.8 billion (Fripp, 2014).…”
Section: Governance Of Cybersecurity -The Case Of South Africamentioning
confidence: 99%
“…Reference [12] provided an in-depth survey of darknet traffic analysis. The authors discussed a taxonomy of DDoS attacks and different types of scanning events in Ref.…”
Section: Related Workmentioning
confidence: 99%