2019
DOI: 10.1007/978-3-030-33846-6_32
|View full text |Cite
|
Sign up to set email alerts
|

Hacker Forum Exploit and Classification for Proactive Cyber Threat Intelligence

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…According to the testing findings, the model could more effectively and accurately identify organizations, HackerIds, software, tools along with other things in the conversations of dark web forums. Apurv Singh Gautam et al [23] proposed a model that uses deep learning and machine learning techniques to automatically categorized hacker forum information into predetermined groups and create dynamic illustrations that allow CTI professionals to explore gathered data for diligent and appropriate CTI. According to the study's findings, the deep learning model RNN GRU produces the best classification outcomes of all the models.…”
Section: International Journal On Recent and Innovation Trends In Com...mentioning
confidence: 99%
“…According to the testing findings, the model could more effectively and accurately identify organizations, HackerIds, software, tools along with other things in the conversations of dark web forums. Apurv Singh Gautam et al [23] proposed a model that uses deep learning and machine learning techniques to automatically categorized hacker forum information into predetermined groups and create dynamic illustrations that allow CTI professionals to explore gathered data for diligent and appropriate CTI. According to the study's findings, the deep learning model RNN GRU produces the best classification outcomes of all the models.…”
Section: International Journal On Recent and Innovation Trends In Com...mentioning
confidence: 99%
“…In [8], a classification of CTI data originating from hacker forums was performed using two different variants of Recurrent Neural Networks (RNNs). The data were classified, using specialised web crawlers, into relevant or irrelevant.…”
Section: Related Workmentioning
confidence: 99%
“…To best obscure one's communication, one would want to pipe communications and connections through a lot of different servers, to make it harder to trace. Alternative communication platforms that have had documented use are invite-only, private forums (P. Gautam, Gahlot, and Kamat 2019;J. Shakarian, Gunn, and Shakarian 2016;Ablon, Libicki, and Golay 2014) and Telegram, an encrypted communication platform (Check Point 2019).…”
Section: Botnet Deploymentmentioning
confidence: 99%