Skip to product information
1 of 1
Regular price £45.29 GBP
Regular price £56.99 GBP Sale price £45.29 GBP
Sale Sold out
Free UK Shipping

Freshly Printed - allow 8 days lead

Darkweb Cyber Threat Intelligence Mining

This book describes techniques and results in cyber threat intelligence from the center of the malicious hacking underworld - the dark web.

John Robertson (Author), Ahmad Diab (Author), Ericsson Marin (Author), Eric Nunes (Author), Vivin Paliath (Author), Jana Shakarian (Author), Paulo Shakarian (Author)

9781107185777, Cambridge University Press

Hardback, published 4 April 2017

146 pages
23.5 x 15.6 x 1.5 cm, 0.38 kg

'The book is well written and well structured. The authors provide interesting facts on the darknet economy, its community, and its underling rules, such as trust-based platforms and the related problems of its participants.' Steffen Wendzel, Computing Reviews

The important and rapidly emerging new field known as 'cyber threat intelligence' explores the paradigm that defenders of computer networks gain a better understanding of their adversaries by understanding what assets they have available for an attack. In this book, a team of experts examines a new type of cyber threat intelligence from the heart of the malicious hacking underworld - the dark web. These highly secure sites have allowed anonymous communities of malicious hackers to exchange ideas and techniques, and to buy/sell malware and exploits. Aimed at both cybersecurity practitioners and researchers, this book represents a first step toward a better understanding of malicious hacking communities on the dark web and what to do about them. The authors examine real-world darkweb data through a combination of human and automated techniques to gain insight into these communities, describing both methodology and results.

1. Introduction
2. Moving to proactive cyber threat intelligence
3. Understanding darkweb malicious hacker forums
4. Automatic mining of cyber intelligence from the dark web
5. Analyzing products and vendors in malicious hacking markets
6. Using game theory for threat intelligence
7. Application – protecting industrial control systems
8. Conclusion – the future of darkweb cyber threat intelligence.

Subject Areas: Network security [UTN], Computer security [UR], Data mining [UNF], Crime & criminology [JKV]

View full details