Includes bibliographical references (pages 127-134) and index.
Contents:
Moving to proactive cyber threat intelligence -- Understanding darkweb malicious hacker forums -- Automatic mining of cyber intelligence from the darkweb -- Analyzing products and vendors in malicious hacking markets -- Using game theory for threat intelligence -- Application : protecting industrial control systems.
Summary:
"In this book, a team of experts examines a new type of cyber threat intelligence from the heart of the malicious hacking underworld - the darkweb. These highly secure sites have allowed anonymous communities of malicious hackers to exchange ideas, techniques and buy/sell malware and exploits. Aimed at both cybersecurity practitioners and researchers, this book represents a first step toward a better understanding of malicious hacking communities on the darkweb and what to do about them. The authors examine real-world darkweb data through a combination of human and automated techniques to gain insight into these communities, describing both methodology and results."--Cover, page 4
This resource is supported by the Institute of Museum and Library Services under the provisions of the Library Services and Technology Act as administered by State Library of Iowa.