Cyber Threat Intelligence and Dark Web Analysis

The field of cyber threat intelligence is moving towards a more comprehensive understanding of various data sources, including dark web platforms and underground forums. Researchers are developing innovative methods to analyze and filter large amounts of data from these sources, revealing valuable insights into the tactics and strategies of cybercriminals. The development of tools and techniques to protect network configuration privacy is also a key area of focus, with researchers proposing scalable and rational solutions to safeguard sensitive data. Furthermore, the analysis of peer-to-peer networks, such as Monero, is providing new insights into the topology and security of these networks. Noteworthy papers include:

  • The Dark Side of the Web, which demonstrates a method to analyze and filter large amounts of dark web data, revealing topic diversity and platform-specific trends.
  • ScaleGuard, which proposes a scalable and rational solution to protect network configuration privacy.
  • Charting the Uncharted, which provides the first analysis of Monero's peer-to-peer network, revealing connectivity patterns and potential security improvements.

Sources

The Dark Side of the Web: Towards Understanding Various Data Sources in Cyber Threat Intelligence

ScaleGuard: Rational and Scalable Configuration Privacy Protection with Topology Expansion

Charting the Uncharted: The Landscape of Monero Peer-to-Peer Network

Snorkeling in dark waters: A longitudinal surface exploration of unique Tor Hidden Services (Extended Version)

Burning some myths on privacy properties of social networks against active attacks

Mapping Trafficking Networks: A Data-Driven Approach to Disrupt Human Trafficking Post Russia-Ukraine Conflict

Built with on top of