Cyber Threat Intelligence and IoCs and IoAs Search on the Dark Web

Guardado en:
Detalles Bibliográficos
Publicado en:European Conference on Cyber Warfare and Security (Jun 2025), p. 348-357
Autor principal: Lehto, Martti
Otros Autores: Koskimäki, Timo
Publicado:
Academic Conferences International Limited
Materias:
Acceso en línea:Citation/Abstract
Full Text
Full Text - PDF
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!

MARC

LEADER 00000nab a2200000uu 4500
001 3244083241
003 UK-CbPIL
035 |a 3244083241 
045 2 |b d20250601  |b d20250630 
084 |a 142231  |2 nlm 
100 1 |a Lehto, Martti  |u University of Jyväskylä, Finland 
245 1 |a Cyber Threat Intelligence and IoCs and IoAs Search on the Dark Web 
260 |b Academic Conferences International Limited  |c Jun 2025 
513 |a Conference Proceedings 
520 3 |a Through cyber threat intelligence (CTI), information is collected and analyzed from the surface web, deep web, and dark web. Threat intelligence refers to the knowledge, context, and insight gained by analyzing a wide range of physical, geopolitical, and cyber threats. CTI specifically involves the collection, processing, and analysis of data, leading to an understanding of the motivations, targets, and attack methods of threat actors. CTI helps facilitate faster, better-informed, and data-driven security decisions. It enables a shift from reactive defense to proactive engagement against threat actors. In the context of cybersecurity, various indicators are used. The indicators that are most used are Indicators of Compromise (l°C) and Indicator of Attack (loA). The collected observational data is used to understand the attacker's motivation for the attack and to predict their future actions. This provides the necessary perspective for decision-making to organize defense from reactive to proactive action. This study analyzes the role of the dark web as a source of l°C and loA, as cyber threat actors primarily operate and communicate on dark web platforms. The dark web is a part of the deep web that is intentionally hidden and inaccessible through regular web browsers. Using the dark web allows for nearly complete anonymity online by encrypting data packets and routing them through several network nodes. 
653 |a Packets (communication) 
653 |a Search engines 
653 |a Internet 
653 |a Threats 
653 |a Data mining 
653 |a Product reviews 
653 |a Social networks 
653 |a Cybersecurity 
653 |a Web browsers 
653 |a Indicators 
653 |a Threat evaluation 
653 |a Electronic newspapers 
653 |a Data encryption 
653 |a Automation 
653 |a Dark web 
653 |a Intelligence gathering 
653 |a Political dissent 
653 |a Data processing 
653 |a Decision making 
653 |a Intelligence 
653 |a Motivation 
653 |a Geopolitics 
700 1 |a Koskimäki, Timo  |u University of Jyväskylä, Finland 
773 0 |t European Conference on Cyber Warfare and Security  |g (Jun 2025), p. 348-357 
786 0 |d ProQuest  |t Political Science Database 
856 4 1 |3 Citation/Abstract  |u https://www.proquest.com/docview/3244083241/abstract/embedded/6A8EOT78XXH2IG52?source=fedsrch 
856 4 0 |3 Full Text  |u https://www.proquest.com/docview/3244083241/fulltext/embedded/6A8EOT78XXH2IG52?source=fedsrch 
856 4 0 |3 Full Text - PDF  |u https://www.proquest.com/docview/3244083241/fulltextPDF/embedded/6A8EOT78XXH2IG52?source=fedsrch