Cyber Threat Intelligence and IoCs and IoAs Search on the Dark Web
Guardado en:
| Publicado en: | European Conference on Cyber Warfare and Security (Jun 2025), p. 348-357 |
|---|---|
| Autor principal: | |
| Otros Autores: | |
| Publicado: |
Academic Conferences International Limited
|
| Materias: | |
| Acceso en línea: | Citation/Abstract Full Text Full Text - PDF |
| Etiquetas: |
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
MARC
| LEADER | 00000nab a2200000uu 4500 | ||
|---|---|---|---|
| 001 | 3244083241 | ||
| 003 | UK-CbPIL | ||
| 035 | |a 3244083241 | ||
| 045 | 2 | |b d20250601 |b d20250630 | |
| 084 | |a 142231 |2 nlm | ||
| 100 | 1 | |a Lehto, Martti |u University of Jyväskylä, Finland | |
| 245 | 1 | |a Cyber Threat Intelligence and IoCs and IoAs Search on the Dark Web | |
| 260 | |b Academic Conferences International Limited |c Jun 2025 | ||
| 513 | |a Conference Proceedings | ||
| 520 | 3 | |a Through cyber threat intelligence (CTI), information is collected and analyzed from the surface web, deep web, and dark web. Threat intelligence refers to the knowledge, context, and insight gained by analyzing a wide range of physical, geopolitical, and cyber threats. CTI specifically involves the collection, processing, and analysis of data, leading to an understanding of the motivations, targets, and attack methods of threat actors. CTI helps facilitate faster, better-informed, and data-driven security decisions. It enables a shift from reactive defense to proactive engagement against threat actors. In the context of cybersecurity, various indicators are used. The indicators that are most used are Indicators of Compromise (l°C) and Indicator of Attack (loA). The collected observational data is used to understand the attacker's motivation for the attack and to predict their future actions. This provides the necessary perspective for decision-making to organize defense from reactive to proactive action. This study analyzes the role of the dark web as a source of l°C and loA, as cyber threat actors primarily operate and communicate on dark web platforms. The dark web is a part of the deep web that is intentionally hidden and inaccessible through regular web browsers. Using the dark web allows for nearly complete anonymity online by encrypting data packets and routing them through several network nodes. | |
| 653 | |a Packets (communication) | ||
| 653 | |a Search engines | ||
| 653 | |a Internet | ||
| 653 | |a Threats | ||
| 653 | |a Data mining | ||
| 653 | |a Product reviews | ||
| 653 | |a Social networks | ||
| 653 | |a Cybersecurity | ||
| 653 | |a Web browsers | ||
| 653 | |a Indicators | ||
| 653 | |a Threat evaluation | ||
| 653 | |a Electronic newspapers | ||
| 653 | |a Data encryption | ||
| 653 | |a Automation | ||
| 653 | |a Dark web | ||
| 653 | |a Intelligence gathering | ||
| 653 | |a Political dissent | ||
| 653 | |a Data processing | ||
| 653 | |a Decision making | ||
| 653 | |a Intelligence | ||
| 653 | |a Motivation | ||
| 653 | |a Geopolitics | ||
| 700 | 1 | |a Koskimäki, Timo |u University of Jyväskylä, Finland | |
| 773 | 0 | |t European Conference on Cyber Warfare and Security |g (Jun 2025), p. 348-357 | |
| 786 | 0 | |d ProQuest |t Political Science Database | |
| 856 | 4 | 1 | |3 Citation/Abstract |u https://www.proquest.com/docview/3244083241/abstract/embedded/6A8EOT78XXH2IG52?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text |u https://www.proquest.com/docview/3244083241/fulltext/embedded/6A8EOT78XXH2IG52?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text - PDF |u https://www.proquest.com/docview/3244083241/fulltextPDF/embedded/6A8EOT78XXH2IG52?source=fedsrch |