scholarly journals Influence of COVID-19 Epidemic on Dark Web Contents

Electronics ◽  
2021 ◽  
Vol 10 (22) ◽  
pp. 2744
Author(s):  
Abdul Razaque ◽  
Bakhytzhan Valiyev ◽  
Bandar Alotaibi ◽  
Munif Alotaibi ◽  
Saule Amanzholova ◽  
...  

The Dark Web is known as a place triggering a variety of criminal activities. Anonymization techniques enable illegal operations, leading to the loss of confidential information and its further use as bait, a trade product or even a crime tool. Despite technical progress, there is still not enough awareness of the Dark Web and its secret activity. In this study, we introduced the Dark Web Enhanced Analysis (DWEA) in order to analyze and gather information about the content accessed on the Dark Net based on data characteristics. The research was performed to identify how the Dark Web has been influenced by recent global events, such as the COVID-19 epidemic. The research included the usage of a crawler, which scans the network and collects data for further analysis with machine learning. The result of this work determines the influence of the COVID-19 epidemic on the Dark Net.

Author(s):  
Abdul Razaque ◽  
Bakhytzhan Valiyev ◽  
Bandar Alotaibi ◽  
Munif Alotaibi ◽  
Saule Amanzholova ◽  
...  

The Dark Web is known as a place triggering a variety of criminal activities. Anonymization techniques enable illegal operations, leading to the loss of confidential information and its further use as bait, a trade product or even a crime tool. Despite technical progress, there is still not enough awareness of the Dark Web and its secret activity. In this study, we introduced the Dark Web Enhanced Analysis (DWEA), in order to analyze and gather information about the content accessed on the Dark Net based on data characteristics. The research was performed to identify how the Dark Web has been influenced by recent global events, such as the COVID-19 epidemic. The research included the usage of a crawler, which scans the network and collects data for further analysis with machine learning. The result of this work determines the influence of the COVID-19 epidemic on the Dark Net.


2019 ◽  
pp. 161-179
Author(s):  
Erdal Ozkaya ◽  
Rafiqul Islam
Keyword(s):  

10.29007/nkfk ◽  
2019 ◽  
Author(s):  
Azene Zenebe ◽  
Mufaro Shumba ◽  
Andrei Carillo ◽  
Sofia Cuenca

In the darknet, hackers are constantly sharing information with each other and learning from each other. These conversations in online forums for example can contain data that may help assist in the discovery of cyber threat intelligence. Cyber Threat Intelligence (CTI) is information or knowledge about threats that can help prevent security breaches in cyberspace. In addition, monitoring and analysis of this data manually is challenging because forum posts and other data on the darknet are high in volume and unstructured. This paper uses descriptive analytics and predicative analytics using machine learning on forum posts dataset from darknet to discover valuable cyber threat intelligence. The IBM Watson Analytics and WEKA machine learning tool were used. Watson Analytics showed trends and relationships in the data. WEKA provided machine learning models to classify the type of exploits targeted by hackers from the form posts. The results showed that Crypter, Password cracker and RATs (Remote Administration Tools), buffer overflow exploit tools, and Keylogger system exploits tools were the most common in the darknet and that there are influential authors who are frequent in the forums. In addition, machine learning helps build classifiers for exploit types. The Random Forest classifier provided a higher accuracy than the Random Tree and Naïve Bayes classifiers. Therefore, analyzing darknet forum posts can provide actionable information as well as machine learning is effective in building classifiers for prediction of exploit types. Predicting exploit types as well as knowing patterns and trends on hackers’ plan helps defend the cyberspace proactively.


Phishing is the deception of a trustworthy person in an electronic connection in order to obtain confidential information from individuals or organisations usernames, passwords, and credit card numbers are just a few examples. Phishers imitate legitimate websites by creating websites that are visually and semantically identical. As technology advances, phishing techniques have become more sophisticated, necessitating the use of antiphishing measures to detect phishing attacks. To solve the phishing attacks problems. We got the data for the Phishing website from the Kaggle open source website, which is a Google Limited Liability Company-owned online community of data scientists and machine learning experts ( LLC). We are using Ensemble learning to detecting website. We are also analize accurary. We compared the results of multiple machine learning methods for predicting phishing websites


2020 ◽  
Vol 43 ◽  
Author(s):  
Myrthe Faber

Abstract Gilead et al. state that abstraction supports mental travel, and that mental travel critically relies on abstraction. I propose an important addition to this theoretical framework, namely that mental travel might also support abstraction. Specifically, I argue that spontaneous mental travel (mind wandering), much like data augmentation in machine learning, provides variability in mental content and context necessary for abstraction.


2020 ◽  
Author(s):  
Mohammed J. Zaki ◽  
Wagner Meira, Jr
Keyword(s):  

2020 ◽  
Author(s):  
Marc Peter Deisenroth ◽  
A. Aldo Faisal ◽  
Cheng Soon Ong
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document