Skip to main content

Showing 1–4 of 4 results for author: Almukaynizi, M

.
  1. arXiv:1909.11592  [pdf, other

    cs.SI cs.CR

    Mining user interaction patterns in the darkweb to predict enterprise cyber incidents

    Authors: Soumajyoti Sarkar, Mohammad Almukaynizi, Jana Shakarian, Paulo Shakarian

    Abstract: With rise in security breaches over the past few years, there has been an increasing need to mine insights from social media platforms to raise alerts of possible attacks in an attempt to defend conflict during competition. In this study, we attempt to build a framework that utilizes unconventional signals from the darkweb forums by leveraging the reply network structure of user interactions with… ▽ More

    Submitted 20 June, 2020; v1 submitted 24 September, 2019; originally announced September 2019.

    Comments: arXiv admin note: text overlap with arXiv:1811.06537

  2. arXiv:1811.06537  [pdf, other

    cs.SI

    Predicting enterprise cyber incidents using social network analysis on the darkweb hacker forums

    Authors: Soumajyoti Sarkar, Mohammad Almukaynizi, Jana Shakarian, Paulo Shakarian

    Abstract: With rise in security breaches over the past few years, there has been an increasing need to mine insights from social media platforms to raise alerts of possible attacks in an attempt to defend conflict during competition. We use information from the darkweb forums by leveraging the reply network structure of user interactions with the goal of predicting enterprise cyber attacks. We use a suite o… ▽ More

    Submitted 15 November, 2018; originally announced November 2018.

    Comments: 7 pages

  3. arXiv:1810.12906  [pdf, other

    cs.CR cs.LO

    Finding Cryptocurrency Attack Indicators Using Temporal Logic and Darkweb Data

    Authors: Mohammed Almukaynizi, Vivin Paliath, Malay Shah, Malav Shah, Paulo Shakarian

    Abstract: With the recent prevalence of darkweb/deepweb (D2web) sites specializing in the trade of exploit kits and malware, malicious actors have easy-access to a wide-range of tools that can empower their offensive capability. In this study, we apply concepts from causal reasoning, itemset mining, and logic programming on historical cryptocurrency-related cyber incidents with intelligence collected from o… ▽ More

    Submitted 29 October, 2018; originally announced October 2018.

  4. arXiv:1810.12492  [pdf, other

    cs.CR cs.AI

    DARKMENTION: A Deployed System to Predict Enterprise-Targeted External Cyberattacks

    Authors: Mohammed Almukaynizi, Ericsson Marin, Eric Nunes, Paulo Shakarian, Gerardo I. Simari, Dipsy Kapoor, Timothy Siedlecki

    Abstract: Recent incidents of data breaches call for organizations to proactively identify cyber attacks on their systems. Darkweb/Deepweb (D2web) forums and marketplaces provide environments where hackers anonymously discuss existing vulnerabilities and commercialize malicious software to exploit those vulnerabilities. These platforms offer security practitioners a threat intelligence environment that allo… ▽ More

    Submitted 29 October, 2018; originally announced October 2018.