Skip to main content

Showing 1–5 of 5 results for author: Shakarian, J

.
  1. arXiv:1909.11592  [pdf, other

    cs.SI cs.CR

    Mining user interaction patterns in the darkweb to predict enterprise cyber incidents

    Authors: Soumajyoti Sarkar, Mohammad Almukaynizi, Jana Shakarian, Paulo Shakarian

    Abstract: With rise in security breaches over the past few years, there has been an increasing need to mine insights from social media platforms to raise alerts of possible attacks in an attempt to defend conflict during competition. In this study, we attempt to build a framework that utilizes unconventional signals from the darkweb forums by leveraging the reply network structure of user interactions with… ▽ More

    Submitted 20 June, 2020; v1 submitted 24 September, 2019; originally announced September 2019.

    Comments: arXiv admin note: text overlap with arXiv:1811.06537

  2. arXiv:1811.06537  [pdf, other

    cs.SI

    Predicting enterprise cyber incidents using social network analysis on the darkweb hacker forums

    Authors: Soumajyoti Sarkar, Mohammad Almukaynizi, Jana Shakarian, Paulo Shakarian

    Abstract: With rise in security breaches over the past few years, there has been an increasing need to mine insights from social media platforms to raise alerts of possible attacks in an attempt to defend conflict during competition. We use information from the darkweb forums by leveraging the reply network structure of user interactions with the goal of predicting enterprise cyber attacks. We use a suite o… ▽ More

    Submitted 15 November, 2018; originally announced November 2018.

    Comments: 7 pages

  3. arXiv:1607.08583  [pdf, other

    cs.CR cs.AI cs.CY

    Darknet and Deepnet Mining for Proactive Cybersecurity Threat Intelligence

    Authors: Eric Nunes, Ahmad Diab, Andrew Gunn, Ericsson Marin, Vineet Mishra, Vivin Paliath, John Robertson, Jana Shakarian, Amanda Thart, Paulo Shakarian

    Abstract: In this paper, we present an operational system for cyber threat intelligence gathering from various social platforms on the Internet particularly sites on the darknet and deepnet. We focus our attention to collecting information from hacker forum discussions and marketplaces offering products and services focusing on malicious hacking. We have developed an operational system for obtaining informa… ▽ More

    Submitted 28 July, 2016; originally announced July 2016.

    Comments: 6 page paper accepted to be presented at IEEE Intelligence and Security Informatics 2016 Tucson, Arizona USA September 27-30, 2016

  4. arXiv:1501.05990  [pdf

    cs.CY cs.CR

    Cyber Attacks and Public Embarrassment: A Survey of Some Notable Hacks

    Authors: Jana Shakarian, Paulo Shakarian, Andrew Ruef

    Abstract: We hear it all too often in the media: an organization is attacked, its data, often containing personally identifying information, is made public, and a hacking group emerges to claim credit. In this excerpt, we discuss how such groups operate and describe the details of a few major cyber-attacks of this sort in the wider context of how they occurred. We feel that understanding how such groups hav… ▽ More

    Submitted 23 January, 2015; originally announced January 2015.

  5. arXiv:1309.6450  [pdf

    cs.CR cs.CY

    The Dragon and the Computer: Why Intellectual Property Theft is Compatible with Chinese Cyber-Warfare Doctrine

    Authors: Paulo Shakarian, Jana Shakarian, Andrew Ruef

    Abstract: Along with the USA and Russia, China is often considered one of the leading cyber-powers in the world. In this excerpt, we explore how Chinese military thought, developed in the 1990s, influenced their cyber-operations in the early 2000s. In particular, we examine the ideas of "Unrestricted Warfare" and "Active Offense" and discuss how they can permit for the theft of intellectual property. We the… ▽ More

    Submitted 25 September, 2013; originally announced September 2013.

    Comments: This is an excerpt from the upcoming book Introduction to Cyber-Warfare: A Multidisciplinary Approach published by Syngress (ISBN: 978-0124078147)