...
首页> 外文期刊>Computers & Security >Cybercrime threat intelligence: A systematic multi-vocal literature review
【24h】

Cybercrime threat intelligence: A systematic multi-vocal literature review

机译:网络犯罪威胁情报:系统多声音文献综述

获取原文
获取原文并翻译 | 示例
           

摘要

Significant cybersecurity and threat intelligence analysts agree that online criminal activity is increasing exponentially. To offer an overview of the techniques and indicators to perform cyber crime detection by means of more complex machine- and deep-learning investigations as well as similar threat intelligence and engineering activities over multiple analysis levels (i.e., surface, deep, and darknets), we systematically analyze state of the art in such techniques. First, to aid the engineering and management of such intelligence solutions. We provide (ⅰ) a taxonomy of existing methods mapped to (ⅱ) an overview of detectable criminal activities as well as (ⅲ) an overview of the indicators and risk parameters that can be used for such detection. Second, to find the major engineering and management challenges and variables to be addressed. We apply a Topic Modelling Analysis to identify and analyze the most relevant threat concepts both in Surface and in Deep-, Dark-Web. Third, we identify gaps and challenges, defining a roadmap. Practitioners value and conclusions. The analysis mentioned above effectively provided a photograph of the scientific and practice gaps among the Surface Web and the Deep-, Dark-Web cybercrime and threat engineering and management. More specifically, our systematic literature review shows: (ⅰ) the dimensions of risk assessment techniques today available for the aforementioned areas-addressing these is vital for Law-enforcement agencies to combat cybercrime and cyber threats effectively; (ⅱ) what website features should be used in order to identify a cyber threat or attack- researchers and non-governmental organizations in support of Law Enforcement Agencies (LEAs) should cover these features with appropriate technologies to aid in the investigative processes; (ⅲ) what (limited) degree of anonymity is possible when crawling in Deep-, Dark-Web-researchers should strive to fill this gap with more and more advanced degrees of anonymity to grant protection to LEAs during their investigations.
机译:显着的网络安全和威胁情报分析师认为,在线犯罪活动是指数增长的。通过更复杂的机器和深度学习调查以及多种分析级别(即表面,深和暗卷),提供更复杂的机器和深度学习调查以及类似的威胁情报和工程活动来概述网络犯罪检测。我们以这种技术系统地分析了最新的技术。首先,帮助这种智能解决方案的工程和管理。我们提供(Ⅰ)映射到(Ⅱ)概述可检测犯罪活动的概述以及(Ⅲ)可用于此类检测的指标和风险参数概述。其次,找到要解决的主要工程和管理挑战和变量。我们应用一个主题建模分析,以识别和分析表面和深暗网络中最相关的威胁概念。第三,我们识别差距和挑战,定义路线图。从业者的价值和结论。上面提到的分析有效地提供了一张科学和实践间隙之间的照片和深度,深色网络网络犯罪和威胁工程和管理。更具体地说,我们的系统文献综述显示:(Ⅰ)今日风险评估技术的维度可用于上述领域 - 解决这些领域对法律执法机构有效地打击网络犯罪和网络威胁至关重要; (Ⅱ)应使用哪些网站特征,以确定网络威胁或攻击 - 研究人员和非政府组织支持执法机构(租赁)应涵盖这些功能,以援助调查过程; (三)当深度,深网络研究人员爬行时,可能争取持续的匿名程度(有限),应该努力填补这种差距,以越来越先进的匿名度,以在他们的调查期间给予保护。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号