Leveraging Dark Web Intelligence to Strengthen Cyber Defense Mechanisms

Main Article Content

Sudhakar Tiwari
Dr Kamal Kumar Gola

Abstract

The increasing sophistication of cyber threats has made traditional defence systems increasingly ineffective in safeguarding sensitive data. One of the emerging and new research areas in cybersecurity is the application of dark web intelligence to strengthen defence systems. The dark web, a hidden part of the internet, is a breeding ground for cybercrime activities like data breaches, malware propagation, and illegal transaction exchanges. While research has widely studied dark web intelligence in the detection and prevention of cybercrimes, the application of dark web intelligence in proactive defence systems is under-researched. This research aims to fill the gap by investigating the potential of dark web intelligence in strengthening cyber defence systems. In particular, the research will evaluate how real-time data collected from the dark web can be used in threat intelligence, anomaly detection, and early warning systems, thereby significantly improving the capability of an organization to predict and respond to cyber-attacks. Moreover, it will examine the ethical implications and legal aspects of surveillance and the application of dark web information. Through the development of an integrated framework for the application of dark web intelligence in existing cybersecurity frameworks, this research aims to improve the overall effectiveness of cyber defences systems. The findings of this research are expected to offer new perspectives on proactive cybersecurity and assist in the development of more dynamic, real-time defenses that can accommodate the rapidly changing nature of cyber threats.

Article Details

How to Cite
Tiwari, S., & Gola, D. K. K. (2024). Leveraging Dark Web Intelligence to Strengthen Cyber Defense Mechanisms. Journal of Quantum Science and Technology (JQST), 1(1), Feb(104–126). Retrieved from https://jqst.org/index.php/j/article/view/249
Section
Original Research Articles

References

• Adel, A., & Norouzifard, M. (2024). Weaponization of the growing cybercrimes inside the dark net: The question of detection and application. Big Data and Cognitive Computing, 8(8), 91. https://doi.org/10.3390/bdcc8080091

• Bovet, G., Pastor-Galindo, J., Gómez Mármol, F., & Martínez Pérez, G. (2024). A big data architecture for early identification and categorization of dark web sites. arXiv preprint arXiv:2401.13320. https://doi.org/10.48550/arXiv.2401.13320

• De Pascale, D., Cascavilla, G., Tamburri, D. A., & Van Den Heuvel, W.-J. (2024). CRATOR: A dark web crawler. arXiv preprint arXiv:2405.06356. https://doi.org/10.48550/arXiv.2405.06356

• Ebrahimi, M., Zhang, N., Li, W., & Chen, H. (2022). Counteracting dark web text-based CAPTCHA with generative adversarial learning for proactive cyber threat intelligence. arXiv preprint arXiv:2201.02799. https://doi.org/10.48550/arXiv.2201.02799

• Medipelly, S., & Abosata, N. (2024). Detection of dark web threats using machine learning and image processing. arXiv preprint arXiv:2407.00704. https://doi.org/10.48550/arXiv.2407.00704

• Saha, R. (2024). Cybersecurity and the dark web. International Journal of Research Publication and Reviews, 5(3), 2742-2746. https://ijrpr.com/uploads/V5ISSUE3/IJRPR23667.pdf

• Shakarian, P., Nunes, E., Diab, A., Gunn, A., Marin, E., & Mishra, V. (2016). Darknet and deepnet mining for proactive cybersecurity threat intelligence. In 2016 IEEE Conference on Intelligence and Security Informatics (ISI) (pp. 1-6). IEEE. https://doi.org/10.1109/ISI.2016.7580868

• Shakarian, P., Nunes, E., Diab, A., Gunn, A., Marin, E., & Mishra, V. (2017). Darkweb cyber threat intelligence mining. In Darkweb Cyber Threat Intelligence Mining (pp. 1-14). Cambridge University Press. https://doi.org/10.1017/9781316813352.001

• Zhang, N., Ebrahimi, M., Li, W., & Chen, H. (2022). Counteracting dark web text-based CAPTCHA with generative adversarial learning for proactive cyber threat intelligence. arXiv preprint arXiv:2201.02799. https://doi.org/10.48550/arXiv.2201.02799

Similar Articles

<< < 4 5 6 7 8 9 10 11 12 13 > >> 

You may also start an advanced similarity search for this article.