Abstract

This paper discusses a case study project in cybersecurity on the Dark Web that uses quantitative data science research methods and techniques. Beginning with a comparative analysis of dark web forum data sets using data science techniques and then adding an experimental research design that includes machine learning techniques and strategies for training and development of a model.

After the gap analysis was identified from an extensive literature review, the authors suggest that it is possible to try to extend or modify these algorithms or the applied techniques. This hybrid experimental research methodology will lead to a proposal on mitigating risks via a model for real-time detection, evaluation, and response by cybersecurity professionals.
Original languageEnglish
Title of host publicationProceedings of the ICR’22 International Conference on Innovations in Computing Research
EditorsK Daimi, A Al Sadoon
Place of PublicationCham, Switzerland
PublisherSpringer
Pages346-355
Number of pages10
Volume1431
ISBN (Electronic)9783031140549
ISBN (Print)9783031140532
DOIs
Publication statusPublished - Nov 2022
Event2022 International Conference on Innovations in Computing Research: ICR'22 - Novotel Hotel, Athens, Greece
Duration: 29 Aug 202231 Aug 2022
https://iicser.org/icr22/ (Conference website)
https://link.springer.com/book/10.1007/978-3-031-14054-9 (Proceedings)

Conference

Conference2022 International Conference on Innovations in Computing Research
Country/TerritoryGreece
CityAthens
Period29/08/2231/08/22
OtherThe 2022 International Conference on Innovations in Computing Research (ICR’22) will be composed of research paper presentations, keynote speeches, panels, special sessions, workshops and tutorials. All accepted and registered papers will be published in the conference Proceedings and indexed. The Proceedings will be published by Springer book series: Advances in Intelligent Systems and Computing, and indexed by DBLP, INSPEC, WTI Frankfurt eG, zbMATH, and Japanese Science and Technology Agency (JST).
Internet address

Fingerprint

Dive into the research topics of 'Real-time detection of TOR attacks from the Dark Web'. Together they form a unique fingerprint.

Cite this