Finding Cryptocurrency Attack Indicators Using Temporal Logic and Darkweb Data

被引:0
|
作者
Almukaynizi, Mohammed [1 ]
Paliath, Vivin [2 ]
Shah, Malay [2 ]
Shah, Malav [2 ]
Shakarian, Paulo [1 ,2 ]
机构
[1] Arizona State Univ, Tempe, AZ 85287 USA
[2] Cyber Reconnaissance Inc, Tempe, AZ USA
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
With the recent prevalence of darkweb/deepweb (D2web) sites specializing in the trade of exploit kits and malware, malicious actors have easy-access to a wide-range of tools that can empower their offensive capability. In this study, we apply concepts from causal reasoning, itemset mining, and logic programming on historical cryptocurrency-related cyber incidents with intelligence collected from over 400 D2web hacker forums. Our goal was to find indicators of cyber threats targeting cryptocurrency traders and exchange platforms from hacker activity. Our approach found interesting activities that, when observed together in the D2web, subsequent cryptocurrency-related incidents are at least twice as likely to occur than they would if no activity was observed. We also present an algorithmic extension to a previously-introduced algorithm called APT-Extract that allows to model new semantic structures that are specific to our application.
引用
收藏
页码:91 / 93
页数:3
相关论文
共 50 条
  • [1] Data streaming architecture for visualizing cryptocurrency temporal data
    Bandi, Ajay
    [J]. Lecture Notes on Data Engineering and Communications Technologies, 2021, 66 : 651 - 661
  • [2] Automatic Construction of Attack Graphs in Cyber Physical Systems Using Temporal Logic
    Moulin, Mark
    Eyisi, Emeka
    Shila, Devu Manikantan
    Zhang, Qinqing
    [J]. 2018 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2018), 2018, : 945 - 950
  • [3] Finding state solutions to temporal logic queries
    Gheorghiu, Mihaela
    Gurfinkel, Arie
    Chechik, Marsha
    [J]. INTEGRATED FORMAL METHODS, PROCEEDINGS, 2007, 4591 : 273 - 292
  • [4] An interval temporal logic-based matching framework for finding occurrences of multi-event attack signatures
    Nowicka, Elzbieta
    Zawada, Marcin
    [J]. COMPUTER NETWORK SECURITY, PROCEEDINGS, 2007, 1 : 272 - +
  • [5] Temporal granular logic for temporal data mining
    Cotofrei, P
    Stoffel, K
    [J]. 2005 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING, VOLS 1 AND 2, 2005, : 417 - 422
  • [6] Insider Attack Detection using Weak Indicators over Network Flow Data
    Pagliari, Roberto
    Ghosh, Abhrajit
    Gottlieb, Yitzchak M.
    Chadha, Ritu
    Vashist, Akshay
    Hadynski, Gregory
    [J]. 2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 1 - 6
  • [7] Finding spatio-temporal patterns in climate data using clustering
    Sap, MNM
    Awan, AM
    [J]. 2005 INTERNATIONAL CONFERENCE ON CYBERWORLDS, PROCEEDINGS, 2005, : 155 - 162
  • [8] Finding temporal patterns by data decomposition
    Minnen, DC
    Wren, CR
    [J]. SIXTH IEEE INTERNATIONAL CONFERENCE ON AUTOMATIC FACE AND GESTURE RECOGNITION, PROCEEDINGS, 2004, : 608 - 613
  • [9] A Decision Tree Approach to Data Classification using Signal Temporal Logic
    Bombara, Giuseppe
    Vasile, Cristian-Ioan
    Penedo, Francisco
    Yasuoka, Hirotoshi
    Belta, Calin
    [J]. HSCC'16: PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON HYBRID SYSTEMS: COMPUTATION AND CONTROL, 2016, : 1 - 10
  • [10] Abnormal Data Classification Using Time-Frequency Temporal Logic
    Luan Viet Nguyen
    Kapinski, James
    Jin, Xiaoqing
    Deshmukh, Jyotirmoy, V
    Butts, Ken
    Johnson, Taylor T.
    [J]. PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON HYBRID SYSTEMS: COMPUTATION AND CONTROL (PART OF CPS WEEK) (HSCC' 17), 2017, : 237 - 242