Finding Cryptocurrency Attack Indicators Using Temporal Logic and Darkweb Data

被引:0
|
作者
Almukaynizi, Mohammed [1 ]
Paliath, Vivin [2 ]
Shah, Malay [2 ]
Shah, Malav [2 ]
Shakarian, Paulo [1 ,2 ]
机构
[1] Arizona State Univ, Tempe, AZ 85287 USA
[2] Cyber Reconnaissance Inc, Tempe, AZ USA
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
With the recent prevalence of darkweb/deepweb (D2web) sites specializing in the trade of exploit kits and malware, malicious actors have easy-access to a wide-range of tools that can empower their offensive capability. In this study, we apply concepts from causal reasoning, itemset mining, and logic programming on historical cryptocurrency-related cyber incidents with intelligence collected from over 400 D2web hacker forums. Our goal was to find indicators of cyber threats targeting cryptocurrency traders and exchange platforms from hacker activity. Our approach found interesting activities that, when observed together in the D2web, subsequent cryptocurrency-related incidents are at least twice as likely to occur than they would if no activity was observed. We also present an algorithmic extension to a previously-introduced algorithm called APT-Extract that allows to model new semantic structures that are specific to our application.
引用
收藏
页码:91 / 93
页数:3
相关论文
共 50 条
  • [31] LDES: detector design for version number attack detection using linear temporal logic based on discrete event system
    Abhay Deep Seth
    Santosh Biswas
    Amit Kumar Dhar
    [J]. International Journal of Information Security, 2023, 22 : 961 - 985
  • [32] LDES: detector design for version number attack detection using linear temporal logic based on discrete event system
    Seth, Abhay Deep
    Biswas, Santosh
    Dhar, Amit Kumar
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (04) : 961 - 985
  • [33] TEMPORAL EVOLUTION OF MORTALITY INDICATORS: APPLICATION TO SPANISH DATA
    Debon, A.
    Martinez-Ruiz, F.
    Montes, F.
    [J]. NORTH AMERICAN ACTUARIAL JOURNAL, 2012, 16 (03) : 364 - 377
  • [34] Finding and using government data
    不详
    [J]. ADHESIVES AGE, 2003, 46 (04): : 35 - 35
  • [35] Profiling Darkweb Child Sexual Exploitation Material Forum Members Using Longitudinal Posting History Data
    van der Bruggen, Madeleine
    Blokland, Arjan
    [J]. SOCIAL SCIENCE COMPUTER REVIEW, 2022, 40 (04) : 865 - 891
  • [36] On the analysis of numerical data time series in temporal logic
    Fages, Francois
    Rizk, Aurelien
    [J]. COMPUTATIONAL METHODS IN SYSTEMS BIOLOGY, PROCEEDINGS, 2007, 4695 : 48 - +
  • [37] Finding attack strategies for predator swarms using genetic algorithms
    Leigh, RE
    Morelli, T
    Louis, SJ
    Nicolescu, M
    Miles, C
    [J]. 2005 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1-3, PROCEEDINGS, 2005, : 2422 - 2428
  • [38] LOGIC DESIGN ASSISTANCE USING TEMPORAL LOGIC BASED LANGUAGE TOKIO
    NAKAMURA, H
    NAKAI, M
    KONO, S
    FUJITA, M
    TANAKA, H
    [J]. LECTURE NOTES IN ARTIFICIAL INTELLIGENCE, 1991, 485 : 174 - 183
  • [39] AID TO HIERARCHICAL AND STRUCTURED LOGIC DESIGN USING TEMPORAL LOGIC AND PROLOG
    FUJITA, M
    KONO, S
    TANAKA, H
    MOTOOKA, T
    [J]. IEE PROCEEDINGS-E COMPUTERS AND DIGITAL TECHNIQUES, 1986, 133 (05): : 283 - 294
  • [40] Using temporal logic for spatial reasoning: Spatial Propositional Neighborhood Logic
    Morales, Antonio
    Sciavicco, Guido
    [J]. TIME 2006: THIRTEENTH INTERNATIONAL SYMPOSIUM ON TEMPORAL REPRESENTATION AND REASONING, PROCEEDINGS, 2006, : 50 - +