BlackWidow: Monitoring the Dark Web for Cyber Security Information
Title | BlackWidow: Monitoring the Dark Web for Cyber Security Information |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Schäfer, Matthias, Fuchs, Markus, Strohmeier, Martin, Engel, Markus, Liechti, Marc, Lenders, Vincent |
Conference Name | 2019 11th International Conference on Cyber Conflict (CyCon) |
Date Published | May 2019 |
Publisher | IEEE |
ISBN Number | 978-9949-9904-5-0 |
Keywords | BlackWidow, cyber criminals, cyber intelligence, cyber security domain, cyber security information, cyber security intelligence purposes, cybersecurity-related topics, dark web, Dark Web analysis, Dark Web services, Docker-based microservice architecture, fraud, Human Behavior, human factors, illegal services, information collection, information gathering, interactive visual exploration, invasive software, knowledge graph, learning (artificial intelligence), login information, multiple dark Web, open source intelligence, pubcrawl, search engines, security analyst users, web services |
Abstract | The Dark Web, a conglomerate of services hidden from search engines and regular users, is used by cyber criminals to offer all kinds of illegal services and goods. Multiple Dark Web offerings are highly relevant for the cyber security domain in anticipating and preventing attacks, such as information about zero-day exploits, stolen datasets with login information, or botnets available for hire. In this work, we analyze and discuss the challenges related to information gathering in the Dark Web for cyber security intelligence purposes. To facilitate information collection and the analysis of large amounts of unstructured data, we present BlackWidow, a highly automated modular system that monitors Dark Web services and fuses the collected data in a single analytics framework. BlackWidow relies on a Docker-based micro service architecture which permits the combination of both preexisting and customized machine learning tools. BlackWidow represents all extracted data and the corresponding relationships extracted from posts in a large knowledge graph, which is made available to its security analyst users for search and interactive visual exploration. Using BlackWidow, we conduct a study of seven popular services on the Deep and Dark Web across three different languages with almost 100,000 users. Within less than two days of monitoring time, BlackWidow managed to collect years of relevant information in the areas of cyber security and fraud monitoring. We show that BlackWidow can infer relationships between authors and forums and detect trends for cybersecurity-related topics. Finally, we discuss exemplary case studies surrounding leaked data and preparation for malicious activity. |
URL | https://ieeexplore.ieee.org/document/8756845 |
DOI | 10.23919/CYCON.2019.8756845 |
Citation Key | schafer_blackwidow_2019 |
- illegal services
- web services
- security analyst users
- search engines
- pubcrawl
- open source intelligence
- multiple dark Web
- login information
- learning (artificial intelligence)
- knowledge graph
- invasive software
- interactive visual exploration
- information gathering
- information collection
- BlackWidow
- Human Factors
- Human behavior
- fraud
- Docker-based microservice architecture
- Dark Web services
- Dark Web analysis
- dark web
- cybersecurity-related topics
- cyber security intelligence purposes
- cyber security information
- cyber security domain
- cyber intelligence
- cyber criminals