Description
This thesis project focused on malicious hacking community activities accessible through the I2P protocol. We visited 315 distinct I2P sites to identify those with malicious hacking content. We also wrote software to scrape and parse data from relevant I2P sites. The data was integrated into the CySIS databases for further analysis to contribute to the larger CySIS Lab Darkweb Cyber Threat Intelligence Mining research. We found that the I2P cryptonet was slow and had only a small amount of malicious hacking community activity. However, we also found evidence of a growing perception that Tor anonymity could be compromised. This work will contribute to understanding the malicious hacker community as some Tor users, seeking assured anonymity, transition to I2P.
Download count: 1
Details
Title
- Darkweb Cyber Threat Intelligence Mining through the I2P Protocol
Contributors
- Hutchins, James Keith (Author)
- Shakarian, Paulo (Thesis director)
- Ahn, Gail-Joon (Committee member)
- Computer Science and Engineering Program (Contributor)
- Barrett, The Honors College (Contributor)
Date Created
The date the item was original created (prior to any relationship with the ASU Digital Repositories.)
2016-12
Subjects
Resource Type
Collections this item is in
Note
- Acknowledgements
Thanks to Paulo Shakarian, PhD, for leadership, guidance, and the use of and support of his CySIS lab, Gail-Joon Ahn, PhD, for supporting thesis as Second Committee Member, Jana Shakarian, Asst. Research Tech., for her mentorship and support, Vishnu Radja for assisting with integration to the Lab, and Matthew O’Brien, Barrett, The Honors College Advisor, for support and advice. I am also grateful for the support of Steven Yau, PhD, CIDSE, and the National Science Foundation CyberCorps®: Scholarship for Service (SFS) program.