134946-Thumbnail Image.png
Description

This thesis project focused on malicious hacking community activities accessible through the I2P protocol. We visited 315 distinct I2P sites to identify those with malicious hacking content. We also wrote

This thesis project focused on malicious hacking community activities accessible through the I2P protocol. We visited 315 distinct I2P sites to identify those with malicious hacking content. We also wrote software to scrape and parse data from relevant I2P sites. The data was integrated into the CySIS databases for further analysis to contribute to the larger CySIS Lab Darkweb Cyber Threat Intelligence Mining research. We found that the I2P cryptonet was slow and had only a small amount of malicious hacking community activity.

431.56 KB application/pdf

Download restricted. Please sign in.

Download count: 0

Details

Contributors
Date Created
  • 2016-12
Resource Type
  • Text
  • Note
    • Acknowledgements Thanks to Paulo Shakarian, PhD, for leadership, guidance, and the use of and support of his CySIS lab, Gail-Joon Ahn, PhD, for supporting thesis as Second Committee Member, Jana Shakarian, Asst. Research Tech., for her mentorship and support, Vishnu Radja for assisting with integration to the Lab, and Matthew O’Brien, Barrett, The Honors College Advisor, for support and advice. I am also grateful for the support of Steven Yau, PhD, CIDSE, and the National Science Foundation CyberCorps®: Scholarship for Service (SFS) program.

    Machine-readable links