134946-Thumbnail Image.png
Description
This thesis project focused on malicious hacking community activities accessible through the I2P protocol. We visited 315 distinct I2P sites to identify those with malicious hacking content. We also wrote software to scrape and parse data from relevant I2P sites.

This thesis project focused on malicious hacking community activities accessible through the I2P protocol. We visited 315 distinct I2P sites to identify those with malicious hacking content. We also wrote software to scrape and parse data from relevant I2P sites. The data was integrated into the CySIS databases for further analysis to contribute to the larger CySIS Lab Darkweb Cyber Threat Intelligence Mining research. We found that the I2P cryptonet was slow and had only a small amount of malicious hacking community activity. However, we also found evidence of a growing perception that Tor anonymity could be compromised. This work will contribute to understanding the malicious hacker community as some Tor users, seeking assured anonymity, transition to I2P.
431.56 KB application/pdf

Download restricted. Please sign in.
Restrictions Statement

Barrett Honors College theses and creative projects are restricted to ASU community members.

Details

Title
  • Darkweb Cyber Threat Intelligence Mining through the I2P Protocol
Contributors
Date Created
2016-12
Resource Type
  • Text
  • Note
    • Acknowledgements Thanks to Paulo Shakarian, PhD, for leadership, guidance, and the use of and support of his CySIS lab, Gail-Joon Ahn, PhD, for supporting thesis as Second Committee Member, Jana Shakarian, Asst. Research Tech., for her mentorship and support, Vishnu Radja for assisting with integration to the Lab, and Matthew O’Brien, Barrett, The Honors College Advisor, for support and advice. I am also grateful for the support of Steven Yau, PhD, CIDSE, and the National Science Foundation CyberCorps®: Scholarship for Service (SFS) program.

    Machine-readable links