Skip to content
Register Sign in Wishlist

Darkweb Cyber Threat Intelligence Mining

$69.99 (P)

  • Date Published: April 2017
  • availability: Available
  • format: Hardback
  • isbn: 9781107185777

$ 69.99 (P)

Add to cart Add to wishlist

Other available formats:

Looking for an examination copy?

If you are interested in the title for your course we can consider offering an examination copy. To register your interest please contact providing details of the course you are teaching.

Product filter button
About the Authors
  • The important and rapidly emerging new field known as 'cyber threat intelligence' explores the paradigm that defenders of computer networks gain a better understanding of their adversaries by understanding what assets they have available for an attack. In this book, a team of experts examines a new type of cyber threat intelligence from the heart of the malicious hacking underworld - the dark web. These highly secure sites have allowed anonymous communities of malicious hackers to exchange ideas and techniques, and to buy/sell malware and exploits. Aimed at both cybersecurity practitioners and researchers, this book represents a first step toward a better understanding of malicious hacking communities on the dark web and what to do about them. The authors examine real-world darkweb data through a combination of human and automated techniques to gain insight into these communities, describing both methodology and results.

    • Describes methods for automatically analyzing cyber threat intelligence, providing ideas for practical use by operational cybersecurity professionals
    • Allows for data-driven decision support to cyber-defenders and the modeling of worst-case scenarios
    • Melds cyber security, social science and data mining in an integrative fashion, paving the way for future research
    Read more

    Reviews & endorsements

    'Darkweb Cyber Threat Intelligence Mining represents a tipping point in cyber security. It is a must-read for anyone involved in the modern cyber struggle.' George Cybenko, Dartmouth College, New Hampshire, from the Foreword

    'The book is well written and well structured. The authors provide interesting facts on the darknet economy, its community, and its underling rules, such as trust-based platforms and the related problems of its participants.' Steffen Wendzel, Computing Reviews

    See more reviews

    Customer reviews

    Not yet reviewed

    Be the first to review

    Review was not posted due to profanity


    , create a review

    (If you're not , sign out)

    Please enter the right captcha value
    Please enter a star rating.
    Your review must be a minimum of 12 words.

    How do you rate this item?


    Product details

    • Date Published: April 2017
    • format: Hardback
    • isbn: 9781107185777
    • length: 146 pages
    • dimensions: 235 x 156 x 15 mm
    • weight: 0.38kg
    • availability: Available
  • Table of Contents

    1. Introduction
    2. Moving to proactive cyber threat intelligence
    3. Understanding darkweb malicious hacker forums
    4. Automatic mining of cyber intelligence from the dark web
    5. Analyzing products and vendors in malicious hacking markets
    6. Using game theory for threat intelligence
    7. Application – protecting industrial control systems
    8. Conclusion – the future of darkweb cyber threat intelligence.

  • Authors

    John Robertson, Arizona State University
    John Robertson is a student at Arizona State University pursuing undergraduate degrees in both Computer Science and Electrical Engineering, where his work was nominated for the Computing Research Association's Outstanding Undergraduate Researcher award. He is a recipient of an ARO Undergraduate Research Apprenticeship Program grant as well as two Fulton Undergraduate Research Initiative grants for his work involving the application of artificial intelligence techniques to cyber-security problems in the Cyber-Socio Intelligent System Laboratory with Dr Paulo Shakarian. Robertson also has industry experience as a software engineering intern with Microsoft on the Windows Core Development team.

    Ahmad Diab, Arizona State University
    Ahmad Diab is a Computer Engineering Ph.D. student at Arizona State University. His current work in the Cyber-Socio Intelligent System Laboratory focuses on the application of AI techniques to cyber-security problems. Diab is a recipient of the SIPGA award from ASTAR agency, Singapore. Previously, he was a Java developer at EtQ compliance Company. He holds a B.Sc. in computer engineering from Jordan University of Science and Technology.

    Ericsson Marin, Arizona State University
    Ericsson Marin is a Computer Science Ph.D. student at Arizona State University. He works at the Cyber-Socio Intelligent System Laboratory under the guidance of Dr Paulo Shakarian, with research projects in the intersection of Social Network Analysis, AI and Cyber-Security. He received his M.Sc. in Computer Science from the Federal University of Goias, Brazil and has published numerous papers in the area of social network analysis. He also has real-world experience as a software designer managing different software factories. In 2015, Marin was awarded with a Brazilian Science without Borders scholarship to pursue his Ph.D.

    Eric Nunes, Arizona State University
    Eric Nunes is a Ph.D. student in the computer engineering program at Arizona State University. His research focuses on the intelligence techniques to cyber security problems. Previously, he was a Research Associate at the Brain Engineering Lab at Dartmouth College, New Hampshire. Nunes holds an M.Sc. in Electrical Engineering from Syracuse University, New York.

    Vivin Paliath, Arizona State University
    Vivin Paliath is a Computer Science Ph.D. student at Arizona State University. His research at ASU focuses on the application of artificial intelligence and game-theoretic techniques to cyber-security problems. Paliath received both his B.Sc. in Computer Engineering and M.Sc. in Computer Science from Arizona State University. He has over a decade of industry experience and is also currently working as a Senior Software Engineer at Infusionsoft, a company that develops marketing-automation software for small businesses.

    Jana Shakarian, Arizona State University

    Paulo Shakarian, Arizona State University

Sorry, this resource is locked

Please register or sign in to request access. If you are having problems accessing these resources please email

Register Sign in
Please note that this file is password protected. You will be asked to input your password on the next screen.

» Proceed

You are now leaving the Cambridge University Press website. Your eBook purchase and download will be completed by our partner Please see the permission section of the catalogue page for details of the print & copy limits on our eBooks.

Continue ×

Continue ×

Continue ×
warning icon

Turn stock notifications on?

You must be signed in to your Cambridge account to turn product stock notifications on or off.

Sign in Create a Cambridge account arrow icon

Find content that relates to you

Join us online

This site uses cookies to improve your experience. Read more Close

Are you sure you want to delete your account?

This cannot be undone.


Thank you for your feedback which will help us improve our service.

If you requested a response, we will make sure to get back to you shortly.

Please fill in the required fields in your feedback submission.