Darkweb Cyber Threat Intelligence Mining through the I2P Protocol
Description
This thesis project focused on malicious hacking community activities accessible through the I2P protocol. We visited 315 distinct I2P sites to identify those with malicious hacking content. We also wrote software to scrape and parse data from relevant I2P sites. The data was integrated into the CySIS databases for further analysis to contribute to the larger CySIS Lab Darkweb Cyber Threat Intelligence Mining research. We found that the I2P cryptonet was slow and had only a small amount of malicious hacking community activity. However, we also found evidence of a growing perception that Tor anonymity could be compromised. This work will contribute to understanding the malicious hacker community as some Tor users, seeking assured anonymity, transition to I2P.
Date Created
The date the item was original created (prior to any relationship with the ASU Digital Repositories.)
2016-12
Agent
- Author (aut): Hutchins, James Keith
- Thesis director: Shakarian, Paulo
- Committee member: Ahn, Gail-Joon
- Contributor (ctb): Computer Science and Engineering Program
- Contributor (ctb): Barrett, The Honors College