Ericsson Marin
Arizona State University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Ericsson Marin.
intelligence and security informatics | 2016
Eric Nunes; Ahmad Diab; Andrew T. Gunn; Ericsson Marin; Vineet Mishra; Vivin Paliath; John Robertson; Jana Shakarian; Amanda Thart; Paulo Shakarian
In this paper, we present an operational system for cyber threat intelligence gathering from various social platforms on the Internet particularly sites on the darknet and deepnet. We focus our attention to collecting information from hacker forum discussions and marketplaces offering products and services focusing on malicious hacking. We have developed an operational system for obtaining information from these sites for the purposes of identifying emerging cyber threats. Currently, this system collects on average 305 high-quality cyber threat warnings each week. These threat warnings include information on newly developed malware and exploits that have not yet been deployed in a cyber-attack. This provides a significant service to cyber-defenders. The system is significantly augmented through the use of various data mining and machine learning techniques. With the use of machine learning models, we are able to recall 92% of products in marketplaces and 80% of discussions on forums relating to malicious hacking with high precision. We perform preliminary analysis on the data collected, demonstrating its application to aid a security expert for better threat analysis.
intelligence and security informatics | 2016
Ericsson Marin; Ahmad Diab; Paulo Shakarian
Marketplaces specializing in malicious hacking products - including malware and exploits - have recently become more prominent on the darkweb and deepweb. We scrape 17 such sites and collect information about such products in a unified database schema. Using a combination of manual labeling and unsupervised clustering, we examine a corpus of products in order to understand their various categories and how they become specialized with respect to vendor and marketplace. This initial study presents how we effectively employed unsupervised techniques to this data as well as the types of insights we gained on various categories of malicious hacking products.
international conference on social computing | 2017
Ericsson Marin; Ruocheng Guo; Paulo Shakarian
Different measures have been proposed to predict whether individuals will adopt a new behavior in online social networks, given the influence produced by their neighbors. In this paper, we show one can achieve significant improvement over these standard measures, extending them to consider a pair of time constraints. These constraints provide a better proxy for social influence, showing a stronger correlation to the probability of influence as well as the ability to predict influence.
Archive | 2017
John Robertson; Ahmad Diab; Ericsson Marin; Eric Nunes; Vivin Paliath; Jana Shakarian; Paulo Shakarian
Introduction Now that we have a better understanding of the hacker communities present on both the darknet and the clearnet, which were discussed in the previous chapter, we can begin to use data-mining and machine-learning techniques to aggregate and analyze the data from these communities, with a goal of providing valuable cyber threat intelligence. This chapter is an extension of the work in [80]. We present a system for cyber threat intelligence gathering, built on top of the data from communities similar to those presented in Chapter 3. At the time of writing, this system collects, on average, 305 high-quality cyber threat warnings each week. These threat warnings contain information regarding malware and exploits, many of which are newly developed and have not yet been deployed in a cyber-attack. This information can be particularly useful for cyberdefenders. Significantly augmented through the use of various data-mining and machine-learning techniques, this system is able to recall 92% of products in marketplaces and 80% of discussions on forums relating to malicious hacking, as labeled by a security analyst, with high precision. Additionally, we will present a model based on topic modeling used for automatic identification of new hacker forums and exploit marketplaces for data collection. In succeeding sections, we will introduce a machine-learning-based scraping infrastructure to gather such intelligence from these online communities. We will also discuss the challenges associated with constructing such a system and how we addressed them. Figure 4.1 shows the number of detected threats for five weeks and Table 4.1 shows the database statistics at the time of writing, which indicates that only a small fraction of the data collected is hacking related. The vendor and user statistics cited only consider those individuals associated in the discussion or sale of malicious hacking-related material, as identified by the system. Specific contributions of this chapter include: • Description of a system for cyber threat intelligence gathering from various social platforms from the Internet such as deepnet and darknet websites. • The implementation and evaluation of learning models to separate relevant information from noise in the data collected from these online platforms. • A machine-learning approach to aid security experts in the discovery of new relevant deepnet and darknet websites of interest using topic modeling—this reduces the time and cost associated with identifying new deepnet and darknet sites.
Archive | 2017
John Robertson; Ahmad Diab; Ericsson Marin; Eric Nunes; Vivin Paliath; Jana Shakarian; Paulo Shakarian
2018 1st International Conference on Data Intelligence and Security (ICDIS) | 2018
Ericsson Marin; Mohammed Almukaynizi; Eric Nunes; Paulo Shakarian
2018 1st International Conference on Data Intelligence and Security (ICDIS) | 2018
Ericsson Marin; Jana Shakarian; Paulo Shakarian
Archive | 2017
John Robertson; Ahmad Diab; Ericsson Marin; Eric Nunes; Vivin Paliath; Jana Shakarian; Paulo Shakarian
Archive | 2017
John Robertson; Ahmad Diab; Ericsson Marin; Eric Nunes; Vivin Paliath; Jana Shakarian; Paulo Shakarian
Archive | 2017
John Robertson; Ahmad Diab; Ericsson Marin; Eric Nunes; Vivin Paliath; Jana Shakarian; Paulo Shakarian