Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ericsson Marin is active.

Publication


Featured researches published by Ericsson Marin.


intelligence and security informatics | 2016

Darknet and deepnet mining for proactive cybersecurity threat intelligence

Eric Nunes; Ahmad Diab; Andrew T. Gunn; Ericsson Marin; Vineet Mishra; Vivin Paliath; John Robertson; Jana Shakarian; Amanda Thart; Paulo Shakarian

In this paper, we present an operational system for cyber threat intelligence gathering from various social platforms on the Internet particularly sites on the darknet and deepnet. We focus our attention to collecting information from hacker forum discussions and marketplaces offering products and services focusing on malicious hacking. We have developed an operational system for obtaining information from these sites for the purposes of identifying emerging cyber threats. Currently, this system collects on average 305 high-quality cyber threat warnings each week. These threat warnings include information on newly developed malware and exploits that have not yet been deployed in a cyber-attack. This provides a significant service to cyber-defenders. The system is significantly augmented through the use of various data mining and machine learning techniques. With the use of machine learning models, we are able to recall 92% of products in marketplaces and 80% of discussions on forums relating to malicious hacking with high precision. We perform preliminary analysis on the data collected, demonstrating its application to aid a security expert for better threat analysis.


intelligence and security informatics | 2016

Product offerings in malicious hacker markets

Ericsson Marin; Ahmad Diab; Paulo Shakarian

Marketplaces specializing in malicious hacking products - including malware and exploits - have recently become more prominent on the darkweb and deepweb. We scrape 17 such sites and collect information about such products in a unified database schema. Using a combination of manual labeling and unsupervised clustering, we examine a corpus of products in order to understand their various categories and how they become specialized with respect to vendor and marketplace. This initial study presents how we effectively employed unsupervised techniques to this data as well as the types of insights we gained on various categories of malicious hacking products.


international conference on social computing | 2017

Temporal Analysis of Influence to Predict Users’ Adoption in Online Social Networks

Ericsson Marin; Ruocheng Guo; Paulo Shakarian

Different measures have been proposed to predict whether individuals will adopt a new behavior in online social networks, given the influence produced by their neighbors. In this paper, we show one can achieve significant improvement over these standard measures, extending them to consider a pair of time constraints. These constraints provide a better proxy for social influence, showing a stronger correlation to the probability of influence as well as the ability to predict influence.


Archive | 2017

Automatic Mining of Cyber Intelligence from the Darkweb

John Robertson; Ahmad Diab; Ericsson Marin; Eric Nunes; Vivin Paliath; Jana Shakarian; Paulo Shakarian

Introduction Now that we have a better understanding of the hacker communities present on both the darknet and the clearnet, which were discussed in the previous chapter, we can begin to use data-mining and machine-learning techniques to aggregate and analyze the data from these communities, with a goal of providing valuable cyber threat intelligence. This chapter is an extension of the work in [80]. We present a system for cyber threat intelligence gathering, built on top of the data from communities similar to those presented in Chapter 3. At the time of writing, this system collects, on average, 305 high-quality cyber threat warnings each week. These threat warnings contain information regarding malware and exploits, many of which are newly developed and have not yet been deployed in a cyber-attack. This information can be particularly useful for cyberdefenders. Significantly augmented through the use of various data-mining and machine-learning techniques, this system is able to recall 92% of products in marketplaces and 80% of discussions on forums relating to malicious hacking, as labeled by a security analyst, with high precision. Additionally, we will present a model based on topic modeling used for automatic identification of new hacker forums and exploit marketplaces for data collection. In succeeding sections, we will introduce a machine-learning-based scraping infrastructure to gather such intelligence from these online communities. We will also discuss the challenges associated with constructing such a system and how we addressed them. Figure 4.1 shows the number of detected threats for five weeks and Table 4.1 shows the database statistics at the time of writing, which indicates that only a small fraction of the data collected is hacking related. The vendor and user statistics cited only consider those individuals associated in the discussion or sale of malicious hacking-related material, as identified by the system. Specific contributions of this chapter include: • Description of a system for cyber threat intelligence gathering from various social platforms from the Internet such as deepnet and darknet websites. • The implementation and evaluation of learning models to separate relevant information from noise in the data collected from these online platforms. • A machine-learning approach to aid security experts in the discovery of new relevant deepnet and darknet websites of interest using topic modeling—this reduces the time and cost associated with identifying new deepnet and darknet sites.


Archive | 2017

Darkweb Cyber Threat Intelligence Mining

John Robertson; Ahmad Diab; Ericsson Marin; Eric Nunes; Vivin Paliath; Jana Shakarian; Paulo Shakarian


2018 1st International Conference on Data Intelligence and Security (ICDIS) | 2018

Community Finding of Malware and Exploit Vendors on Darkweb Marketplaces

Ericsson Marin; Mohammed Almukaynizi; Eric Nunes; Paulo Shakarian


2018 1st International Conference on Data Intelligence and Security (ICDIS) | 2018

Mining Key-Hackers on Darkweb Forums

Ericsson Marin; Jana Shakarian; Paulo Shakarian


Archive | 2017

Application: Protecting Industrial Control Systems

John Robertson; Ahmad Diab; Ericsson Marin; Eric Nunes; Vivin Paliath; Jana Shakarian; Paulo Shakarian


Archive | 2017

Moving to Proactive Cyber Threat Intelligence

John Robertson; Ahmad Diab; Ericsson Marin; Eric Nunes; Vivin Paliath; Jana Shakarian; Paulo Shakarian


Archive | 2017

Understanding Darkweb Malicious Hacker Forums

John Robertson; Ahmad Diab; Ericsson Marin; Eric Nunes; Vivin Paliath; Jana Shakarian; Paulo Shakarian

Collaboration


Dive into the Ericsson Marin's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ahmad Diab

Arizona State University

View shared research outputs
Top Co-Authors

Avatar

Eric Nunes

Arizona State University

View shared research outputs
Top Co-Authors

Avatar

Jana Shakarian

Arizona State University

View shared research outputs
Top Co-Authors

Avatar

John Robertson

Arizona State University

View shared research outputs
Top Co-Authors

Avatar

Vivin Paliath

Arizona State University

View shared research outputs
Top Co-Authors

Avatar

Amanda Thart

Arizona State University

View shared research outputs
Top Co-Authors

Avatar

Andrew T. Gunn

Arizona State University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ruocheng Guo

Arizona State University

View shared research outputs
Researchain Logo
Decentralizing Knowledge