Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where John Robertson is active.

Publication


Featured researches published by John Robertson.


intelligence and security informatics | 2016

Darknet and deepnet mining for proactive cybersecurity threat intelligence

Eric Nunes; Ahmad Diab; Andrew T. Gunn; Ericsson Marin; Vineet Mishra; Vivin Paliath; John Robertson; Jana Shakarian; Amanda Thart; Paulo Shakarian

In this paper, we present an operational system for cyber threat intelligence gathering from various social platforms on the Internet particularly sites on the darknet and deepnet. We focus our attention to collecting information from hacker forum discussions and marketplaces offering products and services focusing on malicious hacking. We have developed an operational system for obtaining information from these sites for the purposes of identifying emerging cyber threats. Currently, this system collects on average 305 high-quality cyber threat warnings each week. These threat warnings include information on newly developed malware and exploits that have not yet been deployed in a cyber-attack. This provides a significant service to cyber-defenders. The system is significantly augmented through the use of various data mining and machine learning techniques. With the use of machine learning models, we are able to recall 92% of products in marketplaces and 80% of discussions on forums relating to malicious hacking with high precision. We perform preliminary analysis on the data collected, demonstrating its application to aid a security expert for better threat analysis.


Archive | 2017

Automatic Mining of Cyber Intelligence from the Darkweb

John Robertson; Ahmad Diab; Ericsson Marin; Eric Nunes; Vivin Paliath; Jana Shakarian; Paulo Shakarian

Introduction Now that we have a better understanding of the hacker communities present on both the darknet and the clearnet, which were discussed in the previous chapter, we can begin to use data-mining and machine-learning techniques to aggregate and analyze the data from these communities, with a goal of providing valuable cyber threat intelligence. This chapter is an extension of the work in [80]. We present a system for cyber threat intelligence gathering, built on top of the data from communities similar to those presented in Chapter 3. At the time of writing, this system collects, on average, 305 high-quality cyber threat warnings each week. These threat warnings contain information regarding malware and exploits, many of which are newly developed and have not yet been deployed in a cyber-attack. This information can be particularly useful for cyberdefenders. Significantly augmented through the use of various data-mining and machine-learning techniques, this system is able to recall 92% of products in marketplaces and 80% of discussions on forums relating to malicious hacking, as labeled by a security analyst, with high precision. Additionally, we will present a model based on topic modeling used for automatic identification of new hacker forums and exploit marketplaces for data collection. In succeeding sections, we will introduce a machine-learning-based scraping infrastructure to gather such intelligence from these online communities. We will also discuss the challenges associated with constructing such a system and how we addressed them. Figure 4.1 shows the number of detected threats for five weeks and Table 4.1 shows the database statistics at the time of writing, which indicates that only a small fraction of the data collected is hacking related. The vendor and user statistics cited only consider those individuals associated in the discussion or sale of malicious hacking-related material, as identified by the system. Specific contributions of this chapter include: • Description of a system for cyber threat intelligence gathering from various social platforms from the Internet such as deepnet and darknet websites. • The implementation and evaluation of learning models to separate relevant information from noise in the data collected from these online platforms. • A machine-learning approach to aid security experts in the discovery of new relevant deepnet and darknet websites of interest using topic modeling—this reduces the time and cost associated with identifying new deepnet and darknet sites.


Journal of Neurobiology | 1994

Androgen directs sexual differentiation of laryngeal innervation in developing Xenopus laevis

John Robertson; James T. Watson; Darcy B. Kelley


Archive | 2017

Darkweb Cyber Threat Intelligence Mining

John Robertson; Ahmad Diab; Ericsson Marin; Eric Nunes; Vivin Paliath; Jana Shakarian; Paulo Shakarian


national conference on artificial intelligence | 2016

Data driven game theoretic cyber threat mitigation

John Robertson; Vivin Paliath; Jana Shakarian; Amanda Thart; Paulo Shakarian


Archive | 2017

Systems and methods for data driven game theoretic cyber threat mitigation

Paulo Shakarian; John Robertson; Jana Shakarian; Vivin Paliath; Amanda Thart


Archive | 2017

Application: Protecting Industrial Control Systems

John Robertson; Ahmad Diab; Ericsson Marin; Eric Nunes; Vivin Paliath; Jana Shakarian; Paulo Shakarian


Archive | 2017

Moving to Proactive Cyber Threat Intelligence

John Robertson; Ahmad Diab; Ericsson Marin; Eric Nunes; Vivin Paliath; Jana Shakarian; Paulo Shakarian


Archive | 2017

Understanding Darkweb Malicious Hacker Forums

John Robertson; Ahmad Diab; Ericsson Marin; Eric Nunes; Vivin Paliath; Jana Shakarian; Paulo Shakarian


Archive | 2017

Using Game Theory for Threat Intelligence

John Robertson; Ahmad Diab; Ericsson Marin; Eric Nunes; Vivin Paliath; Jana Shakarian; Paulo Shakarian

Collaboration


Dive into the John Robertson's collaboration.

Top Co-Authors

Avatar

Jana Shakarian

Arizona State University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Vivin Paliath

Arizona State University

View shared research outputs
Top Co-Authors

Avatar

Ahmad Diab

Arizona State University

View shared research outputs
Top Co-Authors

Avatar

Eric Nunes

Arizona State University

View shared research outputs
Top Co-Authors

Avatar

Ericsson Marin

Arizona State University

View shared research outputs
Top Co-Authors

Avatar

Amanda Thart

Arizona State University

View shared research outputs
Top Co-Authors

Avatar

Andrew T. Gunn

Arizona State University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

James T. Watson

Case Western Reserve University

View shared research outputs
Researchain Logo
Decentralizing Knowledge