Abstract
Paste sites are largely used for innocent text sharing but they have grown in popularity as venues for criminal operations such as data leaks and publication. This research examines numerous types of sensitive information and the extent to which each can cause damage if compromised. Our proposal intends to develop an efficient scoring scheme for determining the sensitivity of information included within a paste’s body. We designed a scraper to monitor two surface web and two dark web paste sites and extract and score various aspects from the obtained data. The findings indicated that surface web paste sites featured a greater amount of sensitive material than dark web paste sites.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Tundis, A., Ruppert, S., Mühlhäuser, M.: A feature-driven method for automating the assessment of OSINT cyber threat sources. Computers Security 113, 102576 (2022)
Kavallieros, D., Myttas, D., Kermitsis, E., Lissaris, E., Giataganas, G., Darra, E.: Using the dark web. In: Dark Web Investigation, Springer, Cham, pp. 27–48 (2021)
Vahedi, T., Ampel, B., Samtani, S., Chen, H.: Identifying and categorizing malicious content on paste sites: a neural topic modeling approach. In: 2021 IEEE International Conference on Intelligence and Security Informatics (ISI), IEEE, pp. 1–6 (2021)
Guo, Y., Liu, J., Tang, W., Huang, C.: Exsense: Extract sensitive information from unstructured data. Computers & Security 102, 102156 (2021)
Güven, G., Yusuf, E., Boyaci, A., Aydin, M.A.: A novel password policy focusing on altering user password selection habits: a statistical analysis on breached data. Computers & Security 113, 102560 (2022)
Vinayakumar, R., Soman, K.P., Poornachandran, P., Mohan, V.S., Kumar, A.D.: ScaleNet: scalable and hybrid framework for cyber threat situational awareness based on DNS, URL, and email data analysis. J. Cyber Security Mobility 8(2), 189–240 (2019)
Mukundan, P.M., Manayankath, S., Srinivasan, C., Sethumadhavan, M.: Hash-One: a lightweight cryptographic hash function. IET Information Security 10(5), 225–231 (2016)
Bhardwaj, B., Ahmed, S.I., Jaiharie, J., Dadhich, R.S., Ganesan, M.: Web scraping using summarization and Named Entity Recognition (NER). In: 2021 7th International Conference on Advanced Computing and Communication Systems, Vol. 1, pp. 261–265. IEEE (2021)
Faizan, M., Khan, R.A.: Exploring and analyzing the dark Web: A new alchemy. First Monday (2019)
Wagner, A., Wessels, N., Buxmann, P., Krasnova, H.: Putting a price tag on personal information-a literature review. In: Proceedings of the 51st Hawaii International Conference on System Sciences (2018)
Samtani, S., Kantarcioglu, M., Chen, H.: Trailblazing the artificial intelligence for cybersecurity discipline: a multi-disciplinary research roadmap. ACM Trans. Manage. Inf. Syst. (TMIS) 11(4), 1–19 (2020)
Punj, G.N.: Understanding individuals’ intentions to limit online personal information disclosures to protect their privacy: implications for organizations and public policy. Inf. Technol. Manage. 20(3), 139–151 (2018)
Schwartz, P.M., Solove, D.J.: The PII problem: privacy and a new concept of personally identifiable information. NYUL rev. 86, 1814 (2011)
Rothstein, M.A., Tovino, S.A.: California takes the lead on data privacy law. Hastings Cent. Rep. 49(5), 4–5 (2019)
Du, P.Y., Zhang, N., Ebrahimi, M., Samtani, S., Lazarine, B., Arnold, N., Chen, H.: Identifying, collecting, and presenting hacker community data: Forums, IRC, carding shops, and DNMs. In: 2018 IEEE international conference on intelligence and security informatics (ISI), pp. 70–75. IEEE (2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Singh, R., Amritha, P.P., Sethumadhavan, M. (2022). Scoring Scheme to Determine the Sensitive Information Level in Surface Web and Dark Web. In: Singh, M., Tyagi, V., Gupta, P.K., Flusser, J., Ören, T. (eds) Advances in Computing and Data Sciences. ICACDS 2022. Communications in Computer and Information Science, vol 1613. Springer, Cham. https://doi.org/10.1007/978-3-031-12638-3_14
Download citation
DOI: https://doi.org/10.1007/978-3-031-12638-3_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-12637-6
Online ISBN: 978-3-031-12638-3
eBook Packages: Computer ScienceComputer Science (R0)