Exploring Vulnerabilities: An In-Depth Analysis of Security Weaknesses Leading to Dark Web Exposure and Improved Security Defenses Using Artificial Intelligence (AI) & Machine Learning (ML)
Keywords:
Personal Identifiable Information, Artificial Intelligence, Cybersecurity, Dark Web, CybercrimeSynopsis
This is a Chapter in:
Book:
Competitive Tools, Techniques, and Methods
Print ISBN 978-1-6692-0008-6
Online ISBN 978-1-6692-0007-9
Series:
Chronicle of Computing
Chapter Abstract:
In modern society, demand and value of stolen personally identifiable information (PII) has risen dramatically. A significant portion of this information can be found within the Dark Web. Growing exposure and exchange of PII is largely a resultant of inadequate organizational security measures. This investigation uses Artificial Intelligence (AI) and Machine Learning (ML) to explore the underlying causes of data breach events to examine how adaptation of more robust security strategies can mitigate PII exposure.
Cite this paper as:
Squillace J., Cappella J., Sepp A. (2024) Exploring Vulnerabilities: An In-Depth Analysis of Security Weaknesses Leading to Dark Web Exposure and Improved Security Defenses Using Artificial Intelligence (AI) & Machine Learning (ML).
In: Tiako P.F. (ed) Competitive Tools, Techniques, and Methods. Chronicle of Computing. OkIP. CAIF24#15. https://doi.org/10.55432/978-1-6692-0007-9_5
Presented at:
The 2024 OkIP International Conference on Artificial Intelligence Frontiers (CAIF) in Oklahoma City, Oklahoma, USA, and Online, on April 3, 2024
Contact:
Joseph Squillace
jms10943@psu.edu
References
Eason, G., Noble, B., & Sneddon, N.I. (1995). “On certain integrals of Lipschitz-Hankel type involving products of Bessel functions,” Phil. Trans. Roy. Soc. London, vol. A247, pp. 529–551.
Jacobs, I.S. & Bean, C.P. (1963). “Fine particles, thin films and exchange anisotropy,” Magnetism, vol. III, G. T. Rado and H. Suhl, Eds. New York: Academic, pp. 271–350.
Leave no trace on the computer. Tails. (n.d.-a). https://tails.net/about/index.en.html
Liu, Y., Lin, F. Y., Ahmad-Post, Z., Ebrahimi, M., Zhang, N., Hu, J. L., &
Chen, H. (2020). “Identifying, collecting, and monitoring personally identifiable information: From the dark web to the surface web,” IEEE International Conference on Intelligence and Security Informatics (ISI) (pp. 1-6). IEEE.
Maxwell, C.J. (1892). “A Treatise on Electricity and Magnetism,” 3rd ed., Vol. 2. Oxford: Clarendon, pp.68–73.
Moore, T. (2010). “The economics of cybersecurity: Principles and policy options,” International Journal of Critical Infrastructure Protection, 3(3-4), 103-117.
The Tor Project, Inc. (n.d.). Tor. Retrieved from https://2019.www.torproject.org/about/overview
Thomas, L., Gondal, I., Oseni, T., & Firmin, S. S. (2022). “A framework for data privacy and security accountability in data breach communications,” Computers & Security, 116, 102-157.
Yorozu, Y., Hirano, M., Oka, K., & Tagawa, Y. (1982). “Electron spectroscopy studies on magneto-optical media and plastic substrate interface,” IEEE Transl. J. Magn. Japan, Vol. 2, pp. 740–741, [Digests 9th Annual Conf. Magnetics Japan, p. 301].
Young, M. (1989). “The Technical Writer’s Handbook,” Mill Valley, CA: University Science.