Exploring Vulnerabilities: An In-Depth Analysis of Security Weaknesses Leading to Dark Web Exposure and Improved Security Defenses Using Artificial Intelligence (AI) & Machine Learning (ML)

Authors

Joseph Squillace
Penn State University
Justice Cappella
Penn State University
Andrew Sepp
Penn State University

Keywords:

Personal Identifiable Information, Artificial Intelligence, Cybersecurity, Dark Web, Cybercrime

Synopsis

This is a Chapter in:

Book:
Competitive Tools, Techniques, and Methods

Print ISBN 978-1-6692-0008-6
Online ISBN 978-1-6692-0007-9

 

Series:
Chronicle of Computing

Chapter Abstract:

In modern society, demand and value of stolen personally identifiable information (PII) has risen dramatically. A significant portion of this information can be found within the Dark Web. Growing exposure and exchange of PII is largely a resultant of inadequate organizational security measures. This investigation uses Artificial Intelligence (AI) and Machine Learning (ML) to explore the underlying causes of data breach events to examine how adaptation of more robust security strategies can mitigate PII exposure.

Cite this paper as:

Squillace J., Cappella J., Sepp A. (2024) Exploring Vulnerabilities: An In-Depth Analysis of Security Weaknesses Leading to Dark Web Exposure and Improved Security Defenses Using Artificial Intelligence (AI) & Machine Learning (ML).
In: Tiako P.F. (ed) Competitive Tools, Techniques, and Methods. Chronicle of Computing. OkIP. CAIF24#15. https://doi.org/10.55432/978-1-6692-0007-9_5


Presented at:
The 2024 OkIP International Conference on Artificial Intelligence Frontiers (CAIF) in Oklahoma City, Oklahoma, USA, and Online, on April 3, 2024

Contact:

Joseph Squillace
jms10943@psu.edu

References

Eason, G., Noble, B., & Sneddon, N.I. (1995). “On certain integrals of Lipschitz-Hankel type involving products of Bessel functions,” Phil. Trans. Roy. Soc. London, vol. A247, pp. 529–551.

Jacobs, I.S. & Bean, C.P. (1963). “Fine particles, thin films and exchange anisotropy,” Magnetism, vol. III, G. T. Rado and H. Suhl, Eds. New York: Academic, pp. 271–350.

Leave no trace on the computer. Tails. (n.d.-a). https://tails.net/about/index.en.html

Liu, Y., Lin, F. Y., Ahmad-Post, Z., Ebrahimi, M., Zhang, N., Hu, J. L., &

Chen, H. (2020). “Identifying, collecting, and monitoring personally identifiable information: From the dark web to the surface web,” IEEE International Conference on Intelligence and Security Informatics (ISI) (pp. 1-6). IEEE.

Maxwell, C.J. (1892). “A Treatise on Electricity and Magnetism,” 3rd ed., Vol. 2. Oxford: Clarendon, pp.68–73.

Moore, T. (2010). “The economics of cybersecurity: Principles and policy options,” International Journal of Critical Infrastructure Protection, 3(3-4), 103-117.

The Tor Project, Inc. (n.d.). Tor. Retrieved from https://2019.www.torproject.org/about/overview

Thomas, L., Gondal, I., Oseni, T., & Firmin, S. S. (2022). “A framework for data privacy and security accountability in data breach communications,” Computers & Security, 116, 102-157.

Yorozu, Y., Hirano, M., Oka, K., & Tagawa, Y. (1982). “Electron spectroscopy studies on magneto-optical media and plastic substrate interface,” IEEE Transl. J. Magn. Japan, Vol. 2, pp. 740–741, [Digests 9th Annual Conf. Magnetics Japan, p. 301].

Young, M. (1989). “The Technical Writer’s Handbook,” Mill Valley, CA: University Science.

Exploring Vulnerabilities: An In-Depth Analysis of Security Weaknesses Leading to Dark Web Exposure and Improved Security Defenses Using Artificial Intelligence (AI) & Machine Learning (ML)

Published

August 21, 2024

Online ISSN

2831-350X

Print ISSN

2831-3496