Please use this identifier to cite or link to this item:
https://repositorio.ufu.br/handle/123456789/44118
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.creator | Reis, Anna Letycia Fernandes | - |
dc.date.accessioned | 2024-12-04T11:49:39Z | - |
dc.date.available | 2024-12-04T11:49:39Z | - |
dc.date.issued | 2024-11-18 | - |
dc.identifier.citation | REIS, Anna Letycia Fernandes. Análise de posts maliciosos na Dark Web usando aprendizado de máquina não supervisionado. 2024. 44 f. Trabalho de Conclusão de Curso ( Graduação em Sistemas de Informação) – Universidade Federal de Uberlândia, Uberlândia, 2024. | pt_BR |
dc.identifier.uri | https://repositorio.ufu.br/handle/123456789/44118 | - |
dc.description.abstract | This work presents an analysis of malicious posts extracted from Dark Web forums using unsupervised learning techniques, aiming to identify the predominant themes associated with cyber threats. A methodology was employed based on clustering algorithms, such as K-means, DBSCAN, and KNN, in addition to applying Latent Dirichlet Allocation (LDA) to identify latent thematic patterns. The results demonstrated that the K-means algorithm excelled in structuring the data into three main clusters, identifying predominant themes such as data security, search for sensitive information, and hacking communities. This approach enabled the labeling and interpretation of content based on observed patterns, contributing to the understanding of cybercriminals’ tactics and intentions. For future work, it is suggested to expand the dataset to include environments such as the Deep Web, Surface Web, and social networks, as well as to incorporate advanced deep learning algorithms and real-time monitoring tools, aiming for continuous improvement in threat detection and categorization. | pt_BR |
dc.language | por | pt_BR |
dc.publisher | Universidade Federal de Uberlândia | pt_BR |
dc.rights | Acesso Aberto | pt_BR |
dc.subject | Dark Web, Aprendizado não supervisionado, K-means, LDA, Segurança cibernética, Análise de posts maliciosos | pt_BR |
dc.subject | Dark Web, Unsupervised learning, K-means, LDA, Cybersecurity, Malicious post analysis. | pt_BR |
dc.title | Análise de posts maliciosos na Dark Web usando aprendizado de máquina não supervisionado | pt_BR |
dc.title.alternative | Analysis of malicious posts on the Dark Web using unsupervised machine learning | pt_BR |
dc.type | Trabalho de Conclusão de Curso | pt_BR |
dc.contributor.advisor1 | Miani, Rodrigo Sanches | - |
dc.contributor.advisor1Lattes | http://buscatextual.cnpq.br/buscatextual/visualizacv.do?id=K4299824Z3&tokenCaptchar=03AFcWeA4Bx99zvFCdwNuI2S-3kfXDVht7_TQO9XgV5TFn-k-bN4Usgi2PJ92iAI71If3XlSXF--zrzldrndAMW5MbSZrO55sikE61YXSksSnHcIuNWZ5IJeABKauFAo0LOyUsO9Wm3Ada0rdQezMn1PWR1EKPOq08eJwYkdRfBJWnTCgi0OgoQnF0epBAYaB8i-iEaFTaZiwcXmxrCjEqHjZ63zH-y5eN3ajHEWH6MU5QtRqM_yzn2mLf-YkZ13alvf1t0WYq1I1ortIiUa1lLZLcrLjbw0GAXCM1X2JZh3KwsSzgn-SwuI3bs5LZPMh7kzO3UFwUeibrtoXYmIT9QUBNVBRSjTBVOsfadBwrb9O1gaI8wOBTJG__jUJIN0z82J47qi5VvkLbcqP4e-N9W45QGZDUc6Y7xDtf-cazHsAe2xSSBd_DttqmSezoaskcCSvMACCNG7z7SAA1SFJnspi92Mso9oYeapFsD8gKMSRDwTiWJb75FgeJulaKMU8IPA8LZh0DYpUhqQbhmeSw8PWIJrd0XMCs7yOe80iwJBXLSEEO2DxBVXH6VIWhbxR16XcVYIKGgVtMShblDF7c8E6Q4C9FaoLd5tJaZcuk5ucy_0uPxOd29WiIypdBRo3mocw9C44Xcih7Mn-kh3E2rT_NZ6LXsQj0qazMYd6PF7b3LTz6j8oLy2emck0XsWUxc0OneYkyaPwEtKtWbEkpl8zMb6FVoAQP6mQjqYjVuEgXoU4YNH-RlsxsS7MkY-cF5bWiinz5Z2sIGMWZqc8g7I1rJI1UG36H4A3iP2Fnq_4-Fe_KBfN6PSdg9bGb5dzQnzAHCBwPVmMSWr9wpnfHXVbvUl4ZFx0fgqXKi2ZNzCw_GuUlVKVCQYTp4ly9CagnPmAihhlkJlJANSKBJWztq0SpnW4vWGfsQw9RQqjNYw3N4liH-et3KBs | pt_BR |
dc.contributor.referee1 | Gabriel, Paulo Henrique Ribeiro | - |
dc.contributor.referee1Lattes | http://buscatextual.cnpq.br/buscatextual/visualizacv.do?id=K4164477D2&tokenCaptchar=03AFcWeA4rwGqQZFpm7cAm1LxRPggC5yY9pG87zi1tAs0Hg3DdPbGh37_1NuKy5AIkXr4UahKk0SvHzZqs76Ubfl5NdjXZNJwo1oABzsW-zrjIHD-N1edk3kOL4oPU7NETqP2VDxM6Jhmtt6Bvf_rboVdRmOgAXZHaZJSOuTTawvP0Mj5qdx5yBu_VjWekMVyCsIxvz7bFDE5E0M6OIu_WBgfMffAraPMPKIGQjtlA2QcxctNuXcaemSMs_qAw60IvLGe7pUSUNzxAXXmhSpJ9OEzsBmz_2TUN-_ldYQpXhkfFjuu1JpValZLZfdZPtNZ9OBQLdIByfpH_DBAupcTuW7FfcikUnadUl28RhYtFZ0t2tbW3EwDwiCg4SNLX-wGU62dOe-1CusCh2hCHkKQgzixSw2Jzj-1zOia95VBNMEqmxfW68UMIiRh1VcEwgBTwCXDM3TjcGdBS3GuAPQ1o5nH_5QW3eG961RneYEv90wL24FUMzhnF5CrzwHhoTm0Pq7zrhr8heW6a7stLt6P0qkQ1ZYiAYfY83SFNYVB00zL5zSXq-KexYlbbGvAIUPVxAngHzjdB932TiQorLsUUDgw4caERMSfIN6hBOPhQ-RExmA08tNqvPa8-vHZlRYSMNkpyhck5xN5zVhcIbYMSErjJSKqpuA_Z9D2ay5DXNOdgLTPMhV2hwFwpUXBt2TcfrPXigqHpKwrPuXAdAQpTQ8EMHVtBc4r82mRk2Zv-GG3iX1bRGHGsjvBrHlkFLD6lmtHdZ6cpk2wu3qO7LelX4tSs3hq0lxLlqmnRJLUDhf6pIxW-6gsU6P9b3lkfxg_HLFlCB-AGPQdqIv0erRVgkJnXz72H9OEkpTWMUKcnzRpZpQjpRcWFWsTSJIJUsiahY1jGrZC1eHOjPMeUcXYWGpZHVQUXWJt4l5_q0ilFnihH3Kfp8uq-FCE | pt_BR |
dc.contributor.referee2 | Travençolo, Bruno Augusto Nassif | - |
dc.contributor.referee2Lattes | http://buscatextual.cnpq.br/buscatextual/visualizacv.do?id=K4734646P3&tokenCaptchar=03AFcWeA4sT46a5nMaVVeoF2TOttngXOmDk2cLOvbCVBzvIqI18tHBiZzywdHcTvhjX7n0JaUFYagE6aKkdi9jwr5dgO31oY0X72lauIhiPHyRbaf0WHYFxjtqVInUimfqM2Zys1-WoUOCgzckUrf7J3QneGWIXPpAnekP_BL_OS4HtTmkuLh7FNXwXSx6M0KliUESLHfvd-ZsV4khj6DMjkV8w7MT6VhWUkL03KSTd7YITxmq6AO53m0KQYvXxQQaDTrx7-9wwFDoLFwFZlsfEgZfbhO2OBB-qqJSb30OU_PplZw64ZuHriVmhcnef8u6KA6fLk9l24wIAOTZJxY2EfEmcm6LC1oDcrT-TmhAYNUCSKMe-1jqbah8aHTKbSDluJIiuVROiGLh51eA0oMHYTTjFG3cjBOPk5wW15v1XElMfILiHUSQu4fU2_kwVVuZhvwJ0ASuIGFA5Gz2nEKqrJTP37Bdh_7xQcrZGuu8y8y-hqF1f6Q_HNR4mls-SRwKspuVhWOXh3562zDPBVX6ZuInC2qUPvlufxIHotxgpm0mmLrSGGTePDrhYrmewZItCpMEGL3Y9gPUNoGpQBVT2SqVxz8yTY-rGB9Rkco_CoI2pSLaFOtRZspCWoLD8cScmk2j7xY86AwAUKzw7omlWERuQJcwBVhhcklr35o_wDuLmSZTjbK682rN6nUXhvEDSkqrHkc2Y848VWL46CSwZc4XNfkWI9nVlW7NOmk-m4l2oiDL55zo37XYxw8o7DtYgCHzm6jQPvf7vDUTK5fsKCNzp2mcLXq-8SmD8pKelpJJ-Sy-un4sCX4vMaZvo9Z6XidEo9P26VpQ-jolyv46SN3O8Q9yTyEPPcpGHB41NG1ljfxhV4iX4yqyUrrDTcrKr9ZcjSYOFwbj16SoeVsficGYPv_4EBI6ZcNWK0OJBjOzRsseyWjMqr0 | pt_BR |
dc.creator.Lattes | http://buscatextual.cnpq.br/buscatextual/visualizacv.do?id=K1793656H9&tokenCaptchar=03AFcWeA6FfsUadkkpI1YX9txLtesq9ev54dypznj9wAb3Tas82x-eFSuX-Z_QY3FhlosHq4nLN0yQI6QSAd34B6M_bedGFJ69iDWbwCtVmKnAjqD8QvKY8t8n44xz0uq0qtABuZXsmLAIDPTQ3GyIUi3MNShAFceWyucR-GHDrwdkdN0KzESQ9a4VCrWaLhKOGIydBWwgO2i6tmDbbIs7qfm96VzaReJsmVT1BQtnQ2U42Br1sNybfOmYcy2Kxx24TuzEFoSf1CtPP14Aj8ZvifskSECrlzpW8iGIJr5DkfICBXNdvsts7AUNZuMaadl7ojYzw_19eer6qX6KEvPiepfun-i-TNy-VrowQjdLAm5JYhbQSGRtOwyc-qIXgfaV-5o8ugyatASsPoS-8hI-rbI3tZ_wE75UNIUVm9y-dm_c9F8YuLdV-evVUwKnH9bzT5vbKbUXBf39wHVIzFMpGyrfT-Bh6VB6fgq02b3A1mty82apFMbQhoo5zuIbfB3qPpTJiDALeYiw8N6YuJNHoo2b-aXYLclIiJpdimMZQSYUsAKEXQk-N7I-z7wEjhY9MqEKL9g9Q9MkIsAqc5O3DhJF-DjfADHHDDdDtLtwTsbPcPxv-n3cwx0n7TkDTTcgEfwOyT3IQ8R4zTYkHFu0EY1LxJx6s5YP4h9DQzpRNQWlEMh1L7DItdjfqzxZLxIuSCBqEGr_y0YPdsN3iRBsEwnCmFrDtxNKXEWRTFCIcjcaBgbfsLExG6qjvydeD3Lk6F_HLT48gz-QxWvGtlp2eCf33gky0FILoP3uuIAOnTF1_TP7eLU6PouphRAzqlkSIdxQX3aWZx6V-rQjeUx1Wqa1YSi0pPAH2eykKpY2CF5qc_mPecNypH74y1tmUUSXaoCZflhxOrUNSedHGFlNHeDeuG2Es9auGo-Y-XHat0iO0f6jXAD7KvY | pt_BR |
dc.description.degreename | Trabalho de Conclusão de Curso (Graduação) | pt_BR |
dc.description.resumo | Este trabalho apresenta uma análise de posts maliciosos extraídos de fóruns da Dark Web por meio de técnicas de aprendizado não supervisionado, com o objetivo de identificar as temáticas predominantes associadas a ameaças cibernéticas. Para isso, foi empregada uma metodologia baseada em algoritmos de agrupamento, como K-means, DBSCAN e KNN, além da aplicação da Análise de Tópicos Latentes (LDA) para identificar padrões temáticos latentes. Os resultados demonstraram que o algoritmo K-means se destacou ao estruturar os dados em três clusters principais, identificando temas predominantes como segurança de dados, busca por informações sensíveis e comunidades de hacking. Essa abordagem possibilitou a rotulagem e interpretação dos conteúdos com base nos padrões observados, contribuindo para a compreensão das táticas e intenções dos cibercriminosos. Como perspectivas futuras, sugere-se ampliar a base de dados para incluir ambientes como a Deep Web, Surface Web e redes sociais, além de incorporar algoritmos avançados de aprendizado profundo e ferramentas de monitoramento em tempo real, visando um aprimoramento contínuo na detecção e categorização de ameaças. | pt_BR |
dc.publisher.country | Brasil | pt_BR |
dc.publisher.course | Sistemas de Informação | pt_BR |
dc.sizeorduration | 44 | pt_BR |
dc.subject.cnpq | CNPQ::CIENCIAS EXATAS E DA TERRA::CIENCIA DA COMPUTACAO::SISTEMAS DE COMPUTACAO | pt_BR |
dc.orcid.putcode | 173150093 | - |
Appears in Collections: | TCC - Sistemas de Informação (Uberlândia) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
AnalisePostsMaliciosos.pdf | TCC | 935.58 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.