Please use this identifier to cite or link to this item: https://repositorio.ufu.br/handle/123456789/44118
Full metadata record
DC FieldValueLanguage
dc.creatorReis, Anna Letycia Fernandes-
dc.date.accessioned2024-12-04T11:49:39Z-
dc.date.available2024-12-04T11:49:39Z-
dc.date.issued2024-11-18-
dc.identifier.citationREIS, Anna Letycia Fernandes. Análise de posts maliciosos na Dark Web usando aprendizado de máquina não supervisionado. 2024. 44 f. Trabalho de Conclusão de Curso ( Graduação em Sistemas de Informação) – Universidade Federal de Uberlândia, Uberlândia, 2024.pt_BR
dc.identifier.urihttps://repositorio.ufu.br/handle/123456789/44118-
dc.description.abstractThis work presents an analysis of malicious posts extracted from Dark Web forums using unsupervised learning techniques, aiming to identify the predominant themes associated with cyber threats. A methodology was employed based on clustering algorithms, such as K-means, DBSCAN, and KNN, in addition to applying Latent Dirichlet Allocation (LDA) to identify latent thematic patterns. The results demonstrated that the K-means algorithm excelled in structuring the data into three main clusters, identifying predominant themes such as data security, search for sensitive information, and hacking communities. This approach enabled the labeling and interpretation of content based on observed patterns, contributing to the understanding of cybercriminals’ tactics and intentions. For future work, it is suggested to expand the dataset to include environments such as the Deep Web, Surface Web, and social networks, as well as to incorporate advanced deep learning algorithms and real-time monitoring tools, aiming for continuous improvement in threat detection and categorization.pt_BR
dc.languageporpt_BR
dc.publisherUniversidade Federal de Uberlândiapt_BR
dc.rightsAcesso Abertopt_BR
dc.subjectDark Web, Aprendizado não supervisionado, K-means, LDA, Segurança cibernética, Análise de posts maliciosospt_BR
dc.subjectDark Web, Unsupervised learning, K-means, LDA, Cybersecurity, Malicious post analysis.pt_BR
dc.titleAnálise de posts maliciosos na Dark Web usando aprendizado de máquina não supervisionadopt_BR
dc.title.alternativeAnalysis of malicious posts on the Dark Web using unsupervised machine learningpt_BR
dc.typeTrabalho de Conclusão de Cursopt_BR
dc.contributor.advisor1Miani, Rodrigo Sanches-
dc.contributor.advisor1Latteshttp://buscatextual.cnpq.br/buscatextual/visualizacv.do?id=K4299824Z3&tokenCaptchar=03AFcWeA4Bx99zvFCdwNuI2S-3kfXDVht7_TQO9XgV5TFn-k-bN4Usgi2PJ92iAI71If3XlSXF--zrzldrndAMW5MbSZrO55sikE61YXSksSnHcIuNWZ5IJeABKauFAo0LOyUsO9Wm3Ada0rdQezMn1PWR1EKPOq08eJwYkdRfBJWnTCgi0OgoQnF0epBAYaB8i-iEaFTaZiwcXmxrCjEqHjZ63zH-y5eN3ajHEWH6MU5QtRqM_yzn2mLf-YkZ13alvf1t0WYq1I1ortIiUa1lLZLcrLjbw0GAXCM1X2JZh3KwsSzgn-SwuI3bs5LZPMh7kzO3UFwUeibrtoXYmIT9QUBNVBRSjTBVOsfadBwrb9O1gaI8wOBTJG__jUJIN0z82J47qi5VvkLbcqP4e-N9W45QGZDUc6Y7xDtf-cazHsAe2xSSBd_DttqmSezoaskcCSvMACCNG7z7SAA1SFJnspi92Mso9oYeapFsD8gKMSRDwTiWJb75FgeJulaKMU8IPA8LZh0DYpUhqQbhmeSw8PWIJrd0XMCs7yOe80iwJBXLSEEO2DxBVXH6VIWhbxR16XcVYIKGgVtMShblDF7c8E6Q4C9FaoLd5tJaZcuk5ucy_0uPxOd29WiIypdBRo3mocw9C44Xcih7Mn-kh3E2rT_NZ6LXsQj0qazMYd6PF7b3LTz6j8oLy2emck0XsWUxc0OneYkyaPwEtKtWbEkpl8zMb6FVoAQP6mQjqYjVuEgXoU4YNH-RlsxsS7MkY-cF5bWiinz5Z2sIGMWZqc8g7I1rJI1UG36H4A3iP2Fnq_4-Fe_KBfN6PSdg9bGb5dzQnzAHCBwPVmMSWr9wpnfHXVbvUl4ZFx0fgqXKi2ZNzCw_GuUlVKVCQYTp4ly9CagnPmAihhlkJlJANSKBJWztq0SpnW4vWGfsQw9RQqjNYw3N4liH-et3KBspt_BR
dc.contributor.referee1Gabriel, Paulo Henrique Ribeiro-
dc.contributor.referee1Latteshttp://buscatextual.cnpq.br/buscatextual/visualizacv.do?id=K4164477D2&tokenCaptchar=03AFcWeA4rwGqQZFpm7cAm1LxRPggC5yY9pG87zi1tAs0Hg3DdPbGh37_1NuKy5AIkXr4UahKk0SvHzZqs76Ubfl5NdjXZNJwo1oABzsW-zrjIHD-N1edk3kOL4oPU7NETqP2VDxM6Jhmtt6Bvf_rboVdRmOgAXZHaZJSOuTTawvP0Mj5qdx5yBu_VjWekMVyCsIxvz7bFDE5E0M6OIu_WBgfMffAraPMPKIGQjtlA2QcxctNuXcaemSMs_qAw60IvLGe7pUSUNzxAXXmhSpJ9OEzsBmz_2TUN-_ldYQpXhkfFjuu1JpValZLZfdZPtNZ9OBQLdIByfpH_DBAupcTuW7FfcikUnadUl28RhYtFZ0t2tbW3EwDwiCg4SNLX-wGU62dOe-1CusCh2hCHkKQgzixSw2Jzj-1zOia95VBNMEqmxfW68UMIiRh1VcEwgBTwCXDM3TjcGdBS3GuAPQ1o5nH_5QW3eG961RneYEv90wL24FUMzhnF5CrzwHhoTm0Pq7zrhr8heW6a7stLt6P0qkQ1ZYiAYfY83SFNYVB00zL5zSXq-KexYlbbGvAIUPVxAngHzjdB932TiQorLsUUDgw4caERMSfIN6hBOPhQ-RExmA08tNqvPa8-vHZlRYSMNkpyhck5xN5zVhcIbYMSErjJSKqpuA_Z9D2ay5DXNOdgLTPMhV2hwFwpUXBt2TcfrPXigqHpKwrPuXAdAQpTQ8EMHVtBc4r82mRk2Zv-GG3iX1bRGHGsjvBrHlkFLD6lmtHdZ6cpk2wu3qO7LelX4tSs3hq0lxLlqmnRJLUDhf6pIxW-6gsU6P9b3lkfxg_HLFlCB-AGPQdqIv0erRVgkJnXz72H9OEkpTWMUKcnzRpZpQjpRcWFWsTSJIJUsiahY1jGrZC1eHOjPMeUcXYWGpZHVQUXWJt4l5_q0ilFnihH3Kfp8uq-FCEpt_BR
dc.contributor.referee2Travençolo, Bruno Augusto Nassif-
dc.contributor.referee2Latteshttp://buscatextual.cnpq.br/buscatextual/visualizacv.do?id=K4734646P3&tokenCaptchar=03AFcWeA4sT46a5nMaVVeoF2TOttngXOmDk2cLOvbCVBzvIqI18tHBiZzywdHcTvhjX7n0JaUFYagE6aKkdi9jwr5dgO31oY0X72lauIhiPHyRbaf0WHYFxjtqVInUimfqM2Zys1-WoUOCgzckUrf7J3QneGWIXPpAnekP_BL_OS4HtTmkuLh7FNXwXSx6M0KliUESLHfvd-ZsV4khj6DMjkV8w7MT6VhWUkL03KSTd7YITxmq6AO53m0KQYvXxQQaDTrx7-9wwFDoLFwFZlsfEgZfbhO2OBB-qqJSb30OU_PplZw64ZuHriVmhcnef8u6KA6fLk9l24wIAOTZJxY2EfEmcm6LC1oDcrT-TmhAYNUCSKMe-1jqbah8aHTKbSDluJIiuVROiGLh51eA0oMHYTTjFG3cjBOPk5wW15v1XElMfILiHUSQu4fU2_kwVVuZhvwJ0ASuIGFA5Gz2nEKqrJTP37Bdh_7xQcrZGuu8y8y-hqF1f6Q_HNR4mls-SRwKspuVhWOXh3562zDPBVX6ZuInC2qUPvlufxIHotxgpm0mmLrSGGTePDrhYrmewZItCpMEGL3Y9gPUNoGpQBVT2SqVxz8yTY-rGB9Rkco_CoI2pSLaFOtRZspCWoLD8cScmk2j7xY86AwAUKzw7omlWERuQJcwBVhhcklr35o_wDuLmSZTjbK682rN6nUXhvEDSkqrHkc2Y848VWL46CSwZc4XNfkWI9nVlW7NOmk-m4l2oiDL55zo37XYxw8o7DtYgCHzm6jQPvf7vDUTK5fsKCNzp2mcLXq-8SmD8pKelpJJ-Sy-un4sCX4vMaZvo9Z6XidEo9P26VpQ-jolyv46SN3O8Q9yTyEPPcpGHB41NG1ljfxhV4iX4yqyUrrDTcrKr9ZcjSYOFwbj16SoeVsficGYPv_4EBI6ZcNWK0OJBjOzRsseyWjMqr0pt_BR
dc.creator.Latteshttp://buscatextual.cnpq.br/buscatextual/visualizacv.do?id=K1793656H9&tokenCaptchar=03AFcWeA6FfsUadkkpI1YX9txLtesq9ev54dypznj9wAb3Tas82x-eFSuX-Z_QY3FhlosHq4nLN0yQI6QSAd34B6M_bedGFJ69iDWbwCtVmKnAjqD8QvKY8t8n44xz0uq0qtABuZXsmLAIDPTQ3GyIUi3MNShAFceWyucR-GHDrwdkdN0KzESQ9a4VCrWaLhKOGIydBWwgO2i6tmDbbIs7qfm96VzaReJsmVT1BQtnQ2U42Br1sNybfOmYcy2Kxx24TuzEFoSf1CtPP14Aj8ZvifskSECrlzpW8iGIJr5DkfICBXNdvsts7AUNZuMaadl7ojYzw_19eer6qX6KEvPiepfun-i-TNy-VrowQjdLAm5JYhbQSGRtOwyc-qIXgfaV-5o8ugyatASsPoS-8hI-rbI3tZ_wE75UNIUVm9y-dm_c9F8YuLdV-evVUwKnH9bzT5vbKbUXBf39wHVIzFMpGyrfT-Bh6VB6fgq02b3A1mty82apFMbQhoo5zuIbfB3qPpTJiDALeYiw8N6YuJNHoo2b-aXYLclIiJpdimMZQSYUsAKEXQk-N7I-z7wEjhY9MqEKL9g9Q9MkIsAqc5O3DhJF-DjfADHHDDdDtLtwTsbPcPxv-n3cwx0n7TkDTTcgEfwOyT3IQ8R4zTYkHFu0EY1LxJx6s5YP4h9DQzpRNQWlEMh1L7DItdjfqzxZLxIuSCBqEGr_y0YPdsN3iRBsEwnCmFrDtxNKXEWRTFCIcjcaBgbfsLExG6qjvydeD3Lk6F_HLT48gz-QxWvGtlp2eCf33gky0FILoP3uuIAOnTF1_TP7eLU6PouphRAzqlkSIdxQX3aWZx6V-rQjeUx1Wqa1YSi0pPAH2eykKpY2CF5qc_mPecNypH74y1tmUUSXaoCZflhxOrUNSedHGFlNHeDeuG2Es9auGo-Y-XHat0iO0f6jXAD7KvYpt_BR
dc.description.degreenameTrabalho de Conclusão de Curso (Graduação)pt_BR
dc.description.resumoEste trabalho apresenta uma análise de posts maliciosos extraídos de fóruns da Dark Web por meio de técnicas de aprendizado não supervisionado, com o objetivo de identificar as temáticas predominantes associadas a ameaças cibernéticas. Para isso, foi empregada uma metodologia baseada em algoritmos de agrupamento, como K-means, DBSCAN e KNN, além da aplicação da Análise de Tópicos Latentes (LDA) para identificar padrões temáticos latentes. Os resultados demonstraram que o algoritmo K-means se destacou ao estruturar os dados em três clusters principais, identificando temas predominantes como segurança de dados, busca por informações sensíveis e comunidades de hacking. Essa abordagem possibilitou a rotulagem e interpretação dos conteúdos com base nos padrões observados, contribuindo para a compreensão das táticas e intenções dos cibercriminosos. Como perspectivas futuras, sugere-se ampliar a base de dados para incluir ambientes como a Deep Web, Surface Web e redes sociais, além de incorporar algoritmos avançados de aprendizado profundo e ferramentas de monitoramento em tempo real, visando um aprimoramento contínuo na detecção e categorização de ameaças.pt_BR
dc.publisher.countryBrasilpt_BR
dc.publisher.courseSistemas de Informaçãopt_BR
dc.sizeorduration44pt_BR
dc.subject.cnpqCNPQ::CIENCIAS EXATAS E DA TERRA::CIENCIA DA COMPUTACAO::SISTEMAS DE COMPUTACAOpt_BR
dc.orcid.putcode173150093-
Appears in Collections:TCC - Sistemas de Informação (Uberlândia)

Files in This Item:
File Description SizeFormat 
AnalisePostsMaliciosos.pdfTCC935.58 kBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.