publication . Preprint . Conference object . 2016

Product Offerings in Malicious Hacker Markets

Ericsson Marin; Ahmad Diab; Paulo Shakarian;
Open Access English
  • Published: 26 Jul 2016
Comment: 3 pages, 1 figure, 3 tables. Accepted for publication in IEEE Intelligence and Security Informatics (ISI2016)
free text keywords: Computer Science - Cryptography and Security, Computer Science - Learning, World Wide Web, Computer security, computer.software_genre, computer, Computer science, Vendor, Cluster analysis, Hacker, Malware, Database schema, Exploit
Related Organizations

[1] R. Dingledine, N. Mathewson, and P. Syverson, “Tor: The Secondgeneration Onion Router,” in Proceedings of the 13th Conference on USENIX Security Symposium - Volume 13, ser. SSYM'04. Berkeley, CA, USA: USENIX Association, 2004, pp. 21-21.

[2] V. Ciancaglini, M. Balduzzi, R. McArdle, and M. Ro¨sler, “Below the Surface: Exploring the Deep Web,” 2015.

[3] N. Christin, “Traveling the silk road: A measurement analysis of a large anonymous online marketplace,” in Proceedings of the 22Nd International Conference on World Wide Web, ser. WWW '13. New York, NY, USA: ACM, 2013, pp. 213-224.

[4] J. Robertson, V. Paliath, J. Shakarian, A. Thart, and P. Shakarian, “Data Driven Game Theoretic Cyber Threat Mitigation,” in Proc. 28th Innovative Applications of Artificial Intelligence (IAAI-16), 2016.

[5] C. C. Yang, X. Tang, and X. Gong, “Identifying dark web clusters with temporal coherence analysis,” in Intelligence and Security Informatics (ISI), 2011 IEEE International Conference on, July 2011, pp. 167-172.

[6] V. Benjamin, W. Li, T. Holt, and H. Chen, “Exploring threats and vulnerabilities in hacker web: Forums, irc and carding shops,” in Intelligence and Security Informatics (ISI), 2015 IEEE International Conference on, May 2015, pp. 85-90.

[7] M. Macdonald, R. Frank, J. Mei, and B. Monk, “Identifying digital threats in a hacker web forum,” in Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015, ser. ASONAM '15. New York, NY, USA: ACM, 2015, pp. 926-933.

[8] Z. Zhao, G.-J. Ahn, H. Hu, and D. Mahi, “SocialImpact: Systematic Analysis of Underground Social Dynamics.” in ESORICS, ser. Lecture Notes in Computer Science, S. Foresti, M. Yung, and F. Martinelli, Eds., vol. 7459. Springer, 2012, pp. 877-894.

[9] H. Chen, “Dark web: Exploring and mining the dark side of the web,” in Intelligence and Security Informatics Conference (EISIC), 2011 European, Sept 2011, pp. 1-2.

[10] J. Shakarian, P. Shakarian, and A. Ruef, “Cyber attacks and public embarrassment: A survey of some notable hacks,” Elsevier SciTechConnect, 2015. [OpenAIRE]

[11] P. Shakarian and J. Shakarian, “Socio-cultural modeling for cyber threat actors,” in AAAI Workshop on Artificial Intelligence and Cyber Security (AICS), 2016.

[12] J. Shakarian, A. Gunn, and P. Shakarian, “Exploring malicious hacker forums,” in Cyber Deception: Building the Scientific Foundation, S. Jajodia, V. Subrahmanian, V. Swarup, and C. Wang, Eds. Springer, 2016. [OpenAIRE]

[13] W. M. Rand, “Objective Criteria for the Evaluation of Clustering Methods,” Journal of the American Statistical Association, vol. 66, no. 336, pp. 846-850, Dec. 1971.

Powered by OpenAIRE Open Research Graph
Any information missing or wrong?Report an Issue
publication . Preprint . Conference object . 2016

Product Offerings in Malicious Hacker Markets

Ericsson Marin; Ahmad Diab; Paulo Shakarian;