Product Offerings in Malicious Hacker Markets

Preprint English OPEN
Marin, Ericsson; Diab, Ahmad; Shakarian, Paulo;
(2016)
  • Subject: Computer Science - Learning | Computer Science - Cryptography and Security

Marketplaces specializing in malicious hacking products - including malware and exploits - have recently become more prominent on the darkweb and deepweb. We scrape 17 such sites and collect information about such products in a unified database schema. Using a combinati... View more
  • References (13)
    13 references, page 1 of 2

    [1] R. Dingledine, N. Mathewson, and P. Syverson, “Tor: The Secondgeneration Onion Router,” in Proceedings of the 13th Conference on USENIX Security Symposium - Volume 13, ser. SSYM'04. Berkeley, CA, USA: USENIX Association, 2004, pp. 21-21.

    [2] V. Ciancaglini, M. Balduzzi, R. McArdle, and M. Ro¨sler, “Below the Surface: Exploring the Deep Web,” 2015.

    [3] N. Christin, “Traveling the silk road: A measurement analysis of a large anonymous online marketplace,” in Proceedings of the 22Nd International Conference on World Wide Web, ser. WWW '13. New York, NY, USA: ACM, 2013, pp. 213-224.

    [4] J. Robertson, V. Paliath, J. Shakarian, A. Thart, and P. Shakarian, “Data Driven Game Theoretic Cyber Threat Mitigation,” in Proc. 28th Innovative Applications of Artificial Intelligence (IAAI-16), 2016.

    [5] C. C. Yang, X. Tang, and X. Gong, “Identifying dark web clusters with temporal coherence analysis,” in Intelligence and Security Informatics (ISI), 2011 IEEE International Conference on, July 2011, pp. 167-172.

    [6] V. Benjamin, W. Li, T. Holt, and H. Chen, “Exploring threats and vulnerabilities in hacker web: Forums, irc and carding shops,” in Intelligence and Security Informatics (ISI), 2015 IEEE International Conference on, May 2015, pp. 85-90.

    [7] M. Macdonald, R. Frank, J. Mei, and B. Monk, “Identifying digital threats in a hacker web forum,” in Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015, ser. ASONAM '15. New York, NY, USA: ACM, 2015, pp. 926-933.

    [8] Z. Zhao, G.-J. Ahn, H. Hu, and D. Mahi, “SocialImpact: Systematic Analysis of Underground Social Dynamics.” in ESORICS, ser. Lecture Notes in Computer Science, S. Foresti, M. Yung, and F. Martinelli, Eds., vol. 7459. Springer, 2012, pp. 877-894.

    [9] H. Chen, “Dark web: Exploring and mining the dark side of the web,” in Intelligence and Security Informatics Conference (EISIC), 2011 European, Sept 2011, pp. 1-2.

    [10] J. Shakarian, P. Shakarian, and A. Ruef, “Cyber attacks and public embarrassment: A survey of some notable hacks,” Elsevier SciTechConnect, 2015.

  • Metrics
Share - Bookmark