DocumentCode :
725719
Title :
Exploring hacker assets in underground forums
Author :
Samtani, Sagar ; Chinn, Ryan ; Hsinchun Chen
Author_Institution :
Dept. of Manage. Inf. Syst., Univ. of Arizona, Tucson, AZ, USA
fYear :
2015
fDate :
27-29 May 2015
Firstpage :
31
Lastpage :
36
Abstract :
Many large companies today face the risk of data breaches via malicious software, compromising their business. These types of attacks are usually executed using hacker assets. Researching hacker assets within underground communities can help identify the tools which may be used in a cyberattack, provide knowledge on how to implement and use such assets and assist in organizing tools in a manner conducive to ethical reuse and education. This study aims to understand the functions and characteristics of assets in hacker forums by applying classification and topic modeling techniques. This research contributes to hacker literature by gaining a deeper understanding of hacker assets in well-known forums and organizing them in a fashion conducive to educational reuse. Additionally, companies can apply our framework to forums of their choosing to extract their assets and appropriate functions.
Keywords :
Internet; computer crime; pattern classification; attack types; classification techniques; cyberattack; data breaches; educational reuse; ethical reuse; hacker assets; hacker forums; malicious software; topic modeling techniques; underground communities; underground forums; Decision support systems; Feature extraction; Labeling; Resource management; Support vector machines; Tutorials; cybersecurity; hacker assets; topic modeling;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Intelligence and Security Informatics (ISI), 2015 IEEE International Conference on
Conference_Location :
Baltimore, MD
Print_ISBN :
978-1-4799-9888-3
Type :
conf
DOI :
10.1109/ISI.2015.7165935
Filename :
7165935
Link To Document :
بازگشت