2017
DOI: 10.1080/07421222.2017.1394049
|View full text |Cite
|
Sign up to set email alerts
|

Exploring Emerging Hacker Assets and Key Hackers for Proactive Cyber Threat Intelligence

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
62
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 138 publications
(67 citation statements)
references
References 19 publications
2
62
0
Order By: Relevance
“…In recent days , due to enormous available of accessing resources and evolution of innovating technologies, anyone who are interested in any type of hacking can involve themselves in exploring the TTP's used by the hacker communities can acquire their knowledge through forums, IRC, carding shops etc., [21].On day today basis, the exploits are increasing and made as commercialization [22]and become lively for hacker community. [24]Cyber-attacks affect the global economy of many billion dollar in preventing from [18] execution of malicious tools like trojans, zeus, ransomware and keyloggers, SQL injections, and DDoS from United States, Russia, and China. To prevent the cyber-attacks the vendors like FireEye, Cyveillance, Symantec, McAfee, Trend Micro, Sophos, and Kaspersky involved in the generation of Cyber Threat Intelligence (CTI) reports.…”
Section: Online Forums and Cti Reportsmentioning
confidence: 99%
See 1 more Smart Citation
“…In recent days , due to enormous available of accessing resources and evolution of innovating technologies, anyone who are interested in any type of hacking can involve themselves in exploring the TTP's used by the hacker communities can acquire their knowledge through forums, IRC, carding shops etc., [21].On day today basis, the exploits are increasing and made as commercialization [22]and become lively for hacker community. [24]Cyber-attacks affect the global economy of many billion dollar in preventing from [18] execution of malicious tools like trojans, zeus, ransomware and keyloggers, SQL injections, and DDoS from United States, Russia, and China. To prevent the cyber-attacks the vendors like FireEye, Cyveillance, Symantec, McAfee, Trend Micro, Sophos, and Kaspersky involved in the generation of Cyber Threat Intelligence (CTI) reports.…”
Section: Online Forums and Cti Reportsmentioning
confidence: 99%
“…The cyber threat Intelligence is used to act proactively toward detecting the zero -day attacks using machine learning techniques against the hackers. [18]Since in the existing approaches followed by the Academia, research communities and CTI report generation are reactive instead it has to be proactive in composing the information from the forums of online hackers including the tools and adversaries' profile. There are many hacker's forum available online to exchange the knowledge and the content of the tools and the techniques used in the attack patterns(For example, U.S. forums mainly deals with cybercrime and general hacking, Russian forums focus on underground economies and data breaches, Chinese forums share about cyber warfare and virtual goods) .The participants in the forum maximum are unskilled and novices can be develop to skilled high level of profile by accessing through posted link of keywords or phrases which enables the users can access the information and also share hyperlinks, pictures, videos, source code, attachments to disseminate the malicious.…”
Section: Online Forums and Cti Reportsmentioning
confidence: 99%
“…Hackers use these message boards to post messages within threads of conversations related to hacking tools, techniques, and malicious source code. Among the four major platforms, forums are the only one allowing hackers to post malicious exploits for others to freely download [5]. The open sharing of hacking assets enables individuals with limited hacking skills to become capable of conducting cyberattacks [4].…”
Section: ) Hacker Forumsmentioning
confidence: 99%
“…In the second category more work has been done on non-English platforms. In [7], Support Vector Machine (SVM) was used in a monolingual setting to classify malware source codes on eight forums in English and Russian. In their approach, Russian data was machine translated to English using Google Translate.…”
Section: A Cyber Threat Detection In Hacker Communitymentioning
confidence: 99%
“…While labeled data in English is often available, the language barrier results in limited labeled data in non-English DNMs which hinders cyber threat detection. Current studies use machine translation (MT) to tackle this challenge [7]- [9]. However, informal, nongrammatical and hacker-specific language causes translation errors.…”
Section: Introductionmentioning
confidence: 99%