2015 IEEE International Conference on Intelligence and Security Informatics (ISI) 2015
DOI: 10.1109/isi.2015.7165935
|View full text |Cite
|
Sign up to set email alerts
|

Exploring hacker assets in underground forums

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
43
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 61 publications
(43 citation statements)
references
References 15 publications
0
43
0
Order By: Relevance
“…A study by [11] delineates research themes on hacker community into three major strands -(i) qualitative analysis to understand and describe hacker activities [12] [13]; (ii) analysis of carding communities and underground economy [10] [13] [14], and, (iii) analysis and identification of key participants in hacker communities [15]. We identify another set of studies on hacker forums in literature : (iv) analysis of physical hacker assets and source codes through forum analysis [15], [16] and [17], (v) analysis and identification of top hacker keywords and lexicons to examine hacker behavior [11], and (vi) analysis of social networks present in hacker forums [18] [19] [20]. This study contributes to all of these strands of literature except (ii).…”
Section: Hacker Communitiesmentioning
confidence: 99%
See 1 more Smart Citation
“…A study by [11] delineates research themes on hacker community into three major strands -(i) qualitative analysis to understand and describe hacker activities [12] [13]; (ii) analysis of carding communities and underground economy [10] [13] [14], and, (iii) analysis and identification of key participants in hacker communities [15]. We identify another set of studies on hacker forums in literature : (iv) analysis of physical hacker assets and source codes through forum analysis [15], [16] and [17], (v) analysis and identification of top hacker keywords and lexicons to examine hacker behavior [11], and (vi) analysis of social networks present in hacker forums [18] [19] [20]. This study contributes to all of these strands of literature except (ii).…”
Section: Hacker Communitiesmentioning
confidence: 99%
“…Extant studies confirm that the number of characters spent to deliver a message strongly influence the content produced by the user [15] [16] [17]. Often average message length for each message is used as a covariate [17] [38].…”
Section: Expertise Based On Text-mining Featuresmentioning
confidence: 99%
“…Interest in these communities has increased in recent years and there is a wide literature on the analysis of cybercriminal forums, from different fields such as criminology, economics, cybersecurity and sociology (see Section 2.1). Research topics have included: how trust is managed [11], marketplace trade [35], and sharing of hacking material [37]. However, the interests and motivations of community members are widespread and evolve over time.…”
Section: Introductionmentioning
confidence: 99%
“…Exploit tools or malwares are also available as attachments, e.g. the Dirt Jumper DDos attack, keyloggers and crypters [25]. They also discuss technologies, methodologies and practices about detecting, preventing and tracking the black hats to protect information assets.…”
Section: Hacker Behaviormentioning
confidence: 99%
“…Abbasi et al [1] use an interaction coherence analysis (ICA) framework to identify expert hackers in forums. Samtani et al [25] apply classification and topic modeling techniques to investigate the functions and characteristics of assets in hacker community. In order to have better understanding of hacker terms and concepts, Benjamin et al [8] utilize recurrent neural network language models (RNMLM) to model language.…”
Section: Hacker Forum Text Analysismentioning
confidence: 99%