The art of cybercrime community research

J Hughes, S Pastrana, A Hutchings, S Afroz… - ACM Computing …, 2024 - dl.acm.org
In the last decade, cybercrime has risen considerably. One key factor is the proliferation of
online cybercrime communities, where actors trade products and services, and also learn …

Botnet business models, takedown attempts, and the darkweb market: A survey

D Georgoulias, JM Pedersen, M Falch… - ACM Computing …, 2023 - dl.acm.org
Botnets account for a substantial portion of cybercrime. Botmasters utilize darkweb
marketplaces to promote and provide their services, which can vary from renting or buying a …

Semi-supervised cyber threat identification in dark net markets: A transductive and deep learning approach

M Ebrahimi, JF Nunamaker Jr… - Journal of Management …, 2020 - Taylor & Francis
ABSTRACT Dark Net Marketplaces (DNMs), online selling platforms on the dark web,
constitute a major component of the underground economy. Due to the anonymity and …

LINKING EXPLOITS FROM THE DARK WEB TO KNOWN VULNERABILITIES FOR PROACTIVE CYBER THREAT INTELLIGENCE: AN ATTENTION-BASED DEEP …

S Samtani, Y Chai, H Chen - MIS quarterly, 2022 - par.nsf.gov
Black hat hackers use malicious exploits to circumvent security controls and take advantage
of system vulnerabilities worldwide, costing the global economy over $450 billion annually …

HackerRank: Identifying key hackers in underground forums

C Huang, Y Guo, W Guo, Y Li - International Journal of …, 2021 - journals.sagepub.com
With the rapid development of the Internet, cybersecurity situation is becoming more and
more complex. At present, surface web and dark web contain numerous underground …

Counteracting dark Web text-based CAPTCHA with generative adversarial learning for proactive cyber threat intelligence

N Zhang, M Ebrahimi, W Li, H Chen - ACM Transactions on …, 2022 - dl.acm.org
Automated monitoring of dark web (DW) platforms on a large scale is the first step toward
developing proactive Cyber Threat Intelligence (CTI). While there are efficient methods for …

Identifying, collecting, and monitoring personally identifiable information: From the dark web to the surface web

Y Liu, FY Lin, Z Ahmad-Post, M Ebrahimi… - … on Intelligence and …, 2020 - ieeexplore.ieee.org
Personally identifiable information (PII) has become a major target of cyber-attacks, causing
severe losses to data breach victims. To protect data breach victims, researchers focus on …

Cybercrime-as-a-service operations

TS Hyslip - The palgrave handbook of international cybercrime …, 2020 - Springer
This chapter explores the cybercrime-as-a-service operations that have changed the
cybercrime marketplace from a direct sales model to a managed service model. As …

Enhancing cyber threat identification in open-source intelligence feeds through an improved semi-supervised generative adversarial learning approach with …

O Cherqi, Y Moukafih, M Ghogho, H Benbrahim - IEEE Access, 2023 - ieeexplore.ieee.org
Responding to the challenge of efficiently leveraging Open-source Threat Intelligence Feeds
(OTIFs) to enhance organizational security, this paper presents an innovative approach to …

Navigating the shadows: Manual and semi-automated evaluation of the dark web for cyber threat intelligence

P Kühn, K Wittorf, C Reuter - IEEE Access, 2024 - ieeexplore.ieee.org
In today's world, cyber-attacks are becoming more frequent and thus proactive protection
against them is becoming more important. Cyber Threat Intelligence (CTI) is a possible …