Exploring hacker assets in underground forums

Sagar Samtani, Ryan Chinn, Hsinchun Chen

Research output: Chapter in Book/Report/Conference proceedingConference contribution

23 Citations (Scopus)

Abstract

Many large companies today face the risk of data breaches via malicious software, compromising their business. These types of attacks are usually executed using hacker assets. Researching hacker assets within underground communities can help identify the tools which may be used in a cyberattack, provide knowledge on how to implement and use such assets and assist in organizing tools in a manner conducive to ethical reuse and education. This study aims to understand the functions and characteristics of assets in hacker forums by applying classification and topic modeling techniques. This research contributes to hacker literature by gaining a deeper understanding of hacker assets in well-known forums and organizing them in a fashion conducive to educational reuse. Additionally, companies can apply our framework to forums of their choosing to extract their assets and appropriate functions.

Original languageEnglish (US)
Title of host publication2015 IEEE International Conference on Intelligence and Security Informatics: Securing the World through an Alignment of Technology, Intelligence, Humans and Organizations, ISI 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages31-36
Number of pages6
ISBN (Print)9781479998883
DOIs
StatePublished - Jul 23 2015
Event13th IEEE International Conference on Intelligence and Security Informatics, ISI 2015 - Baltimore, United States
Duration: May 27 2015May 29 2015

Other

Other13th IEEE International Conference on Intelligence and Security Informatics, ISI 2015
CountryUnited States
CityBaltimore
Period5/27/155/29/15

Fingerprint

hacker
assets
Industry
Education
community
education

Keywords

  • cybersecurity
  • hacker assets
  • topic modeling

ASJC Scopus subject areas

  • Artificial Intelligence
  • Law
  • Computer Networks and Communications
  • Safety, Risk, Reliability and Quality

Cite this

Samtani, S., Chinn, R., & Chen, H. (2015). Exploring hacker assets in underground forums. In 2015 IEEE International Conference on Intelligence and Security Informatics: Securing the World through an Alignment of Technology, Intelligence, Humans and Organizations, ISI 2015 (pp. 31-36). [7165935] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ISI.2015.7165935

Exploring hacker assets in underground forums. / Samtani, Sagar; Chinn, Ryan; Chen, Hsinchun.

2015 IEEE International Conference on Intelligence and Security Informatics: Securing the World through an Alignment of Technology, Intelligence, Humans and Organizations, ISI 2015. Institute of Electrical and Electronics Engineers Inc., 2015. p. 31-36 7165935.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Samtani, S, Chinn, R & Chen, H 2015, Exploring hacker assets in underground forums. in 2015 IEEE International Conference on Intelligence and Security Informatics: Securing the World through an Alignment of Technology, Intelligence, Humans and Organizations, ISI 2015., 7165935, Institute of Electrical and Electronics Engineers Inc., pp. 31-36, 13th IEEE International Conference on Intelligence and Security Informatics, ISI 2015, Baltimore, United States, 5/27/15. https://doi.org/10.1109/ISI.2015.7165935
Samtani S, Chinn R, Chen H. Exploring hacker assets in underground forums. In 2015 IEEE International Conference on Intelligence and Security Informatics: Securing the World through an Alignment of Technology, Intelligence, Humans and Organizations, ISI 2015. Institute of Electrical and Electronics Engineers Inc. 2015. p. 31-36. 7165935 https://doi.org/10.1109/ISI.2015.7165935
Samtani, Sagar ; Chinn, Ryan ; Chen, Hsinchun. / Exploring hacker assets in underground forums. 2015 IEEE International Conference on Intelligence and Security Informatics: Securing the World through an Alignment of Technology, Intelligence, Humans and Organizations, ISI 2015. Institute of Electrical and Electronics Engineers Inc., 2015. pp. 31-36
@inproceedings{7d41325833e24f72a6f05dd7c96bdb5f,
title = "Exploring hacker assets in underground forums",
abstract = "Many large companies today face the risk of data breaches via malicious software, compromising their business. These types of attacks are usually executed using hacker assets. Researching hacker assets within underground communities can help identify the tools which may be used in a cyberattack, provide knowledge on how to implement and use such assets and assist in organizing tools in a manner conducive to ethical reuse and education. This study aims to understand the functions and characteristics of assets in hacker forums by applying classification and topic modeling techniques. This research contributes to hacker literature by gaining a deeper understanding of hacker assets in well-known forums and organizing them in a fashion conducive to educational reuse. Additionally, companies can apply our framework to forums of their choosing to extract their assets and appropriate functions.",
keywords = "cybersecurity, hacker assets, topic modeling",
author = "Sagar Samtani and Ryan Chinn and Hsinchun Chen",
year = "2015",
month = "7",
day = "23",
doi = "10.1109/ISI.2015.7165935",
language = "English (US)",
isbn = "9781479998883",
pages = "31--36",
booktitle = "2015 IEEE International Conference on Intelligence and Security Informatics: Securing the World through an Alignment of Technology, Intelligence, Humans and Organizations, ISI 2015",
publisher = "Institute of Electrical and Electronics Engineers Inc.",

}

TY - GEN

T1 - Exploring hacker assets in underground forums

AU - Samtani, Sagar

AU - Chinn, Ryan

AU - Chen, Hsinchun

PY - 2015/7/23

Y1 - 2015/7/23

N2 - Many large companies today face the risk of data breaches via malicious software, compromising their business. These types of attacks are usually executed using hacker assets. Researching hacker assets within underground communities can help identify the tools which may be used in a cyberattack, provide knowledge on how to implement and use such assets and assist in organizing tools in a manner conducive to ethical reuse and education. This study aims to understand the functions and characteristics of assets in hacker forums by applying classification and topic modeling techniques. This research contributes to hacker literature by gaining a deeper understanding of hacker assets in well-known forums and organizing them in a fashion conducive to educational reuse. Additionally, companies can apply our framework to forums of their choosing to extract their assets and appropriate functions.

AB - Many large companies today face the risk of data breaches via malicious software, compromising their business. These types of attacks are usually executed using hacker assets. Researching hacker assets within underground communities can help identify the tools which may be used in a cyberattack, provide knowledge on how to implement and use such assets and assist in organizing tools in a manner conducive to ethical reuse and education. This study aims to understand the functions and characteristics of assets in hacker forums by applying classification and topic modeling techniques. This research contributes to hacker literature by gaining a deeper understanding of hacker assets in well-known forums and organizing them in a fashion conducive to educational reuse. Additionally, companies can apply our framework to forums of their choosing to extract their assets and appropriate functions.

KW - cybersecurity

KW - hacker assets

KW - topic modeling

UR - http://www.scopus.com/inward/record.url?scp=84963758376&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84963758376&partnerID=8YFLogxK

U2 - 10.1109/ISI.2015.7165935

DO - 10.1109/ISI.2015.7165935

M3 - Conference contribution

AN - SCOPUS:84963758376

SN - 9781479998883

SP - 31

EP - 36

BT - 2015 IEEE International Conference on Intelligence and Security Informatics: Securing the World through an Alignment of Technology, Intelligence, Humans and Organizations, ISI 2015

PB - Institute of Electrical and Electronics Engineers Inc.

ER -