Abstract
Many large companies today face the risk of data breaches via malicious software, compromising their business. These types of attacks are usually executed using hacker assets. Researching hacker assets within underground communities can help identify the tools which may be used in a cyberattack, provide knowledge on how to implement and use such assets and assist in organizing tools in a manner conducive to ethical reuse and education. This study aims to understand the functions and characteristics of assets in hacker forums by applying classification and topic modeling techniques. This research contributes to hacker literature by gaining a deeper understanding of hacker assets in well-known forums and organizing them in a fashion conducive to educational reuse. Additionally, companies can apply our framework to forums of their choosing to extract their assets and appropriate functions.
Original language | English (US) |
---|---|
Title of host publication | 2015 IEEE International Conference on Intelligence and Security Informatics: Securing the World through an Alignment of Technology, Intelligence, Humans and Organizations, ISI 2015 |
Publisher | Institute of Electrical and Electronics Engineers Inc. |
Pages | 31-36 |
Number of pages | 6 |
ISBN (Print) | 9781479998883 |
DOIs | |
State | Published - Jul 23 2015 |
Event | 13th IEEE International Conference on Intelligence and Security Informatics, ISI 2015 - Baltimore, United States Duration: May 27 2015 → May 29 2015 |
Other
Other | 13th IEEE International Conference on Intelligence and Security Informatics, ISI 2015 |
---|---|
Country | United States |
City | Baltimore |
Period | 5/27/15 → 5/29/15 |
Keywords
- cybersecurity
- hacker assets
- topic modeling
ASJC Scopus subject areas
- Artificial Intelligence
- Law
- Computer Networks and Communications
- Safety, Risk, Reliability and Quality