The Art of Cybercrime Community Research

被引:7
作者
Hughes, Jack [1 ]
Pastrana, Sergio [2 ]
Hutchings, Alice [1 ]
Afroz, Sadia [3 ,4 ]
Samtani, Sagar [5 ]
Li, Weifeng [6 ]
Marin, Ericsson Santana [7 ]
机构
[1] Univ Cambridge, JJ Thomson Ave, Cambridge, England
[2] Univ Carlos III Madrid, Ave Univ, Leganes, Spain
[3] ICSI, San Francisco, CA USA
[4] Avast Software, San Francisco, CA USA
[5] Indiana Univ, 107 S Indiana Ave, Bloomington, IN 47405 USA
[6] Univ Georgia, C422 Benson Hall,630 South Lumpkin St, Athens, GA USA
[7] Calif State Polytech Univ Pomona, 3801 West Temple Ave, Pomona, CA USA
基金
欧洲研究理事会; 美国国家科学基金会; 英国工程与自然科学研究理事会;
关键词
Cybercrime; communities; forums; marketplaces; data processing; ethics; SOCIAL-LEARNING THEORY; MARKETS; HACKERS; TRUST;
D O I
10.1145/3639362
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the last decade, cybercrime has risen considerably. One key factor is the proliferation of online cybercrime communities, where actors trade products and services, and also learn from each other. Accordingly, understanding the operation and behavior of these communities is of great interest, and they have been explored across multiple disciplines with different, often quite novel, approaches. This survey explores the challenges inherent to the field and the methodological approaches researchers used to understand this space. We note that, in many cases, cybercrime research is more of an art than a science. We highlight the good practices and propose a list of recommendations for future cybercrime community scholars, including taking steps to verify and validate results, establishing privacy and ethical research practices, and mitigating the challenge of ground truth data.
引用
收藏
页数:26
相关论文
共 135 条
[1]   Descriptive Analytics: Examining Expert Hackers in Web Forums [J].
Abbasi, Ahmed ;
Li, Weifeng ;
Benjamin, Victor ;
Hu, Shiyu ;
Chen, Hsinchun .
2014 IEEE JOINT INTELLIGENCE AND SECURITY INFORMATICS CONFERENCE (JISIC), 2014, :56-63
[2]  
Afroz S, 2013, ECRIM RES SUM
[3]   Doppelganger Finder: Taking Stylometry To The Underground [J].
Afroz, Sadia ;
Caliskan-Islam, Aylin ;
Stolerman, Ariel ;
Greenstadt, Rachel ;
McCoy, Damon .
2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014), 2014, :212-226
[4]  
Akyazi U., 2021, P WORKSH EC INF SEC, P1
[5]   Economic Factors of Vulnerability Trade and Exploitation [J].
Allodi, Luca .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :1483-1499
[6]  
Almukaynizi Mohammed, 2017, 2017 International Conference on Cyber-Conflict (CyCon U.S.), P82, DOI 10.1109/CYCONUS.2017.8167501
[7]   Predicting Cyber Threats through Hacker Social Networks in Darkweb and Deepweb Forums [J].
Almukaynizi, Mohammed ;
Grimm, Alexander ;
Nunes, Eric ;
Shakarian, Jana ;
Shakarian, Paulo .
CSS 2017: THE 2017 INTERNATIONAL CONFERENCE OF THE COMPUTATIONAL SOCIAL SCIENCE SOCIETY OF THE AMERICAS, 2017,
[8]  
Almukaynizi M, 2018, 2018 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), P31, DOI 10.1109/ISI.2018.8587334
[9]   Labeling Hacker Exploits for Proactive Cyber Threat Intelligence: A Deep Transfer Learning Approach [J].
Ampel, Benjamin ;
Samtani, Sagar ;
Zhu, Hongyi ;
Ullman, Steven ;
Chen, Hsinchun .
2020 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2020, :144-149
[10]  
Anderson R., 2013, EC INFORM SECURITY P, P265, DOI [10.1007/978-3-642-39498-0_12, DOI 10.1007/978-3-642-39498-0_12]